Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

samaaa

No description
by

mai amro

on 18 July 2015

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of samaaa

Hacking ...
How to classify
hacker morally?

Palestine Polytechnic University


Subject : Hacking

Student Name :
Islam , Shaimá , Amal , Baraá ,Sama

Supervispr Name :
Maysoon Qaqour
Or, a computer predator may pounce on the private information you unwittingly revealed. In either case, they may:


Hijack your usernames and passwords.
Steal your money and open credit card and bank accounts in your name.
Ruin your credit.


What can computer hackers do to you?

1.White hat hacker, the hacker called reformer.

2.Black hat hacker, the hacker called the spoiler, which is called Cracker.

3.Grey hat hacker, tottering between reform and tampering.


All the answers were against hacker and look for all kinds as bad, but in fact there are three types:

How to classify hacker morally?

Many viewed that , the hacker is someone destructive and negative, and some read the word hacker with a computer pirate. And that the impact of some of what was stated in the media, where the reason for the lack of understanding of the fact that the hacker, and Khalthm her word hacking expression that describes the illegal sale of copies of creative works. It is used in violation of property rights and copyright, especially for movies and television songs and computer programs. Which has become one of the World Wide Web means marketing.


what do you know about hackers? Do you think the hackers is a good thing or bad ? why?


We have to do an interview with a number of students, on the subject of hacking, we have by asking some questions ,we'll show these questions and answers about the students briefly.


Interviews:


9. Make sure that you have the best security software products .

10. installed on your PC.

11. Use antivirus protection.
Get antispyware software protection.

6.Practice safe email protocol.

7.Don't open messages from unknown senders.

8.Immediately delete messages you suspect to be spam.


4.Avoid questionable Web sites.

5.Only download software from sites you trust. Carefully evaluate free software and file-sharing applications before downloading them.

Use a 2 way firewall.

Update your operating system regularly.

Increase your browser security settings.


To protect your computer from hackers and predators:

What can I do about computer hackers and predators?


Predators can pose a serious physical threat. Use extreme caution when agreeing to meet an online “friend” or acquaintance in person.


8. Use and abuse your Social Security number.

9.Sell your information to other parties who will use it for illicit or illegal purposes.


6.Add themselves or an alias that they control as an authorized user so it’s easier to use your credit.

7.Obtain cash advances.


4. Request new account Personal Identification Numbers (PINs) or additional credit cards.

5. Make purchases.


Hijack your usernames and passwords.
Steal your money and open credit card and bank accounts in your name.
Ruin your credit.


Or, a computer predator may pounce on the private information you unwittingly revealed. In either case, they may:


While your computer is connected to the Internet, the malware a hacker has installed on your PC quietly transmits your personal and financial information without your knowledge or consent.

 
What can computer hackers and predators do to me?


Usually disguised with a bogus identity, predators can lure you into revealing sensitive personal and financial information, or much worse

Computer hackers can also try to access your computer and private information directly if you are not protected with a firewall. They may also monitor your chat room conversations or peruse your personal Web page

These online villains typically use phishing scams, spam email or instant messages and bogus Web sites to deliver dangerous malware to your computer and compromise your computer security.

Anyone who uses a computer connected to the Internet is susceptible to the threats that computer hackers and predators pose

How do computer hackers and predators find me?


Their clever tactics and detailed technical knowledge help them access information you really don’t want them to have.

Computer hackers are unauthorized users who break into computer systems in order to steal, change or destroy information, often by installing dangerous malware without your knowledge or consent.

People, not computers, create computer threats. Computer predators victimize others for their own gain. Give a predator access to the Internet — and to your PC — and the threat they pose to your security increases exponentially.


How are computer hackers and predators a threat to computer security?


There are some questions we need to know the answer until we can deal with hacking and protect our organs of them, including:


In the United States, hacking is an offense under the federal Computer Fraud and Abuse Act and also subject to individual state law.


Hackers can work alone or in groups, and in a lot of cases are self-taught.

There are a number of reasons why people are inclined to hack into computers, from the benign to the malicious – anything from playing a simple prank to stealing millions of dollars.

Hackers are individuals who use their knowledge of computers to infiltrate and compromise the security of other computer networks

(such as programming or other media) in a spirit of playfulness and exploration. But, the destructive intentions of some hackers have turned this word into something bad.

The word “hacking” has become synonymous with ill doings and the amount of affected people might be the reason for that. The meanings of hacking are many and most are intended to describe the act of engaging in activities

If you think hackers get a bad rap, think about this……


If you think hackers
get a bad rap, think
about this……

While your computer is connected to the Internet, the malware a hacker has installed on your PC quietly transmits your personal and financial information without your knowledge or consent.

