SlideShare a Scribd company logo
1 of 20
Hackers!
 Hacker (Cracker) word that describe person who
have special skills in the field of computer and
information security.
 Hacking means that a set of clever programmers
who challenge the different systems and try to
storm it and not necessarily to commit a crime ,
but their success in penetration is considered a
success for their abilities and skills.
 Many companies like Microsoft needs to protect
their systems so they found the best method to
protect their system is to hire hackers with high
salaries their mission is attempt to penetrate
their different systems and find the points of
weakness and try to fix these problems
The law considered outsiders who enter the default
place should not be in it. And to do this optional
process in which the programmer tested his
abilities without knowing his real name or declare
himself. But some of them are exploited by
criminal who clear information and others are
commercially exploited for the purposes of spying
and to steal some money.
the classification of hackers
morally
 1: White hat hacker :a computer hackers intending
to improve computer security
 2: Black hat hacker: a computer hackers intending
to storm the computer or Internet security for
illegal personal gain
 3: Grey hat hacker: a computer hackers lies
between a black hat and a white hat hacker
Hacker attack techniques
 Hacker have many attack techniques but the most
common technique: is by using Trojan horses and
this technique mostly used when hackers need to
storm a personal computer
 example shows you how Trojan technique works :
 if you will download a program but this program
have virus
 this virus will open a hidden secret hole through
your computer firewall when the virus reached to
your computer it will delete any information or it
will harm the host computer systems their is a
ratio 50% if you will scan your computer by using
antivirus and you have many viruses in your
computer you will find Trojan horse virus at your
computer
Sony attacked by North Korea
 Five months ago, hackers sneaked to the
computer network of Sony Pictures
entertainment
 The attackers stole a large number of secret
documents, which is currently being loaded (in the
first place by journalists) from file-sharing
networks
 It is believed widely hackers to be supported by
the government of North Korea
 which is angry at Sony to produce the interview, a
film which describe the assassination
of North Korean leader Kim jong-un. the threat of
terrorism against the movie theaters offer caused
Sony to cancel the planned release of her
Christmas Day holiday.
 on Monday, November 24th Sony discovered that
their own company's network has been hacked.
 The attackers took terabytes of data, delete the
original copies of Sony computers, leaving the
threat to release the information messages if Sony
did not respond to the demands of the strikers
 . this image, shows the message that appeared on
the computer screens at Sony companies
Lizard squad
 lizard squad is a black hat hacking group !
 They attacked facebook before but facebook
denied it was hacked and said that the access issues
earlier were "not the result of a third party attack“.
so Lizard Squad stated that it was responsible for
the site, and Instagram going down.
Security breach in Microsoft and
Sony system
 Lizard Squad also claimed to be behind a series
hacks of Microsoft and Sony gaming networks over
Christmas as well.
 lizard squad made their own channel in Sony and
Microsoft servers
 A hacker claiming to be from Lizard Squad - a 22-
year-old calling himself Member Two - said the
group had hacked the sites "because we can“.
 He also suggested the motive was to demonstrate
weaknesses in the Microsoft and Sony systems.
"It's just such a huge company Microsoft... Do you
not think they should be able to prevent such an
attack?"
 he told BBC Radio !
 "Is Christmas really about children playing with
their new consoles, or playing with their new toys,
or is it about them spending time with their
families and celebrating Christmas?" he added. "I
think everyone's just taking it all out of the
ordinary and Microsoft will receive a wonderful
Christmas present from us
 The name Lizard Squad is generally used as a
signature on a site that the group has taken
responsibility for hacking and they left their
signature after hacking the websites or software
Lizard squad pictureLizard squad signature

More Related Content

What's hot

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 

What's hot (20)

Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
 
Hacking
HackingHacking
Hacking
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Hacking
Hacking Hacking
Hacking
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 

Viewers also liked

Chap ii.BCD code,Gray code
Chap ii.BCD code,Gray codeChap ii.BCD code,Gray code
Chap ii.BCD code,Gray code
Bala Ganesh
 

Viewers also liked (14)

Hacking
Hacking Hacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
EVALUACIÓN
EVALUACIÓNEVALUACIÓN
EVALUACIÓN
 
Cookies and Session
Cookies and SessionCookies and Session
Cookies and Session
 
Chap ii.BCD code,Gray code
Chap ii.BCD code,Gray codeChap ii.BCD code,Gray code
Chap ii.BCD code,Gray code
 
Hacker&cracker
Hacker&crackerHacker&cracker
Hacker&cracker
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Hackers ESP
Hackers ESPHackers ESP
Hackers ESP
 
Ipv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparisonIpv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparison
 
IPv4 and IPv6
IPv4 and IPv6IPv4 and IPv6
IPv4 and IPv6
 

Similar to Hackers

Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...
Mahmoud Saeed
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
PavanKumarSurala
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
ravikanthh
 

Similar to Hackers (20)

Hacker !
Hacker !Hacker !
Hacker !
 
