際際滷

際際滷Share a Scribd company logo
HACKING By Nurlyana Adiela Anuar.
>Definitions< Hacker :   any programming specialist who has expertise to enter computer network unauthorized.  Hacking :   act of illegally entering a computer system, and making unauthorized changes to the files and data contain within.
>Have You been Hacked?< Discovering emails in your sent items folder that were not written nor sent by you. Finding that files have been moved, or even disappeared. Observing that desktop icons or toolbars are blank or missing.
>What Should You Do?< Shut off all connection to the internet.  It will stop the attacks so that your information will be protected. You should  have a firewall installed  in your system. Many firewalls (ex. Zonealarm) are able to maintained detail description of attempted intrusions.  Restore and enhanced a compromised system  to avoid any potential problems in your  information system.
>Ethical Hacking< Preventing intruders threats in gaining admission into a computer system. Avoiding damage on a companys system, nor steal information. Keeping information about a client  confidential when testing their security system.
>Conclusion< The outcome of hacking cyberspace is neither good nor bad, positive nor negative, constructive nor destructive. It compromises a general strategy by which to explore and manipulate the systems of rationality by which these modes of assessment become possible, function, and make sense.
>Reference< http://www.wsu.edu/~mejia1/WhatHack.html http://www.bama.ua.edu/~wilso098/project/sources.html
THE END

More Related Content

What's hot (18)

WE16 - Defense in Depth: Top 10 Critical Security Controls
WE16 - Defense in Depth: Top 10 Critical Security ControlsWE16 - Defense in Depth: Top 10 Critical Security Controls
WE16 - Defense in Depth: Top 10 Critical Security Controls
Society of Women Engineers
Hackers
HackersHackers
Hackers
ohHELLOmynameisTOMMY
Network basic security
Network basic  securityNetwork basic  security
Network basic security
Mohamed Radji
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
Kevin Fream
Hacker
HackerHacker
Hacker
ezairy
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
hassanmughal4u
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
Faith Zeller
7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked
Cyware
Adult Internet Safety
Adult Internet SafetyAdult Internet Safety
Adult Internet Safety
reidcollins42
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
Dushyant Singh
Profile securitarian
Profile   securitarianProfile   securitarian
Profile securitarian
Rupesh Verma
Network Situational Awareness using Tripwire IP360
Network Situational Awareness using Tripwire IP360Network Situational Awareness using Tripwire IP360
Network Situational Awareness using Tripwire IP360
Tripwire
Security Measures
Security MeasuresSecurity Measures
Security Measures
hanna91
Network security
Network securityNetwork security
Network security
Jasleen Kaur (Chandigarh University)
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smart
Kanha Sahu
Understanding Keylogger
Understanding KeyloggerUnderstanding Keylogger
Understanding Keylogger
Phannarith Ou, G-CISO
Device security Tips
Device security TipsDevice security Tips
Device security Tips
kanika sharma
Network Security
Network SecurityNetwork Security
Network Security
Fatima Zohra BENHACINE
WE16 - Defense in Depth: Top 10 Critical Security Controls
WE16 - Defense in Depth: Top 10 Critical Security ControlsWE16 - Defense in Depth: Top 10 Critical Security Controls
WE16 - Defense in Depth: Top 10 Critical Security Controls
Society of Women Engineers
Network basic security
Network basic  securityNetwork basic  security
Network basic security
Mohamed Radji
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
Kevin Fream
Hacker
HackerHacker
Hacker
ezairy
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
hassanmughal4u
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
Faith Zeller
7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked
Cyware
Adult Internet Safety
Adult Internet SafetyAdult Internet Safety
Adult Internet Safety
reidcollins42
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
Dushyant Singh
Profile securitarian
Profile   securitarianProfile   securitarian
Profile securitarian
Rupesh Verma
Network Situational Awareness using Tripwire IP360
Network Situational Awareness using Tripwire IP360Network Situational Awareness using Tripwire IP360
Network Situational Awareness using Tripwire IP360
Tripwire
Security Measures
Security MeasuresSecurity Measures
Security Measures
hanna91
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smart
Kanha Sahu
Device security Tips
Device security TipsDevice security Tips
Device security Tips
kanika sharma

Similar to Hacking (20)

VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notes
Jayanth Dwijesh H P
Hacking 1
Hacking 1Hacking 1
Hacking 1
sonal bisla
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
Aiman
AimanAiman
Aiman
Aimanz
Dos and Dont to be followed to protect information and technology
Dos and Dont to be followed  to protect information and technologyDos and Dont to be followed  to protect information and technology
Dos and Dont to be followed to protect information and technology
ssuser3baba2
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
Jeanie Arnoco
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
Adebisi Tolulope
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
Uditha Bandara Wijerathna
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
eiramespi07
User security awareness
User security awarenessUser security awareness
User security awareness
K. A. M Lutfullah
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
Sweta Kumari Barnwal
Information security
Information securityInformation security
Information security
Shanthamallachar D B
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinal
mordannon
Advanced Internet Final
Advanced Internet FinalAdvanced Internet Final
Advanced Internet Final
mordannon
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
Art Ocain
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
Sweta Kumari Barnwal
Computer security
Computer securityComputer security
Computer security
Kawsar Ahmed
Information Technology Threat
Information Technology ThreatInformation Technology Threat
Information Technology Threat
Bilhami
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
mrmwood
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notes
Jayanth Dwijesh H P
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
Aiman
AimanAiman
Aiman
Aimanz
Dos and Dont to be followed to protect information and technology
Dos and Dont to be followed  to protect information and technologyDos and Dont to be followed  to protect information and technology
Dos and Dont to be followed to protect information and technology
ssuser3baba2
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
Jeanie Arnoco
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
Uditha Bandara Wijerathna
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
eiramespi07
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinal
mordannon
Advanced Internet Final
Advanced Internet FinalAdvanced Internet Final
Advanced Internet Final
mordannon
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
Art Ocain
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
Sweta Kumari Barnwal
Computer security
Computer securityComputer security
Computer security
Kawsar Ahmed
Information Technology Threat
Information Technology ThreatInformation Technology Threat
Information Technology Threat
Bilhami
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
mrmwood

Recently uploaded (20)