4. Request new account Personal Identification Numbers (PINs) or additional credit cards.
5. Make purchases.
6.Add themselves or an alias that they control as an authorized user so it’s easier to use your credit.
7.Obtain cash advances.
4.Avoid questionable Web sites.
5.Only download software from sites you trust. Carefully evaluate free software and file-sharing applications before downloading them.
6.Practice safe email protocol.
7.Don't open messages from unknown senders.
8.Immediately delete messages you suspect to be spam.
9. Make sure that you have the best security software products .
10. installed on your PC.
11. Use antivirus protection.
Get antispyware software protection.

How are computer
hackers and
predators a
threat to
computer
security?


How do
computer
hackers and
predators find
me?
What can computer hackers do to you?
We have to do an interview with a number of students, on the subject of hacking, we have by asking some questions ,we'll show these questions and answers about the students briefly.
what do you know about hackers? Do you think the hackers is a good thing or bad ? why?



Many viewed that , the hacker is someone destructive and negative, and some read the word hacker with a computer pirate. And that the impact of some of what was stated in the media, where the reason for the lack of understanding of the fact that the hacker, and Khalthm her word hacking expression that describes the illegal sale of copies of creative works. It is used in violation of property rights and copyright, especially for movies and television songs and computer programs. Which has become one of the World Wide Web means marketing.


How to classify hacker morally?

Their clever tactics and detailed technical knowledge help them access information you really don’t want them to have.

People, not computers, create computer threats. Computer predators victimize others for their own gain. Give a predator access to the Internet — and to your PC — and the threat they pose to your security increases exponentially.
Computer hackers are unauthorized users who break into computer systems in order to steal, change or destroy information, often by installing dangerous malware without your knowledge or consent.

These online villains typically use phishing scams, spam email or instant messages and bogus Web sites to deliver dangerous malware to your computer and compromise your computer security.
Anyone who uses a computer connected to the Internet is susceptible to the threats that computer hackers and predators pose

Computer hackers can also try to access your computer and private information directly if you are not protected with a firewall. They may also monitor your chat room conversations or peruse your personal Web page

(such as programming or other media) in a spirit of playfulness and exploration. But, the destructive intentions of some hackers have turned this word into something bad.

Hackers are individuals who use their knowledge of computers to infiltrate and compromise the security of other computer networks

The word “hacking” has become synonymous with ill doings and the amount of affected people might be the reason for that. The meanings of hacking are many and most are intended to describe the act of engaging in activities

There are a number of reasons why people are inclined to hack into computers, from the benign to the malicious – anything from playing a simple prank to stealing millions of dollars.

Hackers can work alone or in groups, and in a lot of cases are self-taught.

In the United States, hacking is an offense under the federal Computer Fraud and Abuse Act and also subject to individual state law.


Interviews:


What can computer hackers do to you?

8. Use and abuse your Social Security number.
9.Sell your information to other parties who will use it for illicit or illegal purposes.
Predators can pose a serious physical threat. Use extreme caution when agreeing to meet an online “friend” or acquaintance in person.
To protect your computer from hackers and predators:





Use a 2 way firewall.
Update your operating system regularly.
Increase your browser security settings.


All the answers were against hacker
and look for all kinds as bad, but in fact there are three types:

1.White hat hacker, the hacker called reformer.
2.Black hat hacker, the hacker called the spoiler, which is called Cracker.
3.Grey hat hacker, tottering between reform and tampering.
Students answers to this question were bad, I noticed they did not know the severity of the negative hacker on their servers, I told them what hackers can do to them more broadly, such as what we mentioned earlier.




8. Increase your browser security settings.
9. Don't open messages from unknown senders.
How will I know?
Many students do not know whether they were hacked or not and some were aware of how to find out if exposure to hacking or not, and i have Bachbarhec How do they know whether exposure to hacking as we mentioned earlier

5.What can I do about computer hackers and predators?
Students varied answers to this question and all of them are true, we'll show part of it:
1.Continually check the accuracy of personal accounts and deal with any discrepancies right awa

2. Use extreme caution when entering chat rooms or posting personal Web pages
3. Limit the personal information you post on a personal Web pages
4. Carefully monitor requests by online “friends” or acquaintances for predatory behavior
5. Keep personal and financial information out of online conversations

6. Use extreme caution when agreeing to meet an online “friend” or acquaintance in person

7. Update your operating system regularly
Full transcript