0% found this document useful (0 votes)
7 views13 pages

Cyber laws Assignment 2

The document discusses various types of hacking, including white hat, black hat, and grey hat hacking, and their ethical implications. It highlights the techniques used by hackers to gain unauthorized access to systems, such as phishing, email hacking, and website hacking. Additionally, it emphasizes the importance of online ethics and protecting personal information in the digital age.

Uploaded by

Ashok Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
7 views13 pages

Cyber laws Assignment 2

The document discusses various types of hacking, including white hat, black hat, and grey hat hacking, and their ethical implications. It highlights the techniques used by hackers to gain unauthorized access to systems, such as phishing, email hacking, and website hacking. Additionally, it emphasizes the importance of online ethics and protecting personal information in the digital age.

Uploaded by

Ashok Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 13
oc] : =~ 31 Pes and procey 4 hacking? dey do dhe piachce x” exploiting in Compuler Ay8lem of networb “a she — proces of fineling hewsity Joop rol& Mm a — fempule — sysiem =o nehwovh in oxcler do gain ads yo personal oF : dechnnigues include - eg a aces Jo lata gre 4 & r a Type of Feching w? 7 Based on purpose > Bede on what >unite hacking 16 being hathe d 7 Bhitl fat ing 7 falswosa haching \ ? Grey hacking ? Email hacking 7 Comforer hacking ? vebbite faching 7 etwov — flaching # white hat haehing: née FecheeS are Wo hnown oo Cihicah hochey - white Nab nacke lS joy4 ae noche- axe the good world Theke people vbe she Same Yechnigue heel by he bao Nor hoehexs - They Bo fleck ne 4ystem , but Jney con ony — flack uhe System , bub thar shey hove — fesrnsion J flack. ay hochers ; Guy “hat — hachey — ove uhe hybovd beween dhe Black i ancl white hat Racker They Foch — any — dystem = even if they —dov't have —petmidion to Jebr he Secor ty 4 une Sydhem but they wilh never droll money ox dornage e System ~ fiat - hackers: Bloch her frachey ase f Fh c& an unethical — hacker Qa Aecovity csacher. {hese peopte une — dydrem iMegokly Jo teal os «6d achieve uhe's oun idbegel Clovis headed on what 1's hacked: echoing faching | # swelvot® hacking’ eloovh facking eeané or f 9 Garneving in fotmah oO abort a with the — intenb Yo. hax une networh dysrem anal Nehwoth homper uth ofebations §— vbing the variuk Jools the Tenet» ne Lookup » fing ere: # website hacking? website hacking méand Unauthorized acces 4emver , dlalabse — andl | Yalaing over a web Mohe Q chonge m vhe infosmation + Comporey Mocking : 9+ bos hee unawtey zed &(eu Yo the Computer Gnd £ +e vhe Information rom fe WMbe Computex tol and fal words: H Pats word Faching? Palbwouel uhe procels af faldworsd from hacking Js Aecovering dakn hat been —alrdtady lowed decret hed M Com peters. # Email hocking: foraip hacking mean& CMO UKoss dl cageye account —_ anol vbing uhe Owner’ s an email ub wi hoot PeEmikbion ne ‘tio cael Gelen hy ia vs being mited by 2 hue number row a ie aie heft happen when dome Alecls yoo petsonal information Sait fravdl - ahi the IS yn meny ways by gathering infotmehon — fuch_—c8-_— tend achon Jorrnckon eh another person do ___ttarsacnong. Iden hy ther. this ds a i, m wnich une urchm Chiminol oy whe theif : nis position with dhe une victim such olocumenb ary mos sf Sdenthy nef: tity — Jhieves vlally feck — into CoSfokate dala de for Pergonol — xeon Had hich Aequites fort = bub with euevan Seciol ~ ogi neering Jechn'gu es. 4 Pie tect cabling: Theives faele nding do be an employ ce os a Company aves” Phone hing for —_ finoncrel informehon xe an —exomPfe J ns Mee # rai? Ande nis ig ag Fechnigue in which sexed, corel information — with Uxorsachonal don M extracted! fom She — Poblic mail boxe - hing: Thi’ 6 0 dechnigue — in which Crnoil feticining vo be — from ‘ senb Jo Q vichm with BE mer 38 widely used by the are aware y making users gek nehwor A. fot decieny Recogniging thot he inlevesr iS an extension of Society the jnievnel js mb A New wold ™m — which any thing goes bub hathey a nad olimension of wne wostol Akoond vb Acknowledging poltotah — oli fprenced: &ven when naltonal —hovnclaxies no forges apphy- Colleol hes Peck ara Jofexonte Should hemain unig Aeguires finding a wy yo ocept snot he focto® —vobvés ano norms gome nelkgens, wild wb be whe Sociel uclue fos dosines for componieé » beng 4 Good cin3en applying online ethic8, aon ving nehquette. Include « 17 Respecting NgRS Plivary fox offtine Emptogtess SrfotmeHion pouessed — by Cif zevs in Shere offline sure rachons 3 Y Moindcining — danspasency in Infodmnation etic By vahing acho 40 Ha lonhu mesg fon tosily anol quic bly ond eSiand yo.) Whot Company Jf using hers thformetion arol prottehng Them from haxm , Confonies fon pkoulde bee wilh a ca ewer snip Some thick and Chiqueties % cybeer weno Fo mahe gat popte di yahing ConvélSahion Hecy mere & Priority: Notning dé more UNor Hying Yo \ave a IM someone A heir Phone, dablep ecHonic deuce. YE hex fect}ur Who yh Cng rotec) °F — anothey- ‘enguage: Name - eliing , Cording, — expyeryi Ing , offen dive opinion 4 dhs Jere might Conceively deli heated if J woord vit ao face “4 ong one om bee ‘Phat You iatite, do nor write St. &/ Shade with Didckehion: pon! pos+ daunh Picwres, dog uke Picloses or omer Alalemen’ — aboot your private Ne onfing - one hee Imoge and diakement Gnd opfoacled Ub the inernet , they axe uhere fos ne Rebs J Ane worl! do see. ¥ Dorlt exatole omers: when 9) feels Ife gov ‘Ae being Le#/F ovb » 9b con flag Yo both negohve motions and a sense q fobt orhol. * choose friends widely: J can he isalting yo be alto peal fiom dome’Gne Socio —medlig friend HSE - ho, think before sendin g %& friend Aeuest or accepaing Qn mui fahon.

You might also like