際際滷

際際滷Share a Scribd company logo
What is Hacking and its
terms
Who is Hacker?
Hacker is a person who find weakness in computer
systems or networks to exploit its weaknesses to gain
access.
 Hacker is a person who think outside the box
 Hacker is a person who have lot of knowledge about
computer as compare to any developer.
 All hacker are not criminals it depends on their work.
What is Hacking?
Hacking is identifying weakness in computer systems or
networks to exploit its weaknesses to gain access.
 Example of Hacking: Using password cracking algorithm
to gain access to a system
 Hacking refers to activities that seek to compromise
digital devices, such as computers, smartphones, tablets,
and even entire networks. And while hacking might not
always be for malicious purposes, nowadays most
references to hacking, and hackers, characterize it/them
as unlawful activity by cybercriminalsmotivated by
financial gain, protest, information gathering (spying),
and even just for the fun of the challenge..
What is Ethical Hacking?
Ethical Hacking is identifying weakness in computer
systems and/or computer networks and coming with
countermeasures that protect the weaknesses. Ethical
hackers must abide by the following rules.
Get written permission from the owner of the computer
system and/or computer network before hacking.
Protect the privacy of the organization been hacked.
Transparently report all the identified weaknesses in the
computer system to the organization.
Inform hardware and software vendors of the identified
weaknesses
Why Ethical Hacking?
Information is one of the most valuable assets of an
organization. Keeping information secure can protect an
organizations image and save an organization a lot of
money.
Hacking can lead to loss of business for organizations
that deal in finance such as PayPal. Ethical hacking puts
them a step ahead of the cyber criminals who would
otherwise lead to loss of business.
Can Hacking is legal or not?
It depends on hacker work.
Hacking is not a crime if you have all permission for
hack a particular computer or network.
Hacking is a beautiful art that cant have by everyone
So hacking is a legal if you hack our own computer
or network
Thanks
If you interested in Ethical hacking, web development
then contact me I teach you at lowest price as
possible. All classes are online held at skype etc.
Contact No: 8195059899
(Kunal Verma)

More Related Content

What's hot (20)

HACKING
HACKINGHACKING
HACKING
D's Surti
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
talhaabid
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
Esteban
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical Hacking
Nitish Kasar
Computer and Internet hacking
Computer and Internet hackingComputer and Internet hacking
Computer and Internet hacking
Hariharan Sivadasan
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
Rasheed Ur Rehman
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
Rashed Sayyed
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st ModuleBasic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Module
ankit sarode
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Akshay Kale
Etical hacking
Etical hackingEtical hacking
Etical hacking
talhaabid
Introduction to hackers
Introduction to hackersIntroduction to hackers
Introduction to hackers
Harsh Sharma
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
jeshin jose
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
Farwa Ansari
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
SVishnupriya5
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
DEEPIKA WALIA
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
vishakha bhagwat
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
RamchandraRegmi
ethical hacking
ethical hackingethical hacking
ethical hacking
Neelima Bawa
Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyay
Chandra Prakash
Hacking
Hacking Hacking
Hacking
Farkhanda Kiran
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
talhaabid
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
Esteban
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical Hacking
Nitish Kasar
Computer and Internet hacking
Computer and Internet hackingComputer and Internet hacking
Computer and Internet hacking
Hariharan Sivadasan
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
Rasheed Ur Rehman
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st ModuleBasic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Module
ankit sarode
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Akshay Kale
Etical hacking
Etical hackingEtical hacking
Etical hacking
talhaabid
Introduction to hackers
Introduction to hackersIntroduction to hackers
Introduction to hackers
Harsh Sharma
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
jeshin jose
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
Farwa Ansari
ethical hacking
ethical hackingethical hacking
ethical hacking
Neelima Bawa
Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyay
Chandra Prakash

Similar to Hacking and its terms (20)

