the impact of ict “ hacking”

10
The Impact Of ICT Hacking” Prepared By : Name : Mohammad Sahrizan Bin Saldikun Class:4 c Teacher Name: Ismail Bin Hj Jaani 1

Upload: nariko

Post on 26-Feb-2016

47 views

Category:

Documents


0 download

DESCRIPTION

The Impact Of ICT “ Hacking”. Prepared By : Name : Mohammad Sahrizan Bin Saldikun C lass:4 c Teacher Name: Ismail Bin Hj Jaani. Content. Definition. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: The Impact Of ICT “ Hacking”

1

The Impact Of ICT“Hacking”

Prepared By :Name : Mohammad Sahrizan Bin Saldikun

Class:4 cTeacher Name: Ismail Bin Hj Jaani

Page 2: The Impact Of ICT “ Hacking”

2

Content• DefinitionIntroducti

on• Black Hat Hacker • White Hat Hacker• Grey Hat Hacker• Elite Hat Hacker

Content

• Overcome Hacking Through…Solution

• BibliographySource

Page 3: The Impact Of ICT “ Hacking”

3

Definition• During the 1990’s,the term hacking

originally denoted a skilled programmer proficient in machine code and operating a system. Hacking basically who wants to break into computer network and software. The hacker subcultures has develop among these new-age.

Page 4: The Impact Of ICT “ Hacking”

4

Type Of Hacker / At any Rates, Here Are The Type Of Hacker.

a. White Hatb. Black Hatc. Grey Hat

Page 5: The Impact Of ICT “ Hacking”

5

White Hat HackerSomeone who has non malicious intent

whenever he break into security system , In fact , a large number of White Hacker are security expert

themselves who wants to push the boundries.

Page 6: The Impact Of ICT “ Hacking”

6

Black Hat Hacker They were also known as cracker . The type of hacker that has malicious intent , with use of technology such as a networks , phone system or computer software without authorization. his can malevolent purposes from all sort cybercrime , piracy , identity theft , credit card fraud and may deploying worms and malicious sites to meet his end.

Page 7: The Impact Of ICT “ Hacking”

7

Grey Hat HackerThe type of hacker who exhibits traits from both white hat and black hat. More to the point this is the kind of hacker that isn’t a penetration tester but will go ahead and surf the internet for vulnerable he could exploit. he’ll hack any site freely and without any prompting or authorization.

Page 8: The Impact Of ICT “ Hacking”

8

Conclusion

Hacking can be known as a person that can be accessing without permission to computer system by a person called the ‘Hacker’.

Page 9: The Impact Of ICT “ Hacking”

9

Overcome Hacking Through …

Thing to do is keep

your password a secret

You need to make

sure your computer doesn’t

have viruses , trojans ,

keyloggers , etc.

Keep your scripts

and download program updates

Doesn’t have a

writable file

permissions

Never leave

scripts on your

account that are

not being used.