Escolar Documentos
Profissional Documentos
Cultura Documentos
INDEX
Introduction History Hacker & Cracker Difference between hacker & cracker Which operating system hacker use?
Introduction
Hacking is technique in which any one can access any ones computer without his permission The process of attempting any one computer resources for the purpose of help or secure system is called hacking.
Presentation_ID
History
1966 Robert Morric introduces the concept of safe hacking. 1969 Development in the field of hacking. 1990 Electronic Frontier Foundation was founded.
Presentation_ID
Who is Hacker?
A hacker is someone who gains unauthorized access to a computer system. Many hackers just like the challenge of breaking through a computer security system but not all hackers are harmless. It must also be said that not all hackers are bad. Government and huge companies use hackers to maintain their security systems. Hacker is not cyber criminal.
Presentation_ID
2003 Cisco Systems, Inc. All rights reserved.
Who is Cracker?
Person who enter into others system and violet the data is called Cracker. Cracker is cyber criminal. They can be easily identified because their actions are malicious.
Presentation_ID
Presentation_ID
Presentation_ID
UNIX
MICROSOFT
Conti
Presentation_ID
2003 Cisco Systems, Inc. All rights reserved.
. SUN:
This is because these products are license ware & they can easily be obtained. UNIX: Popular platform because they required a low overhead. We gain good performance. This is reasonable. MICROSOFT: This supports many security tools that can be used to attack remote machine. It has advanced tools for networking as well.
Presentation_ID
2003 Cisco Systems, Inc. All rights reserved.
10
Presentation_ID
11
Presentation_ID
12
Types of hacking
There are many types of hacking Like
Password hacking
Software hacking Net hacking
Presentation_ID
13
Password hacking
Two types: 1.) Brute force
In that case hackers try out all the combination of all keyboard letters .It has grater success but it takes long time.
In that they are use predefine password It is unsuccessful method.
Presentation_ID
14
Software hacking
In that hackers changes the look & execution way of that software Chang the demo version into full version by decode the source code
Presentation_ID
15
Presentation_ID
16
Trojan
Windows Trojans are small aspect of windows security Trojan is unauthorized program contained within a program This program performs function unknown by user
Presentation_ID
17
Firewall
Firewall is any device used to prevent outsiders from gaining access to your network Types of firewalls Packet filter
Application proxy
Packet inspection
Presentation_ID
18
Thank You
Presentation_ID
2003 Cisco Systems, Inc. All rights reserved.
19