ict form 4: hacking

Post on 04-Feb-2015

5.803 Views

Category:

Education

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

Our presentation ! XD .. ICT Form 4: Hacking

TRANSCRIPT

HACKING

Prepared by:

Mohd Qhaiyum Shah Bin Raman

Nurul Lisa Bte Mandih

CONTENTS: Introduction of Computer Threats

Definition of Hacking

Definition of Hackers

Advantages of Hacking

Disadvantages of Hacking

How to Prevent Hacking – (Hacking vs. Firewall)

Conclusion

References

Introduction …

The computer is a great tool to store important

information. In certain cases, the information is very

vital that losing it will harm the computer system.

Computer threats can come from many ways

either from human or natural disasters. For example,

when someone is stealing your account information

from a trusted bank, this threat is considered as a

human threat. However, when your computer is

soaked in heavy rain, then that is a natural disaster

threat.

Definition of Hacking …

Hacking is a source of threat to security

in computer. It is defined as

unauthorized access to the computer

system by a hacker.

Definition of Hacker …

Hackers are persons who

learn about the computer

system in detail. They

write program referred to as

hacks. Hackers may use a

modem or cable to hack

the targeted computers.

Advantages of Hacking …

Can be used to recover lost information where the

computer password has been lost.

Teaches us that no technology is 100% secure.

Hacking is good with games especially when you

are online but the only problem is, if the gaming

server finds out that you have been hacking. Then,

you could get chucked off the gaming

server so watch out!

Disadvantages of Hacking …

Criminals can use it to their

advantage.

It can harm someone's privacy.

It's illegal.

It destroys other people’s work.

Hacking VS. Firewall …

Hacking is an unauthorized access to the computer

system done by a hacker. In order to prevent it from

happening, we can use firewall to prevent the hacker

from accessing our computers.

A firewall permits limited access to unauthorized

users or any activities from the network environment.

The logo of Firewall

Conclusion …

Hackers are just people with innovative spirits and an in-

depth knowledge of technology. Hackers aren't necessarily

criminals, though as long as crime has the potential to pay,

there will always be some criminals who are hackers.

There's nothing wrong with the hacker knowledge itself,

despite its potential applications.

Therefore, do whatever you like as long as you didn’t

make other people suffered and devastated on your own

action.

Here are some references that we used in our presentation…

1. Books:

-ICT Resource Book (Form 4)

-ICT Mind Map Note Version 2.0 (Form 4 & 5)

2. URL’s (Internet):

-http://en.wikipedia.org/wiki/Hacker

-http://en.wikipedia.org/wiki/Hacking

That’s All From Us

Thank YouFor Listening!

top related