What Is Hacking
What Is HackingWhat Is Hacking
What Is Hacking
ritik shukla
Hacking
HackingHacking
Hacking
ritik shukla
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
ambemPrashanthi
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptx
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptxUnderstanding Hackers: Types, Techniques, and Prevention Strategies.pptx
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptx
Sunipa Bera
Hacking
HackingHacking
Hacking
VipinYadav257
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
Ethical Hacking (basics)
Ethical Hacking (basics)Ethical Hacking (basics)
Ethical Hacking (basics)
DeepHaria4
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
Jeanie Arnoco
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
ankit gandharkar
Hacking
HackingHacking
Hacking
Ranjan Som
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
baabtra.com - No. 1 supplier of quality freshers
Cyber hacking dev days by aes team
Cyber hacking dev days by aes teamCyber hacking dev days by aes team
Cyber hacking dev days by aes team
ABIN VARGHESE
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Chetanmalviya8
ethical hacking
ethical hackingethical hacking
ethical hacking
samprada123
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
Aarush59
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
Waseem Rauf
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
dhirujapla
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
Nargis Parveen
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
Institute of Information Security (IIS)
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Aryan Saxena
What Is Hacking
What Is HackingWhat Is Hacking
What Is Hacking
ritik shukla
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptx
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptxUnderstanding Hackers: Types, Techniques, and Prevention Strategies.pptx
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptx
Sunipa Bera
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
Ethical Hacking (basics)
Ethical Hacking (basics)Ethical Hacking (basics)
Ethical Hacking (basics)
DeepHaria4
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
Jeanie Arnoco
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
ankit gandharkar
Cyber hacking dev days by aes team
Cyber hacking dev days by aes teamCyber hacking dev days by aes team
Cyber hacking dev days by aes team
ABIN VARGHESE
ethical hacking
ethical hackingethical hacking
ethical hacking
samprada123
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
Aarush59
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
Waseem Rauf
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
dhirujapla
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
Nargis Parveen
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Aryan Saxena

Recently uploaded (20)