Hacker !
Hacker !Hacker !
Hacker !
 
Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
File000145
File000145File000145
File000145
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 
Presentation
PresentationPresentation
Presentation
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crime
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Hackers

  • 2.  Hacker (Cracker) word that describe person who have special skills in the field of computer and information security.  Hacking means that a set of clever programmers who challenge the different systems and try to storm it and not necessarily to commit a crime , but their success in penetration is considered a success for their abilities and skills.
  • 3.  Many companies like Microsoft needs to protect their systems so they found the best method to protect their system is to hire hackers with high salaries their mission is attempt to penetrate their different systems and find the points of weakness and try to fix these problems
  • 4. The law considered outsiders who enter the default place should not be in it. And to do this optional process in which the programmer tested his abilities without knowing his real name or declare himself. But some of them are exploited by criminal who clear information and others are commercially exploited for the purposes of spying and to steal some money.
  • 5. the classification of hackers morally  1: White hat hacker :a computer hackers intending to improve computer security  2: Black hat hacker: a computer hackers intending to storm the computer or Internet security for illegal personal gain  3: Grey hat hacker: a computer hackers lies between a black hat and a white hat hacker
  • 6. Hacker attack techniques  Hacker have many attack techniques but the most common technique: is by using Trojan horses and this technique mostly used when hackers need to storm a personal computer  example shows you how Trojan technique works :  if you will download a program but this program have virus
  • 7.  this virus will open a hidden secret hole through your computer firewall when the virus reached to your computer it will delete any information or it will harm the host computer systems their is a ratio 50% if you will scan your computer by using antivirus and you have many viruses in your computer you will find Trojan horse virus at your computer
  • 8. Sony attacked by North Korea  Five months ago, hackers sneaked to the computer network of Sony Pictures entertainment  The attackers stole a large number of secret documents, which is currently being loaded (in the first place by journalists) from file-sharing networks  It is believed widely hackers to be supported by the government of North Korea
  • 9.  which is angry at Sony to produce the interview, a film which describe the assassination of North Korean leader Kim jong-un. the threat of terrorism against the movie theaters offer caused Sony to cancel the planned release of her Christmas Day holiday.
  • 10.
  • 11.  on Monday, November 24th Sony discovered that their own company's network has been hacked.  The attackers took terabytes of data, delete the original copies of Sony computers, leaving the threat to release the information messages if Sony did not respond to the demands of the strikers  . this image, shows the message that appeared on the computer screens at Sony companies
  • 12.
  • 13. Lizard squad  lizard squad is a black hat hacking group !  They attacked facebook before but facebook denied it was hacked and said that the access issues earlier were "not the result of a third party attack“. so Lizard Squad stated that it was responsible for the site, and Instagram going down.
  • 14.
  • 15. Security breach in Microsoft and Sony system  Lizard Squad also claimed to be behind a series hacks of Microsoft and Sony gaming networks over Christmas as well.  lizard squad made their own channel in Sony and Microsoft servers
  • 16.
  • 17.  A hacker claiming to be from Lizard Squad - a 22- year-old calling himself Member Two - said the group had hacked the sites "because we can“.  He also suggested the motive was to demonstrate weaknesses in the Microsoft and Sony systems. "It's just such a huge company Microsoft... Do you not think they should be able to prevent such an attack?"  he told BBC Radio !
  • 18.  "Is Christmas really about children playing with their new consoles, or playing with their new toys, or is it about them spending time with their families and celebrating Christmas?" he added. "I think everyone's just taking it all out of the ordinary and Microsoft will receive a wonderful Christmas present from us
  • 19.  The name Lizard Squad is generally used as a signature on a site that the group has taken responsibility for hacking and they left their signature after hacking the websites or software
  • 20. Lizard squad pictureLizard squad signature