120 likes | 834 Views
LOCATE AND PRESENT INFORMATION ON IMPACT OF ICT ON SOCIETY. HACKING. NAME : FATINATUL NAZURAH BINTI ZAINUDDIN NO I/C : 950610-10-5862. CONTENT. TOPIC 1 CONTENT 2 INTRODUCTION 3 WHAT IS COMPUTER HACKING 4 HACKING SOFTWARE 5 ETHICAL HACKING 6
E N D
LOCATE AND PRESENT INFORMATION ON IMPACT OF ICT ON SOCIETY HACKING NAME : FATINATUL NAZURAH BINTI ZAINUDDIN NO I/C : 950610-10-5862
CONTENT TOPIC 1 CONTENT 2 INTRODUCTION 3 WHAT IS COMPUTER HACKING 4 HACKING SOFTWARE 5 ETHICAL HACKING 6 EFFECTS OF COMPUTER HACKING 7 HACKING A COMPUTER 8 CONCLUSION 9 SOURCE OF REFERENCE 10
INTRODUCTION • Unlike most computer crime / misuse areas which are clear cut in terms of actions and legalities (e.g. softwarepiracy), computer hacking is more difficult to define. • Computer hacking always involves some degree of infringement on the privacy of others or damage to computer-based property such as files, web pages or software. • The impact of computer hacking varies from simply being simply invasive and annoying to illegal. • 1
WHAT IS COMPUTER HACKING • Computerhacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. • People who engage in computer hacking activities are often called hackers. • 2
HACKING SOFTWARE • Some computer hackers are so good they can crack very detailed codes and information on there own. • Most rely on various types of software though that install worms, Trojan horses, and viruses into systems. • They use these types of programs to help them gain access to the information they want. • It is scary to learn that there are so many different types of hacking software on the market. • 3
ETHICAL HACKING • Ethical hacking is the process of trying to break down a system to identify its weaknesses. • That information is then used to continually build more advanced systems. • Many businesses and even the government are looking for people with such skills. • 4
EFFECTS OF COMPUTER HACKING • Computer hacking is a breach of computer security. • It can expose sensitive user data and risk user privacy. • Hacking activities expose confidential user information like personal details, social security numbers, credit card numbers, bank account data and personal photographs. • 5
HACKING A COMPUTER • Crackers transform computers into zombies by using small programs that exploit weaknesses in a computer's operating system (OS). • You might think that these crackers are cutting-edge Internet criminal masterminds, but in truth, many have little to no programming experience or knowledge. • 6
CONCLUSION • The word "hacker" carries weight. • People strongly disagree as to what a hacker is. • Hacking may be defined as legal or illegal, ethical or unethical. • The conflict between discourses is important for our understanding of computer hacking subculture. • 7
SOURCE OF REFERENCE wikipedia.org/wiki/Hacking_(computing) www.wisegeek.com/what-is-computer hacking.htm www.ethicalhacking.net/computer hacking
GROUP MEMBERS • FATINATUL NAZURAH • NOOR INSYIRA • MARIAH IZZATI • NURUL FATIN NAJWA