Topic of presentation
Ethical hacking
Content
Introduction
Ethical Hacking
Hackers
Types of Hackers
Hacking Process
Advantages
Disadvantages
Future Enhancements
Conclusion
References
Introduction
Ethical hacking also known as penetration
testing or white-hat hacking, involves the same
tools, tricks, and techniques that hackers use, but
with one major difference that Ethical hacking is
legal.
Ethical hacking, is legally breaking into computers
and devices to test an organization's defenses.
Ethical Hacking
Independent computer security Professionals breaking into the computer
systems.
Neither damage the target systems nor steal information.
Evaluate target systems security and report back to owners about the
vulnerabilities found.
Hackers
A person who enjoys learning details of a programming language or
system.
A person who enjoys actually doing the programming rather
than just theorizing about it.
A person capable of appreciating someone else's hacking.
A person who picks up programming quickly.
A person who is an expert at a particular programming language or system.
Types of Hackers
Black Hat Hacker
White Hat Hacker
Grey Hat Hacker
Black Hat Hacker
A black hat hackers or crackers are individuals
with extraordinary computing skills, resorting to
malicious or destructive activities.
That is black hat hackers use their knowledge and skill
for their own personal gains probably by hurting
others.
White Hat Hacker
White hat hackers are those individuals professing
hacker skills and using them for defensive purposes.
This means that the white hat hackers use their
knowledge and skill for the good of others and for the
common good.
Grey Hat Hacker
These are individuals who work both offensively and
defensively at various times.
We cannot predict their behavior.
Sometimes they use their skills for the common good while
in some other times he uses them for their personal gains .
Hacking Process
Foot Printing
Scanning
Gaining Access
Maintaining Access
Advantages
To catch a thief you have to think like a thief
Helps in closing the open holes in the system network
Provides security to banking and financial establishments
Prevents website defacements
An evolving technique
Disadvantages
All depends upon the trustworthiness of the ethical hacker
Unauthorized system access on private information
Loss of financial and personal data
Hiring professionals is expensive
Future Enhancement
As it is an evolving branch the scope of
enhancement in technology is immense.
No ethical hacker can ensure the system
security by using the same technique
repeatedly.
More enhanced software’s should be used
for optimum protection.
Conclusion
In the preceding sections we saw the methodology of hacking, why should we
aware of hacking and some tools which a hacker may use.
si
Now we can see what can we do against hacking or to protect ourselves from
hacking.
The first thing we should do is to keep ourselves updated about those software’s
we are using for official and reliable sources.
Educate the employees and the users against black hat hacking.
References
www.google.com
www.wikipedia.com
www.studymafia.org
THANK YOU