3
Most read
10
Most read
17
Most read
Ethical hacking
Ethical Hacking
-A license to hack
What is Hacking?
Act of illegally entering a computer system , making unauthorised
changes to the files and data contain within.
What is Ethical hacking?
• “Ethical hacking describes the process of attacking and penetrating
computer systems and networks to discover and point out potential
security weaknesses for a client”.
• Its legal and permission is obtained from the target for hacking.
• Part of an overall security program.
Events that gave meaning to hacking:
• The first hacker appeared in 1960’s at the Massachusetts Institute of
technology(MIT).
• During the 1970’s a different kind of hacker appeared :phone
phreaker or Phone hacker.
• In the 1980’s,phreaks started to migrate to computers and the first
Bulletin Board System(BBS)appeared.
• During the 1990’s,when the use of internet widespread around the
world, hackers multiplied!!
Why do people hack?
• Just for fun
• To show off
• To steal other information secretly
• To notify many people their thoughts
• To destroy enemy’s computer network during the war
• To get others attention
Basic-Hacking-skills:
• An ethical hacker must be a computer systems expert and needs to have very
strong programming and computer networking skills.
• An ethical hacker needs to have a lot of patience, persistence, and perseverance
to try again and again and wait for the required result.
• Password guessing and cracking
• Session hijacking
• Session spoofing
• Network traffic sniffing
• Denial of Service attacks
• Exploiting buffer overflow vulnerabilities
• SQL injection
Types of hackers:
Black hat hacker Grey hat hacker White hat hacker
• White hat hacker:
Individuals professing hackers skills and using them for the defensive
purpose also known as Security Analysis.
Eg: Bill Gates, Steve jobs,..
• Black hat hacker:
Individuals with extraordinary computing skills, resorting to malicious or
destructive activities and are also known as Crackers.
Eg: Kevin Poulsen, Jonathan james,..
• Grey hat hacker:
Individuals who work both offensive and defensive at various works.
Phases of hacking:
Hacking growth rate:
Hackers language:
Importance of Ethical Hacking:
• The Ethical hacking system important for some of the service like application
testing, War Dialling, Network Testing, Wireless Security, System Hardening etc,..
• Ethical hacking used to judge the security programs of the organizations.
• It makes software and codes better and more efficient of organizations security
risks.
Advantages:
• This prevents identity theft and the leaking of vital information.
• It allows them to implement stronger security measures.
• It is also beneficial to help government entities to protect major computer
systems from being compromised in a way that national security would be a issue
• It also helps families of deceased people access accounts to see what their final
viral transmissions may have been or gain access to some accounts to some
accounts to close them down.
• Fighting against terrorism and national security breaches.
• Having a computer system that prevents malicious hackers from gaining access.
• Having adequate preventative measures in place to prevent security breaches.
Disadvantages:
As with all types of activities which have a darker side, there will be dishonest
people presenting drawbacks. The possible drawbacks of ethical hacking include:
• The ethical hacker using the knowledge they gain to do malicious hacking
activities.
• Allowing the company’s financial and banking details to be seen.
• The possibility that the ethical hacker will send and/or place malicious code,
viruses, malware and other destructive and harmful things on a computer
system.
• Massive security breach.
Recent cases of Hacking:
• 3.2 million SBI bank account
was hacked by the hackers of
china and unauthorised
transaction is done, this is the
biggest breach in the history of
Indian bank.
• In August 2013, 1 billion
yahoo account passwords
has been leaked and the
information were
compromised.This is one of
the biggest data breach in
the history.
Conclusion:
• The idea of testing the security of a system by trying to break into it is
not new.
• While ethical hackers can help clients better understand their security
needs, it is up to the clients to keep their guards in place.
• Keep your password protected. Write your password it should be with
combinations of symbols,digits,special symbols.Do not respond to
feck on fishing email.when you are doing any online transaction
always keep watch on site whether t5he protocol of site is https &
whether there is a lock symbol
Presented by:
• Goutham
• Baba Malik