MIPLM subject matter expert Sascha Kamhuber
MIPLM subject matter expert Sascha KamhuberMIPLM subject matter expert Sascha Kamhuber
MIPLM subject matter expert Sascha Kamhuber
MIPLM
EDL 290F Week 5 - Facing Headwinds and Hairpin Turns (2025).pdf
EDL 290F Week 5  - Facing Headwinds and Hairpin Turns (2025).pdfEDL 290F Week 5  - Facing Headwinds and Hairpin Turns (2025).pdf
EDL 290F Week 5 - Facing Headwinds and Hairpin Turns (2025).pdf
Liz Walsh-Trevino
Yale VMOC Special Report - Measles Outbreak Southwest US 3-26-2025 FINAL.pptx
Yale VMOC  Special Report - Measles Outbreak  Southwest US 3-26-2025  FINAL.pptxYale VMOC  Special Report - Measles Outbreak  Southwest US 3-26-2025  FINAL.pptx
Yale VMOC Special Report - Measles Outbreak Southwest US 3-26-2025 FINAL.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
The basics of sentences session 9pptx.pptx
The basics of sentences session 9pptx.pptxThe basics of sentences session 9pptx.pptx
The basics of sentences session 9pptx.pptx
heathfieldcps1
URLS and routing in odoo 18 - Odoo 際際滷s
URLS and routing in odoo 18 - Odoo 際際滷sURLS and routing in odoo 18 - Odoo 際際滷s
URLS and routing in odoo 18 - Odoo 際際滷s
Celine George
DUODENUM ANATOMY & Clinical Anatomy.pptx
DUODENUM ANATOMY & Clinical Anatomy.pptxDUODENUM ANATOMY & Clinical Anatomy.pptx
DUODENUM ANATOMY & Clinical Anatomy.pptx
Sid Roy
Urinary Tract Infection & Sexually Transmt ted Diseases.pptx
Urinary Tract Infection & Sexually Transmt ted Diseases.pptxUrinary Tract Infection & Sexually Transmt ted Diseases.pptx
Urinary Tract Infection & Sexually Transmt ted Diseases.pptx
Ashish Umale
How to Configure Outgoing and Incoming mail servers in Odoo 18
How to Configure Outgoing and Incoming mail servers in Odoo 18How to Configure Outgoing and Incoming mail servers in Odoo 18
How to Configure Outgoing and Incoming mail servers in Odoo 18
Celine George
S. Y. G. N. M. CHILD HEALTH NURSING Leukemia in Children.pptx
S. Y. G. N. M. CHILD HEALTH NURSING Leukemia in Children.pptxS. Y. G. N. M. CHILD HEALTH NURSING Leukemia in Children.pptx
S. Y. G. N. M. CHILD HEALTH NURSING Leukemia in Children.pptx
sachin7989
UTI Quinolones by Mrs. Manjushri Dabhade
UTI Quinolones by Mrs. Manjushri DabhadeUTI Quinolones by Mrs. Manjushri Dabhade
UTI Quinolones by Mrs. Manjushri Dabhade
Dabhade madam Dabhade
2025 Women Leaders Program - Award Winning
2025 Women Leaders Program  - Award Winning2025 Women Leaders Program  - Award Winning
2025 Women Leaders Program - Award Winning
Sonia McDonald
MIPLM subject matter expert Nicos Raftis
MIPLM subject matter expert Nicos RaftisMIPLM subject matter expert Nicos Raftis
MIPLM subject matter expert Nicos Raftis
MIPLM
How to Grant Discounts in Sale Order Lines in Odoo 18 Sales
How to Grant Discounts in Sale Order Lines in Odoo 18 SalesHow to Grant Discounts in Sale Order Lines in Odoo 18 Sales
How to Grant Discounts in Sale Order Lines in Odoo 18 Sales
Celine George
Unit 3: Combustion in Spark Ignition Engines
Unit 3: Combustion in Spark Ignition EnginesUnit 3: Combustion in Spark Ignition Engines
Unit 3: Combustion in Spark Ignition Engines
NileshKumbhar21
Karin Clavel - Collection Wall: Inspiring connection and collaboration
Karin Clavel - Collection Wall: Inspiring connection and collaborationKarin Clavel - Collection Wall: Inspiring connection and collaboration
Karin Clavel - Collection Wall: Inspiring connection and collaboration
voginip
Celine Caira presents at Women girls and AI Paving the way to a balanced digi...
Celine Caira presents at Women girls and AI Paving the way to a balanced digi...Celine Caira presents at Women girls and AI Paving the way to a balanced digi...
Celine Caira presents at Women girls and AI Paving the way to a balanced digi...
EduSkills OECD
Anti-Viral Agents.pptx Medicinal Chemistry III, B Pharm SEM VI
Anti-Viral Agents.pptx Medicinal Chemistry III, B Pharm SEM VIAnti-Viral Agents.pptx Medicinal Chemistry III, B Pharm SEM VI
Anti-Viral Agents.pptx Medicinal Chemistry III, B Pharm SEM VI
Samruddhi Khonde
Marketing is Everything in the Beauty Business! 憓 Talent gets you in the ...
 Marketing is Everything in the Beauty Business! 憓 Talent gets you in the ... Marketing is Everything in the Beauty Business! 憓 Talent gets you in the ...
Marketing is Everything in the Beauty Business! 憓 Talent gets you in the ...
coreylewis960
Pass SAP C_C4H47_2503 in 2025 | Latest Exam Questions & Study Material
Pass SAP C_C4H47_2503 in 2025 | Latest Exam Questions & Study MaterialPass SAP C_C4H47_2503 in 2025 | Latest Exam Questions & Study Material
Pass SAP C_C4H47_2503 in 2025 | Latest Exam Questions & Study Material
Jenny408767
MIPLM subject matter expert Sascha Kamhuber
MIPLM subject matter expert Sascha KamhuberMIPLM subject matter expert Sascha Kamhuber
MIPLM subject matter expert Sascha Kamhuber
MIPLM
EDL 290F Week 5 - Facing Headwinds and Hairpin Turns (2025).pdf
EDL 290F Week 5  - Facing Headwinds and Hairpin Turns (2025).pdfEDL 290F Week 5  - Facing Headwinds and Hairpin Turns (2025).pdf
EDL 290F Week 5 - Facing Headwinds and Hairpin Turns (2025).pdf
Liz Walsh-Trevino
The basics of sentences session 9pptx.pptx
The basics of sentences session 9pptx.pptxThe basics of sentences session 9pptx.pptx
The basics of sentences session 9pptx.pptx
heathfieldcps1
URLS and routing in odoo 18 - Odoo 際際滷s
URLS and routing in odoo 18 - Odoo 際際滷sURLS and routing in odoo 18 - Odoo 際際滷s
URLS and routing in odoo 18 - Odoo 際際滷s
Celine George
DUODENUM ANATOMY & Clinical Anatomy.pptx
DUODENUM ANATOMY & Clinical Anatomy.pptxDUODENUM ANATOMY & Clinical Anatomy.pptx
DUODENUM ANATOMY & Clinical Anatomy.pptx
Sid Roy
Urinary Tract Infection & Sexually Transmt ted Diseases.pptx
Urinary Tract Infection & Sexually Transmt ted Diseases.pptxUrinary Tract Infection & Sexually Transmt ted Diseases.pptx
Urinary Tract Infection & Sexually Transmt ted Diseases.pptx
Ashish Umale
How to Configure Outgoing and Incoming mail servers in Odoo 18
How to Configure Outgoing and Incoming mail servers in Odoo 18How to Configure Outgoing and Incoming mail servers in Odoo 18
How to Configure Outgoing and Incoming mail servers in Odoo 18
Celine George
S. Y. G. N. M. CHILD HEALTH NURSING Leukemia in Children.pptx
S. Y. G. N. M. CHILD HEALTH NURSING Leukemia in Children.pptxS. Y. G. N. M. CHILD HEALTH NURSING Leukemia in Children.pptx
S. Y. G. N. M. CHILD HEALTH NURSING Leukemia in Children.pptx
sachin7989
UTI Quinolones by Mrs. Manjushri Dabhade
UTI Quinolones by Mrs. Manjushri DabhadeUTI Quinolones by Mrs. Manjushri Dabhade
UTI Quinolones by Mrs. Manjushri Dabhade
Dabhade madam Dabhade
2025 Women Leaders Program - Award Winning
2025 Women Leaders Program  - Award Winning2025 Women Leaders Program  - Award Winning
2025 Women Leaders Program - Award Winning
Sonia McDonald
MIPLM subject matter expert Nicos Raftis
MIPLM subject matter expert Nicos RaftisMIPLM subject matter expert Nicos Raftis
MIPLM subject matter expert Nicos Raftis
MIPLM
How to Grant Discounts in Sale Order Lines in Odoo 18 Sales
How to Grant Discounts in Sale Order Lines in Odoo 18 SalesHow to Grant Discounts in Sale Order Lines in Odoo 18 Sales
How to Grant Discounts in Sale Order Lines in Odoo 18 Sales
Celine George
Unit 3: Combustion in Spark Ignition Engines
Unit 3: Combustion in Spark Ignition EnginesUnit 3: Combustion in Spark Ignition Engines
Unit 3: Combustion in Spark Ignition Engines
NileshKumbhar21
Karin Clavel - Collection Wall: Inspiring connection and collaboration
Karin Clavel - Collection Wall: Inspiring connection and collaborationKarin Clavel - Collection Wall: Inspiring connection and collaboration
Karin Clavel - Collection Wall: Inspiring connection and collaboration
voginip
Celine Caira presents at Women girls and AI Paving the way to a balanced digi...
Celine Caira presents at Women girls and AI Paving the way to a balanced digi...Celine Caira presents at Women girls and AI Paving the way to a balanced digi...
Celine Caira presents at Women girls and AI Paving the way to a balanced digi...
EduSkills OECD
Anti-Viral Agents.pptx Medicinal Chemistry III, B Pharm SEM VI
Anti-Viral Agents.pptx Medicinal Chemistry III, B Pharm SEM VIAnti-Viral Agents.pptx Medicinal Chemistry III, B Pharm SEM VI
Anti-Viral Agents.pptx Medicinal Chemistry III, B Pharm SEM VI
Samruddhi Khonde
Marketing is Everything in the Beauty Business! 憓 Talent gets you in the ...
 Marketing is Everything in the Beauty Business! 憓 Talent gets you in the ... Marketing is Everything in the Beauty Business! 憓 Talent gets you in the ...
Marketing is Everything in the Beauty Business! 憓 Talent gets you in the ...
coreylewis960
Pass SAP C_C4H47_2503 in 2025 | Latest Exam Questions & Study Material
Pass SAP C_C4H47_2503 in 2025 | Latest Exam Questions & Study MaterialPass SAP C_C4H47_2503 in 2025 | Latest Exam Questions & Study Material
Pass SAP C_C4H47_2503 in 2025 | Latest Exam Questions & Study Material
Jenny408767

