0% found this document useful (0 votes)
59 views17 pages

Google

The document discusses the topic of ethical hacking. It defines ethical hacking as legally breaking into computer systems and devices to test an organization's defenses. It outlines the content that will be covered, including introductions to ethical hacking, different types of hackers (white hat, black hat, grey hat), the hacking process, advantages and disadvantages of ethical hacking, future enhancements, and conclusions. It provides examples of how white hat and black hat hackers differ, with white hats using their skills defensively and for good, while black hats use skills maliciously for personal gain.

Uploaded by

Prachi Girase
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views17 pages

Google

The document discusses the topic of ethical hacking. It defines ethical hacking as legally breaking into computer systems and devices to test an organization's defenses. It outlines the content that will be covered, including introductions to ethical hacking, different types of hackers (white hat, black hat, grey hat), the hacking process, advantages and disadvantages of ethical hacking, future enhancements, and conclusions. It provides examples of how white hat and black hat hackers differ, with white hats using their skills defensively and for good, while black hats use skills maliciously for personal gain.

Uploaded by

Prachi Girase
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

Topic of presentation

Ethical hacking
Content

 Introduction
 Ethical Hacking
 Hackers
 Types of Hackers
 Hacking Process
 Advantages
 Disadvantages
 Future Enhancements
 Conclusion
 References
Introduction
 Ethical hacking also known as penetration
testing or white-hat hacking, involves the same
tools, tricks, and techniques that hackers use, but
with one major difference that Ethical hacking is
legal.
 Ethical hacking, is legally breaking into computers
and devices to test an organization's defenses.
Ethical Hacking

 Independent computer security Professionals breaking into the computer


systems.

 Neither damage the target systems nor steal information.

 Evaluate target systems security and report back to owners about the
vulnerabilities found.
Hackers

 A person who enjoys learning details of a programming language or


system.

 A person who enjoys actually doing the programming rather


than just theorizing about it.

 A person capable of appreciating someone else's hacking.

 A person who picks up programming quickly.

 A person who is an expert at a particular programming language or system.


Types of Hackers

Black Hat Hacker


White Hat Hacker
Grey Hat Hacker
Black Hat Hacker

 A black hat hackers or crackers are individuals


with extraordinary computing skills, resorting to
malicious or destructive activities.

 That is black hat hackers use their knowledge and skill


for their own personal gains probably by hurting
others.
White Hat Hacker

 White hat hackers are those individuals professing


hacker skills and using them for defensive purposes.

 This means that the white hat hackers use their


knowledge and skill for the good of others and for the
common good.
Grey Hat Hacker

 These are individuals who work both offensively and


defensively at various times.

 We cannot predict their behavior.

 Sometimes they use their skills for the common good while
in some other times he uses them for their personal gains .
Hacking Process

 Foot Printing
 Scanning
 Gaining Access
 Maintaining Access
Advantages
 To catch a thief you have to think like a thief

 Helps in closing the open holes in the system network

 Provides security to banking and financial establishments

 Prevents website defacements

 An evolving technique
Disadvantages

 All depends upon the trustworthiness of the ethical hacker

 Unauthorized system access on private information

 Loss of financial and personal data

 Hiring professionals is expensive


Future Enhancement
 As it is an evolving branch the scope of
enhancement in technology is immense.

 No ethical hacker can ensure the system


security by using the same technique
repeatedly.

 More enhanced software’s should be used


for optimum protection.
Conclusion

 In the preceding sections we saw the methodology of hacking, why should we

aware of hacking and some tools which a hacker may use.


si
 Now we can see what can we do against hacking or to protect ourselves from
hacking.
 The first thing we should do is to keep ourselves updated about those software’s
we are using for official and reliable sources.
 Educate the employees and the users against black hat hacking.
References

www.google.com
www.wikipedia.com
www.studymafia.org
THANK YOU

You might also like