0% found this document useful (0 votes)
19 views11 pages

Madhav Institute of Technology & Science, Gwalior

A presentation on Network & Web security

Uploaded by

itsmerakhi8940
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views11 pages

Madhav Institute of Technology & Science, Gwalior

A presentation on Network & Web security

Uploaded by

itsmerakhi8940
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

MADHAV INSTITUTE OF TECHNOLOGY & SCIENCE,

GWALIOR
(A Govt. Aided UGC Autonomous & NAAC Accredited Institute Affiliated to RGPV, Bhopal)

PRESENTED BY : PRESENTED TO :
RAKHI YADAV Dr. Murli Manohar
0901EO221049 On Subject of:
EEIOT 2nd Year, 4th Semester Network & Web Security

DEPARTMENT FOR CENTER INTERNET OF THINGS


BUSINESS

Hacker, Hacking &


its types
Contents
1. What is Hacker & Hacking
2. Motives of Hackers
3. Types of Hackers
4. Hacking Techniques
5. Most Vulnerable Devices
6. Advantages & Disadvantages
What is a Hacker?

A hacker is a person who breaks into


a computer system. The reasons for
hacking can be many:
installing malware, stealing or
destroying data, disrupting service,
and more.
Hackers are digital safecrackers who
use their computer skills to break
into restricted digital spaces, such
as networks, servers, personal
devices, online accounts, and cloud
infrastructure. Since hackers use
non-standard methods to gain entry
into computer systems, their
What is Hacking?

Hacking in cyber security refers


to the misuse of devices like
computers, smartphones,
tablets, and networks to cause
damage to or corrupt systems,
gather information on users,
steal data and documents, or
disrupt data-related activity.
Motives of Hackers
Understanding hacker motivations is key to comprehending the depth of their
actions and the damage they can cause. Let's explore some common
motivations and examine real-world examples to shed light on their
implications.
1. Cost: Financial gain serves as a primary motivator for many hackers.
By exploiting vulnerabilities in a company's systems, hackers can
access sensitive information such as credit card details, personal data,
and trade secrets.
2. Challenge: For some hackers, the thrill of overcoming security
measures and infiltrating systems serves as a primary motivation.
These individuals often target high-profile organisations, considering
their successful breach a personal triumph.
3. Hactivism: Hacktivism refers to hacking activities conducted to
promote a social or political cause. Hacktivists target companies they
perceive as unethical, often looking to expose secrets from within an
organisation.
4. Revenge: Instances of hackers seeking revenge on individuals or
organisations they feel wronged by are not uncommon. These attacks
Types of Hackers
Hackers are usually classified based on their intent, a target’s consent, and
legality but hacker definitions aren’t always black & white.
1. White Hat Hacker: White hat hackers engage in legal hacking to improve
digital security for those who contract them. They are paid to infiltrate digital
systems to identify potential security vulnerabilities and report their findings to
their clients.
2. Black Hat Hacker: Black hat hackers are cybercriminals who orchestrate
scams and exploit vulnerabilities with the intent to cause harm. The aim of
black hat hackers is usually to make money.
3. Grey Hat Hacker: Gray hats exist in an ambiguous ethical hacking area
between white and black. These hackers infiltrate systems without their
targets’ consent, but they don’t exploit vulnerabilities to cause harm.
4. Red Hat hacker: Red hat hackers see themselves as the “superheroes” of the
Types of Hacking Techniques
Today, computer and network hacks come in many forms, ranging from
elaborate SQL injection attacks to more traditional denial-of-service attacks. Some of
the most prevalent types of cyber hacking include:
1. Malware Attacks: Malicious software, also known as malware, that infects a
system and spreads without the user's knowledge or consent, damaging files,
stealing data, or gaining unauthorized access.
2. Phishing Attacks: Phishing is the fraudulent attempt to capture sensitive
information (such as passwords, login credentials, or financial data) by
pretending to be a legitimate or trustworthy entity via email, phone, or
website.
3. Brute Force Attacks: A brute force attack is a trial-and-error method threat
actors use to crack passwords or encryption keys by systematically trying
every possible combination until the correct one is found. It can be time-
consuming but is often effective against weak or simple passwords.
Most vulnerable devices to hackers
Many different devices are vulnerable to cyber hackers, but
some of the most common include:
1. Computers – Common computer systems like laptops and PCs are prime
targets for hackers due to the vast amount of personal and sensitive information
they contain, such as financial data, login credentials, and personal documents.
Computer systems are particular targets of cyber attacks on a commercial and
enterprise level, given the value of assets associated with them.
2. Mobile Devices – Mobile devices such as smartphones and tablets are also at
risk of being hacked, as they often store sensitive information, including
personal photos, messages, and emails. They can be particularly susceptible to
hackers when using public Wi-Fi and shared networks.
3. IoT Devices – Internet of Things (IoT) devices such as smart home appliances,
security cameras, and even medical devices are common targets for hackers.
These devices are often poorly secured and typically hacked to gain access to
personal information or even to control the device remotely.
4. Network Routers – Network routers, responsible for distributing Wi-Fi signals,
are often targeted by hackers. Hacked routers provide a means to gain access
to entire networks of devices, enabling hackers to access sensitive data and
valuable digital assets.
Advantages and Disadvantages of Hacking

Advantages:
1. Enhanced security: Hacking can help identify vulnerabilities in a system
or network that can be fixed to prevent malicious attacks by cybercriminals.
2. Improving systems: Ethical hacking can help organizations identify
weaknesses in their system and fix them, leading to improved security.
3. Protecting privacy: Hacking can uncover security flaws that may
compromise user privacy, and fixing these flaws can help protect user data.

Disadvantages:
4. Illegal activities: Hacking is often associated with illegal activities that
can result in legal consequences.
5. Data breaches: Hacking can result in data breaches, which can lead to
the exposure of sensitive information or financial loss.
6. Ethical concerns: Hacking raises ethical concerns, particularly in cases
where it involves intruding into someone's privacy.
Thank You

You might also like