HACKING VS PENTESTING NURUL HAFIZAH HAZWNI BINTI HASHIM (MCS151019)

Slides:



Advertisements
Similar presentations
Craig Rimando Luke White. “hacking” - negative connotation Not always that way Originally a compliment Not all hacking necessarily bad “Good” hacking?
Advertisements

Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
Introduction to Ethical Hacking, Ethics, and Legality.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Computer Security and Penetration Testing
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Ethical Hacking by Shivam.
Hands-On Ethical Hacking and Network Defense
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Question: Future Sessions AI and Military (UAS) Virtual Worlds Privacy and NSA Free Software Movement.
PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD NUR’ ARINA ATIQAH BT ASRAR
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
6 th Grade. a. Identify Internet safety and security concerns (Cyber Predators, etc) b. Discuss illegal aspects of software piracy, hacking, and computer.
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
“The act of gaining unauthorized access to computer systems (cracking) should not be criminalized assuming that there is no damage.” Dan Garrison Megan.
Aksana Chornenkaya, Sherin Hassan, & Meagan Moore.
Legitimate Vulnerability Markets By: Jeff Wheeler.
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
CSCE 201 Secure Software Development Best Practices.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
Smart City Hacked??? Technology & Society. American cities vulnerable to large-scale cyber attack
Computer and Network Security Brendan Duncombe Bahein Maung.
Logan Wojcik COSC 101. Overview ~ Both are hackers ~White hats help computer systems become more secure ~Black hats attack and exploit breaches in systems.
Ethical #Hacking. Ethical Hacking !! Content !! * Overview of Ethical Hacking * Prospectus of Ethical Hacking * Evaluation of Ethical Hacking * Training.
1 Figure 1-3: Attack Trends Growing Incident Frequency  Incidents reported to the Computer Emergency Response Team/Coordination Center  1997: 2,134.
Denial of Service Attack Pornography Phising Spoofing Salami Attack Forgery Hackers: enjoy intellectual challenges of overcoming software limitations.
 Define hacking  Types of hackers  History  Intentions  Statistics  Facts  How to Protect yourself.
HACKING: THE GOOD AND BAD SIDES In this presentation, we will talk about the good and bad sides of hacking, and also the different points of view on this.
James F. Fox MENA Cyber Security Practice Lead Presenters Cyber Security in a Mobile and “Always-on” World Booz | Allen | Hamilton.
Methods of Secure Information System Design
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Computer Hacking By: Ethan Wolfe. What is Computer Hacking? Computer Hacking- The practice of modifying computer hardware and software to accomplish a.
Here // This is the presentation about to describe categories of Hackers. //In this session you will learn aims, identity and purposes of hackers >>> Enter.
Seminar On Ethical Hacking Submitted To: Submitted By:
Presented by: Kevin Regaldo Phillip Dai
Security
Hacking, Security, and Information War
Threats By Dr. Shadi Masadeh.
Ethics CSE 591 – Security and Vulnerability Analysis Spring 2017
Hacking: The Good and Bad sides
Chapter 11 crime and security in the networked economy
The Impact Of ICT “Hacking”
White Hat vs. Black Hat White Hat Black Hat
Ethical hacking
CertStore Solution is a platform of 100+ IT professionals and having 500+ IT/Security and Academic courses. Cert Store is the Gold and Accredited partner.
Computer Security Elaine Munn Introduction to Computer Security.
CIS 534 Innovative Education-- snaptutorial.com
Mcafee updates Mcafee antivirus uses a database of known virus definitions to identify malware and other threats on your computer system. So it is important.
Topic 5: Communication and the Internet
Penetration Testing Computer Science and Software Engineering
Chapter 13 Security and Ethical Challenges.
Ethics CSE 545 – Software Security Spring 2018 Adam Doupé
Network Traffic and Cybersecurity
What is computer hacking?
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
LO1 - Know about aspects of cyber security
LO1 - Know about aspects of cyber security
Chapter 1 Key Security Terms.
Presentation transcript:

HACKING VS PENTESTING NURUL HAFIZAH HAZWNI BINTI HASHIM (MCS151019) NUR AFEZA AJIRAH BINTI NOOR SAAID (MCS151014)

HACKING BY DEFINITION Hacking is the practice of modifying features of system in order to accomplish goals or purposes of the hacker. They use hacking method and other related cyber attack to do hacking.

HACKING Can be classified into two categories; ethical and non-ethical hacker Ethical hacker formally known as “white hat” Non-ethical hacker known as “black hat” Grey hat can be both good or bad hacker relies on their intention.

WHITE HAT HACKER BLACK HAT HACKER Represent the good guys Everything they do is right, legal and justified. Example: They may work with official organization to protect the network. BLACK HAT HACKER Represent the bad guys Everything they do is illegal. Example: Black hat hacker do harm to an organization, steal secret data for money. Whatever they do is to get profit.

GREY HAT HACKER MOTIVES Can be both good and bad depending on law. They do hacking for fame and to get credit for solving solutions. MOTIVES Monetary gain Fame Revenge Political disputes

PENETRATION TESTING A formal method with the purpose of discovering security vulnerabilities, flaws with the purpose of strengthening the computer and network security. Hired by company to test their security defence and it’s infrastructure Considered as ethical hacking Have limited access to the application or data Must have agreement with the company