13
HACKING Prepared by: Mohd Qhaiyum Shah Bin Raman Nurul Lisa Bte Mandih

ICT Form 4: Hacking

Embed Size (px)

DESCRIPTION

Our presentation ! XD .. ICT Form 4: Hacking

Citation preview

Page 1: ICT Form 4: Hacking

HACKING

Prepared by:

Mohd Qhaiyum Shah Bin Raman

Nurul Lisa Bte Mandih

Page 2: ICT Form 4: Hacking

CONTENTS: Introduction of Computer Threats

Definition of Hacking

Definition of Hackers

Advantages of Hacking

Disadvantages of Hacking

How to Prevent Hacking – (Hacking vs. Firewall)

Conclusion

References

Page 3: ICT Form 4: Hacking

Introduction …

The computer is a great tool to store important

information. In certain cases, the information is very

vital that losing it will harm the computer system.

Page 4: ICT Form 4: Hacking

Computer threats can come from many ways

either from human or natural disasters. For example,

when someone is stealing your account information

from a trusted bank, this threat is considered as a

human threat. However, when your computer is

soaked in heavy rain, then that is a natural disaster

threat.

Page 5: ICT Form 4: Hacking

Definition of Hacking …

Hacking is a source of threat to security

in computer. It is defined as

unauthorized access to the computer

system by a hacker.

Page 6: ICT Form 4: Hacking

Definition of Hacker …

Hackers are persons who

learn about the computer

system in detail. They

write program referred to as

hacks. Hackers may use a

modem or cable to hack

the targeted computers.

Page 7: ICT Form 4: Hacking

Advantages of Hacking …

Can be used to recover lost information where the

computer password has been lost.

Teaches us that no technology is 100% secure.

Hacking is good with games especially when you

are online but the only problem is, if the gaming

server finds out that you have been hacking. Then,

you could get chucked off the gaming

server so watch out!

Page 8: ICT Form 4: Hacking

Disadvantages of Hacking …

Criminals can use it to their

advantage.

It can harm someone's privacy.

It's illegal.

It destroys other people’s work.

Page 9: ICT Form 4: Hacking

Hacking VS. Firewall …

Hacking is an unauthorized access to the computer

system done by a hacker. In order to prevent it from

happening, we can use firewall to prevent the hacker

from accessing our computers.

A firewall permits limited access to unauthorized

users or any activities from the network environment.

The logo of Firewall

Page 10: ICT Form 4: Hacking
Page 11: ICT Form 4: Hacking

Conclusion …

Hackers are just people with innovative spirits and an in-

depth knowledge of technology. Hackers aren't necessarily

criminals, though as long as crime has the potential to pay,

there will always be some criminals who are hackers.

There's nothing wrong with the hacker knowledge itself,

despite its potential applications.

Therefore, do whatever you like as long as you didn’t

make other people suffered and devastated on your own

action.

Page 12: ICT Form 4: Hacking

Here are some references that we used in our presentation…

1. Books:

-ICT Resource Book (Form 4)

-ICT Mind Map Note Version 2.0 (Form 4 & 5)

2. URL’s (Internet):

-http://en.wikipedia.org/wiki/Hacker

-http://en.wikipedia.org/wiki/Hacking

Page 13: ICT Form 4: Hacking

That’s All From Us

Thank YouFor Listening!