Sunteți pe pagina 1din 10

Impact of ICT on

Society Hacking
Name: Muhammad Zahil Bin Zulkarnain
IC: 990915-14-5781
Class: 4 Beta
Group Member: Rozaimi Ariff Bin Shamsul Azmi

Contents
Introduction
Who

is Hacker?
Types of Hacking
Example of Hacking
Effects of Hacking on Society
Differences of Hacking
History of Hacking
Conclusion
Reference

Introduction

ICT (information and


communications technology
- or technologies) is an
umbrella term that includes
any communication device
or application

Who is Hacker?
In

the computer security context, a


hacker is someone who seeks and
exploits weaknesses in a computer
system or computer network.

Hackers

may be motivated by a
multitude of reasons, such as profit,
protest, challenge, enjoyment, or to
evaluate those weaknesses to assist
in removing them

Types of Hacking
Website

hacking
Network hacking
Ethical hacking
Email hacking
Password hacking
Online banking hacking
Computer hacking

Effect of Hacking
Hacking

is just like a cancer that has


very dangerous effects on the society.

Today

in this modern world, where


measures have been taken to improve
the security level in the distributed
systems hackers have found a way to
crack into systems and take away
information.

Whats the Difference?

Hacking and phishing are related in that they are


both ways of obtaining information, but they
differ in their choice of methods.

A phish, which is ultimately a hack, occurs when


a user is baited with an email, phone call, or,
perhaps, a text message and tricked into
voluntarily responding with information. The
means of getting information is no more
complicated than making your forged phishing
email or website look official enough to trick the
victim.

The Greatest History of


Hacking
Targeting

the over-sensitive nerves,


what Mathew Bevan along with his
alleged partner Richard Pryce did,
could have triggered great many
issues between USA and North
Korea. The duo hacked the US
military computers and used it as a
means to infiltrate the foreign
systems.

Conclusion
The

outcome of hacking cyberspace


is neither good or bad, positive or
negative, constructive or
despructive.It compromises a
general strategy by which to explore
and manipulate the systems of
rationality by which these modes of
assessment become possible,
function, and make sense.

Reference

http://www.hackersonlineclub.com/website-hacking
http://resources.infosecinstitute.com/website-hacking-101/
http://www.insecure.in/network_hacking.asp
https://en.wikipedia.org/wiki/Email_hacking
http://www.veracode.com/security/password-hacking
http://thoughtcatalog.com/siddhi-palande/2014/06/10-besthackers-the-world-has-ever-known/
NOK A+ Information & Communication Technology, page
10& 45

S-ar putea să vă placă și