Oracle Cloud Infrastructure Generative AI Professional
Oracle Cloud Infrastructure Generative AI ProfessionalOracle Cloud Infrastructure Generative AI Professional
Oracle Cloud Infrastructure Generative AI Professional
VICTOR MAESTRE RAMIREZ
Intro際際滷s-May-BuildWithAi-EarthEngine.pdf
Intro際際滷s-May-BuildWithAi-EarthEngine.pdfIntro際際滷s-May-BuildWithAi-EarthEngine.pdf
Intro際際滷s-May-BuildWithAi-EarthEngine.pdf
Luiz Carneiro
Jeremy Millul - A Talented Software Developer
Jeremy Millul - A Talented Software DeveloperJeremy Millul - A Talented Software Developer
Jeremy Millul - A Talented Software Developer
Jeremy Millul
End-to-end Assurance for SD-WAN & SASE with ThousandEyes
End-to-end Assurance for SD-WAN & SASE with ThousandEyesEnd-to-end Assurance for SD-WAN & SASE with ThousandEyes
End-to-end Assurance for SD-WAN & SASE with ThousandEyes
ThousandEyes
Azure vs AWS Which Cloud Platform Is Best for Your Business in 2025
Azure vs AWS  Which Cloud Platform Is Best for Your Business in 2025Azure vs AWS  Which Cloud Platform Is Best for Your Business in 2025
Azure vs AWS Which Cloud Platform Is Best for Your Business in 2025
Infrassist Technologies Pvt. Ltd.
7 Salesforce Data Cloud Best Practices.pdf
7 Salesforce Data Cloud Best Practices.pdf7 Salesforce Data Cloud Best Practices.pdf
7 Salesforce Data Cloud Best Practices.pdf
Minuscule Technologies
Palo Alto Networks Cybersecurity Foundation
Palo Alto Networks Cybersecurity FoundationPalo Alto Networks Cybersecurity Foundation
Palo Alto Networks Cybersecurity Foundation
VICTOR MAESTRE RAMIREZ
Cybersecurity Fundamentals: Apprentice - Palo Alto Certificate
Cybersecurity Fundamentals: Apprentice - Palo Alto CertificateCybersecurity Fundamentals: Apprentice - Palo Alto Certificate
Cybersecurity Fundamentals: Apprentice - Palo Alto Certificate
VICTOR MAESTRE RAMIREZ
Compliance-as-a-Service document pdf text
Compliance-as-a-Service document pdf textCompliance-as-a-Service document pdf text
Compliance-as-a-Service document pdf text
Earthling security
Data Virtualization: Bringing the Power of FME to Any Application
Data Virtualization: Bringing the Power of FME to Any ApplicationData Virtualization: Bringing the Power of FME to Any Application
Data Virtualization: Bringing the Power of FME to Any Application
Safe Software
Evaluation Challenges in Using Generative AI for Science & Technical Content
Evaluation Challenges in Using Generative AI for Science & Technical ContentEvaluation Challenges in Using Generative AI for Science & Technical Content
Evaluation Challenges in Using Generative AI for Science & Technical Content
Paul Groth
MCP vs A2A vs ACP: Choosing the Right Protocol | Bluebash
MCP vs A2A vs ACP: Choosing the Right Protocol | BluebashMCP vs A2A vs ACP: Choosing the Right Protocol | Bluebash
MCP vs A2A vs ACP: Choosing the Right Protocol | Bluebash
Bluebash
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
Jasper Oosterveld
DevOps in the Modern Era - Thoughtfully Critical Podcast
DevOps in the Modern Era - Thoughtfully Critical PodcastDevOps in the Modern Era - Thoughtfully Critical Podcast
DevOps in the Modern Era - Thoughtfully Critical Podcast
Chris Wahl
Domino IQ Was Sie erwartet, erste Schritte und Anwendungsf辰lle
Domino IQ  Was Sie erwartet, erste Schritte und Anwendungsf辰lleDomino IQ  Was Sie erwartet, erste Schritte und Anwendungsf辰lle
Domino IQ Was Sie erwartet, erste Schritte und Anwendungsf辰lle
panagenda
Mark Zuckerberg teams up with frenemy Palmer Luckey to shape the future of XR...
Mark Zuckerberg teams up with frenemy Palmer Luckey to shape the future of XR...Mark Zuckerberg teams up with frenemy Palmer Luckey to shape the future of XR...
Mark Zuckerberg teams up with frenemy Palmer Luckey to shape the future of XR...
Scott M. Graffius
Introduction to Internet of things .ppt.
Introduction to Internet of things .ppt.Introduction to Internet of things .ppt.
Introduction to Internet of things .ppt.
hok12341073
Jira Administration Training Day 1 : Introduction
Jira Administration Training  Day 1 : IntroductionJira Administration Training  Day 1 : Introduction
Jira Administration Training Day 1 : Introduction
Ravi Teja
How Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdf
How Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdfHow Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdf
How Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdf
Rejig Digital
Establish Visibility and Manage Risk in the Supply Chain with Anchore SBOM
Establish Visibility and Manage Risk in the Supply Chain with Anchore SBOMEstablish Visibility and Manage Risk in the Supply Chain with Anchore SBOM
Establish Visibility and Manage Risk in the Supply Chain with Anchore SBOM
Anchore
Oracle Cloud Infrastructure Generative AI Professional
Oracle Cloud Infrastructure Generative AI ProfessionalOracle Cloud Infrastructure Generative AI Professional
Oracle Cloud Infrastructure Generative AI Professional
VICTOR MAESTRE RAMIREZ
Intro際際滷s-May-BuildWithAi-EarthEngine.pdf
Intro際際滷s-May-BuildWithAi-EarthEngine.pdfIntro際際滷s-May-BuildWithAi-EarthEngine.pdf
Intro際際滷s-May-BuildWithAi-EarthEngine.pdf
Luiz Carneiro
Jeremy Millul - A Talented Software Developer
Jeremy Millul - A Talented Software DeveloperJeremy Millul - A Talented Software Developer
Jeremy Millul - A Talented Software Developer
Jeremy Millul
End-to-end Assurance for SD-WAN & SASE with ThousandEyes