Hacking and its terms

  • 1. What is Hacking and its terms
  • 2. Who is Hacker? Hacker is a person who find weakness in computer systems or networks to exploit its weaknesses to gain access. Hacker is a person who think outside the box Hacker is a person who have lot of knowledge about computer as compare to any developer. All hacker are not criminals it depends on their work.
  • 3. What is Hacking? Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access. Example of Hacking: Using password cracking algorithm to gain access to a system Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. And while hacking might not always be for malicious purposes, nowadays most references to hacking, and hackers, characterize it/them as unlawful activity by cybercriminalsmotivated by financial gain, protest, information gathering (spying), and even just for the fun of the challenge..
  • 4. What is Ethical Hacking? Ethical Hacking is identifying weakness in computer systems and/or computer networks and coming with countermeasures that protect the weaknesses. Ethical hackers must abide by the following rules. Get written permission from the owner of the computer system and/or computer network before hacking. Protect the privacy of the organization been hacked. Transparently report all the identified weaknesses in the computer system to the organization. Inform hardware and software vendors of the identified weaknesses
  • 5. Why Ethical Hacking? Information is one of the most valuable assets of an organization. Keeping information secure can protect an organizations image and save an organization a lot of money. Hacking can lead to loss of business for organizations that deal in finance such as PayPal. Ethical hacking puts them a step ahead of the cyber criminals who would otherwise lead to loss of business.
  • 6. Can Hacking is legal or not? It depends on hacker work. Hacking is not a crime if you have all permission for hack a particular computer or network. Hacking is a beautiful art that cant have by everyone So hacking is a legal if you hack our own computer or network
  • 7. Thanks If you interested in Ethical hacking, web development then contact me I teach you at lowest price as possible. All classes are online held at skype etc. Contact No: 8195059899 (Kunal Verma)