More Related Content

PPTX
Ethical Hacking
PPTX
Ethical hacking
PPTX
ETHICAL HACKING PRESENTATION
PPTX
Ethical hacking presentation
PPT
Ethical hacking presentation
PPTX
ETHICAL HACKING PPT
PPSX
Information Security and Ethical Hacking
PPTX
Ethical hacking ppt by shantanu arora
Ethical Hacking
Ethical hacking
ETHICAL HACKING PRESENTATION
Ethical hacking presentation
Ethical hacking presentation
ETHICAL HACKING PPT
Information Security and Ethical Hacking
Ethical hacking ppt by shantanu arora

What's hot (20)

PPTX
Ethical Hacking
PPTX
Ethical hacking Presentation
PPT
Ethical Hacking Powerpoint
PDF
Cyber security and demonstration of security tools
PPTX
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
PPT
All about Hacking
PPTX
Inetsecurity.in Ethical Hacking presentation
PPT
Ethical hacking
PPTX
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PPTX
Types of cyber attacks
PPTX
Ethical Hacking
PPT
Ethical hacking a licence to hack
PPSX
Hacking
PPTX
Ethical hacking
PPTX
Network security
PPTX
Ethical hacking
PPT
Ethical hacking
PPT
hacking
PPTX
Cyber Crime and Security
Ethical Hacking
Ethical hacking Presentation
Ethical Hacking Powerpoint
Cyber security and demonstration of security tools
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
All about Hacking
Inetsecurity.in Ethical Hacking presentation
Ethical hacking
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Types of cyber attacks
Ethical Hacking
Ethical hacking a licence to hack
Hacking
Ethical hacking
Network security
Ethical hacking
Ethical hacking
hacking
Cyber Crime and Security

Similar to Ethical hacking (20)

PPTX
Ethical Hacking
DOCX
61370436 main-case-study
PPTX
Ethical_Hacking
PPTX
Hacking.pptx
PPTX
EthicalHacking_AakashTakale
PPTX
Hacking
PPTX
Ethical Hacking.pptx
DOCX
Ethical hacking.
PDF
UNIT - I in Engineering Subjects Ethical Hacking Subject
PPTX
Cyber Security PPT
PPTX
ethical hacking
PPTX
Hacking ppt
DOCX
Ethical Hacking
DOCX
Final report ethical hacking
PPTX
Ethical hacking
DOCX
Ethical hacking
PPT
Ethical hacking-presentation-updated(1by )Rasheed
DOCX
Ethical hacking
RTF
Hacking and its types
DOCX
Ethical hacking
Ethical Hacking
61370436 main-case-study
Ethical_Hacking
Hacking.pptx
EthicalHacking_AakashTakale
Hacking
Ethical Hacking.pptx
Ethical hacking.
UNIT - I in Engineering Subjects Ethical Hacking Subject
Cyber Security PPT
ethical hacking
Hacking ppt
Ethical Hacking
Final report ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking
Hacking and its types
Ethical hacking

Recently uploaded (20)

PDF
Compact First Student's Book Cambridge Official
PDF
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...
PPTX
Integrated Management of Neonatal and Childhood Illnesses (IMNCI) – Unit IV |...
PDF
Journal of Dental Science - UDMY (2020).pdf
PDF
The TKT Course. Modules 1, 2, 3.for self study
PDF
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
PPTX
UNIT_2-__LIPIDS[1].pptx.................
PPTX
PLASMA AND ITS CONSTITUENTS 123.pptx
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
faiz-khans about Radiotherapy Physics-02.pdf
PDF
Journal of Dental Science - UDMY (2021).pdf
PDF
Everyday Spelling and Grammar by Kathi Wyldeck
PPTX
ACFE CERTIFICATION TRAINING ON LAW.pptx
PDF
Laparoscopic Colorectal Surgery at WLH Hospital
PPT
REGULATION OF RESPIRATION lecture note 200L [Autosaved]-1-1.ppt
PDF
African Communication Research: A review
PDF
Literature_Review_methods_ BRACU_MKT426 course material
Compact First Student's Book Cambridge Official
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...
Integrated Management of Neonatal and Childhood Illnesses (IMNCI) – Unit IV |...
Journal of Dental Science - UDMY (2020).pdf
The TKT Course. Modules 1, 2, 3.for self study
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
Cambridge-Practice-Tests-for-IELTS-12.docx
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
UNIT_2-__LIPIDS[1].pptx.................
PLASMA AND ITS CONSTITUENTS 123.pptx
Environmental Education MCQ BD2EE - Share Source.pdf
faiz-khans about Radiotherapy Physics-02.pdf
Journal of Dental Science - UDMY (2021).pdf
Everyday Spelling and Grammar by Kathi Wyldeck
ACFE CERTIFICATION TRAINING ON LAW.pptx
Laparoscopic Colorectal Surgery at WLH Hospital
REGULATION OF RESPIRATION lecture note 200L [Autosaved]-1-1.ppt
African Communication Research: A review
Literature_Review_methods_ BRACU_MKT426 course material