End-to-end Assurance for SD-WAN & SASE with ThousandEyesEnd-to-end Assurance for SD-WAN & SASE with ThousandEyes
End-to-end Assurance for SD-WAN & SASE with ThousandEyes
ThousandEyes
Azure vs AWS Which Cloud Platform Is Best for Your Business in 2025
Azure vs AWS  Which Cloud Platform Is Best for Your Business in 2025Azure vs AWS  Which Cloud Platform Is Best for Your Business in 2025
Azure vs AWS Which Cloud Platform Is Best for Your Business in 2025
Infrassist Technologies Pvt. Ltd.
7 Salesforce Data Cloud Best Practices.pdf
7 Salesforce Data Cloud Best Practices.pdf7 Salesforce Data Cloud Best Practices.pdf
7 Salesforce Data Cloud Best Practices.pdf
Minuscule Technologies
Palo Alto Networks Cybersecurity Foundation
Palo Alto Networks Cybersecurity FoundationPalo Alto Networks Cybersecurity Foundation
Palo Alto Networks Cybersecurity Foundation
VICTOR MAESTRE RAMIREZ
Cybersecurity Fundamentals: Apprentice - Palo Alto Certificate
Cybersecurity Fundamentals: Apprentice - Palo Alto CertificateCybersecurity Fundamentals: Apprentice - Palo Alto Certificate
Cybersecurity Fundamentals: Apprentice - Palo Alto Certificate
VICTOR MAESTRE RAMIREZ
Compliance-as-a-Service document pdf text
Compliance-as-a-Service document pdf textCompliance-as-a-Service document pdf text
Compliance-as-a-Service document pdf text
Earthling security
Data Virtualization: Bringing the Power of FME to Any Application
Data Virtualization: Bringing the Power of FME to Any ApplicationData Virtualization: Bringing the Power of FME to Any Application
Data Virtualization: Bringing the Power of FME to Any Application
Safe Software
Evaluation Challenges in Using Generative AI for Science & Technical Content
Evaluation Challenges in Using Generative AI for Science & Technical ContentEvaluation Challenges in Using Generative AI for Science & Technical Content
Evaluation Challenges in Using Generative AI for Science & Technical Content
Paul Groth
MCP vs A2A vs ACP: Choosing the Right Protocol | Bluebash
MCP vs A2A vs ACP: Choosing the Right Protocol | BluebashMCP vs A2A vs ACP: Choosing the Right Protocol | Bluebash
MCP vs A2A vs ACP: Choosing the Right Protocol | Bluebash
Bluebash
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
Jasper Oosterveld
DevOps in the Modern Era - Thoughtfully Critical Podcast
DevOps in the Modern Era - Thoughtfully Critical PodcastDevOps in the Modern Era - Thoughtfully Critical Podcast
DevOps in the Modern Era - Thoughtfully Critical Podcast
Chris Wahl
Domino IQ Was Sie erwartet, erste Schritte und Anwendungsf辰lle
Domino IQ  Was Sie erwartet, erste Schritte und Anwendungsf辰lleDomino IQ  Was Sie erwartet, erste Schritte und Anwendungsf辰lle
Domino IQ Was Sie erwartet, erste Schritte und Anwendungsf辰lle
panagenda
Mark Zuckerberg teams up with frenemy Palmer Luckey to shape the future of XR...
Mark Zuckerberg teams up with frenemy Palmer Luckey to shape the future of XR...Mark Zuckerberg teams up with frenemy Palmer Luckey to shape the future of XR...
Mark Zuckerberg teams up with frenemy Palmer Luckey to shape the future of XR...
Scott M. Graffius
Introduction to Internet of things .ppt.
Introduction to Internet of things .ppt.Introduction to Internet of things .ppt.
Introduction to Internet of things .ppt.
hok12341073
Jira Administration Training Day 1 : Introduction
Jira Administration Training  Day 1 : IntroductionJira Administration Training  Day 1 : Introduction
Jira Administration Training Day 1 : Introduction
Ravi Teja
How Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdf
How Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdfHow Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdf
How Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdf
Rejig Digital
Establish Visibility and Manage Risk in the Supply Chain with Anchore SBOM
Establish Visibility and Manage Risk in the Supply Chain with Anchore SBOMEstablish Visibility and Manage Risk in the Supply Chain with Anchore SBOM
Establish Visibility and Manage Risk in the Supply Chain with Anchore SBOM
Anchore

Hacking

  • 1. HACKING By Nurlyana Adiela Anuar.
  • 2. >Definitions< Hacker : any programming specialist who has expertise to enter computer network unauthorized. Hacking : act of illegally entering a computer system, and making unauthorized changes to the files and data contain within.
  • 3. >Have You been Hacked?< Discovering emails in your sent items folder that were not written nor sent by you. Finding that files have been moved, or even disappeared. Observing that desktop icons or toolbars are blank or missing.
  • 4. >What Should You Do?< Shut off all connection to the internet. It will stop the attacks so that your information will be protected. You should have a firewall installed in your system. Many firewalls (ex. Zonealarm) are able to maintained detail description of attempted intrusions. Restore and enhanced a compromised system to avoid any potential problems in your information system.
  • 5. >Ethical Hacking< Preventing intruders threats in gaining admission into a computer system. Avoiding damage on a companys system, nor steal information. Keeping information about a client confidential when testing their security system.
  • 6. >Conclusion< The outcome of hacking cyberspace is neither good nor bad, positive nor negative, constructive nor destructive. It compromises a general strategy by which to explore and manipulate the systems of rationality by which these modes of assessment become possible, function, and make sense.