ict form 4: hacking
DESCRIPTION
Our presentation ! XD .. ICT Form 4: HackingTRANSCRIPT
![Page 1: ICT Form 4: Hacking](https://reader033.vdocuments.mx/reader033/viewer/2022061300/54d24ab04a795908608b459b/html5/thumbnails/1.jpg)
HACKING
Prepared by:
Mohd Qhaiyum Shah Bin Raman
Nurul Lisa Bte Mandih
![Page 2: ICT Form 4: Hacking](https://reader033.vdocuments.mx/reader033/viewer/2022061300/54d24ab04a795908608b459b/html5/thumbnails/2.jpg)
CONTENTS: Introduction of Computer Threats
Definition of Hacking
Definition of Hackers
Advantages of Hacking
Disadvantages of Hacking
How to Prevent Hacking – (Hacking vs. Firewall)
Conclusion
References
![Page 3: ICT Form 4: Hacking](https://reader033.vdocuments.mx/reader033/viewer/2022061300/54d24ab04a795908608b459b/html5/thumbnails/3.jpg)
Introduction …
The computer is a great tool to store important
information. In certain cases, the information is very
vital that losing it will harm the computer system.
![Page 4: ICT Form 4: Hacking](https://reader033.vdocuments.mx/reader033/viewer/2022061300/54d24ab04a795908608b459b/html5/thumbnails/4.jpg)
Computer threats can come from many ways
either from human or natural disasters. For example,
when someone is stealing your account information
from a trusted bank, this threat is considered as a
human threat. However, when your computer is
soaked in heavy rain, then that is a natural disaster
threat.
![Page 5: ICT Form 4: Hacking](https://reader033.vdocuments.mx/reader033/viewer/2022061300/54d24ab04a795908608b459b/html5/thumbnails/5.jpg)
Definition of Hacking …
Hacking is a source of threat to security
in computer. It is defined as
unauthorized access to the computer
system by a hacker.
![Page 6: ICT Form 4: Hacking](https://reader033.vdocuments.mx/reader033/viewer/2022061300/54d24ab04a795908608b459b/html5/thumbnails/6.jpg)
Definition of Hacker …
Hackers are persons who
learn about the computer
system in detail. They
write program referred to as
hacks. Hackers may use a
modem or cable to hack
the targeted computers.
![Page 7: ICT Form 4: Hacking](https://reader033.vdocuments.mx/reader033/viewer/2022061300/54d24ab04a795908608b459b/html5/thumbnails/7.jpg)
Advantages of Hacking …
Can be used to recover lost information where the
computer password has been lost.
Teaches us that no technology is 100% secure.
Hacking is good with games especially when you
are online but the only problem is, if the gaming
server finds out that you have been hacking. Then,
you could get chucked off the gaming
server so watch out!
![Page 8: ICT Form 4: Hacking](https://reader033.vdocuments.mx/reader033/viewer/2022061300/54d24ab04a795908608b459b/html5/thumbnails/8.jpg)
Disadvantages of Hacking …
Criminals can use it to their
advantage.
It can harm someone's privacy.
It's illegal.
It destroys other people’s work.
![Page 9: ICT Form 4: Hacking](https://reader033.vdocuments.mx/reader033/viewer/2022061300/54d24ab04a795908608b459b/html5/thumbnails/9.jpg)
Hacking VS. Firewall …
Hacking is an unauthorized access to the computer
system done by a hacker. In order to prevent it from
happening, we can use firewall to prevent the hacker
from accessing our computers.
A firewall permits limited access to unauthorized
users or any activities from the network environment.
The logo of Firewall
![Page 10: ICT Form 4: Hacking](https://reader033.vdocuments.mx/reader033/viewer/2022061300/54d24ab04a795908608b459b/html5/thumbnails/10.jpg)
![Page 11: ICT Form 4: Hacking](https://reader033.vdocuments.mx/reader033/viewer/2022061300/54d24ab04a795908608b459b/html5/thumbnails/11.jpg)
Conclusion …
Hackers are just people with innovative spirits and an in-
depth knowledge of technology. Hackers aren't necessarily
criminals, though as long as crime has the potential to pay,
there will always be some criminals who are hackers.
There's nothing wrong with the hacker knowledge itself,
despite its potential applications.
Therefore, do whatever you like as long as you didn’t
make other people suffered and devastated on your own
action.
![Page 12: ICT Form 4: Hacking](https://reader033.vdocuments.mx/reader033/viewer/2022061300/54d24ab04a795908608b459b/html5/thumbnails/12.jpg)
Here are some references that we used in our presentation…
1. Books:
-ICT Resource Book (Form 4)
-ICT Mind Map Note Version 2.0 (Form 4 & 5)
2. URL’s (Internet):
-http://en.wikipedia.org/wiki/Hacker
-http://en.wikipedia.org/wiki/Hacking
![Page 13: ICT Form 4: Hacking](https://reader033.vdocuments.mx/reader033/viewer/2022061300/54d24ab04a795908608b459b/html5/thumbnails/13.jpg)
That’s All From Us
Thank YouFor Listening!