Ethical hacking

  • 3. What is Hacking? Act of illegally entering a computer system , making unauthorised changes to the files and data contain within.
  • 4. What is Ethical hacking? • “Ethical hacking describes the process of attacking and penetrating computer systems and networks to discover and point out potential security weaknesses for a client”. • Its legal and permission is obtained from the target for hacking. • Part of an overall security program.
  • 5. Events that gave meaning to hacking: • The first hacker appeared in 1960’s at the Massachusetts Institute of technology(MIT). • During the 1970’s a different kind of hacker appeared :phone phreaker or Phone hacker. • In the 1980’s,phreaks started to migrate to computers and the first Bulletin Board System(BBS)appeared. • During the 1990’s,when the use of internet widespread around the world, hackers multiplied!!
  • 6. Why do people hack? • Just for fun • To show off • To steal other information secretly • To notify many people their thoughts • To destroy enemy’s computer network during the war • To get others attention
  • 7. Basic-Hacking-skills: • An ethical hacker must be a computer systems expert and needs to have very strong programming and computer networking skills. • An ethical hacker needs to have a lot of patience, persistence, and perseverance to try again and again and wait for the required result. • Password guessing and cracking • Session hijacking • Session spoofing • Network traffic sniffing • Denial of Service attacks • Exploiting buffer overflow vulnerabilities • SQL injection
  • 8. Types of hackers: Black hat hacker Grey hat hacker White hat hacker
  • 9. • White hat hacker: Individuals professing hackers skills and using them for the defensive purpose also known as Security Analysis. Eg: Bill Gates, Steve jobs,.. • Black hat hacker: Individuals with extraordinary computing skills, resorting to malicious or destructive activities and are also known as Crackers. Eg: Kevin Poulsen, Jonathan james,.. • Grey hat hacker: Individuals who work both offensive and defensive at various works.
  • 13. Importance of Ethical Hacking: • The Ethical hacking system important for some of the service like application testing, War Dialling, Network Testing, Wireless Security, System Hardening etc,.. • Ethical hacking used to judge the security programs of the organizations. • It makes software and codes better and more efficient of organizations security risks.
  • 14. Advantages: • This prevents identity theft and the leaking of vital information. • It allows them to implement stronger security measures. • It is also beneficial to help government entities to protect major computer systems from being compromised in a way that national security would be a issue • It also helps families of deceased people access accounts to see what their final viral transmissions may have been or gain access to some accounts to some accounts to close them down. • Fighting against terrorism and national security breaches. • Having a computer system that prevents malicious hackers from gaining access. • Having adequate preventative measures in place to prevent security breaches.
  • 15. Disadvantages: As with all types of activities which have a darker side, there will be dishonest people presenting drawbacks. The possible drawbacks of ethical hacking include: • The ethical hacker using the knowledge they gain to do malicious hacking activities. • Allowing the company’s financial and banking details to be seen. • The possibility that the ethical hacker will send and/or place malicious code, viruses, malware and other destructive and harmful things on a computer system. • Massive security breach.
  • 16. Recent cases of Hacking: • 3.2 million SBI bank account was hacked by the hackers of china and unauthorised transaction is done, this is the biggest breach in the history of Indian bank. • In August 2013, 1 billion yahoo account passwords has been leaked and the information were compromised.This is one of the biggest data breach in the history.
  • 17. Conclusion: • The idea of testing the security of a system by trying to break into it is not new. • While ethical hackers can help clients better understand their security needs, it is up to the clients to keep their guards in place. • Keep your password protected. Write your password it should be with combinations of symbols,digits,special symbols.Do not respond to feck on fishing email.when you are doing any online transaction always keep watch on site whether t5he protocol of site is https & whether there is a lock symbol