Ethical hacking WWW.KAASHIVINFOTECH.COM.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

UNIT 20 The ex-hacker.
ETHICAL HACKING.
Craig Rimando Luke White. “hacking” - negative connotation Not always that way Originally a compliment Not all hacking necessarily bad “Good” hacking?
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Computer Security and Penetration Testing
Prepared by: Nahed Al-Salah
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
AGAINST HACKING Lysia Moua CIS1055 Sec 005 November 20, 2012.
1 UNIT 20 The ex-hacker Lecturer: Ghadah Aldehim.
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Ethical Hacking by Shivam.
Hands-On Ethical Hacking and Network Defense
 The hackers is a persons that they have a many knowledge in the area of ​​ computer and are capable of deceive the security.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
ETHICS IN COMPUTER SCIENCE Hacking and identity theft.
Computer Hacking Cybercrime (1).
By Carlos G. Coca.  Originally a person who was skilled at programming language who was able to create/alter web content.  Now: “A person who illegally.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.
Unit 19 INTERNET SECURITY
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Scams & Schemes Common Sense Media.
PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD NUR’ ARINA ATIQAH BT ASRAR
Ethical Hacking
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
Module 5 – Vulnerability Identification  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification.
Jeopardy Grammar Fix the Mistakes True or False Vocabulary 1 Vocabulary 2 Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
ETHICS IN COMPUTER SCIENCE Hacking and identity theft.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Logan Wojcik COSC 101. Overview ~ Both are hackers ~White hats help computer systems become more secure ~Black hats attack and exploit breaches in systems.
Security Operations Chapter 11 Part 3 Pages 1279 to 1309.
Ethical #Hacking. Ethical Hacking !! Content !! * Overview of Ethical Hacking * Prospectus of Ethical Hacking * Evaluation of Ethical Hacking * Training.
Filip Chytrý Everyone of you in here can help us improve online security....
 Define hacking  Types of hackers  History  Intentions  Statistics  Facts  How to Protect yourself.
HACKING: THE GOOD AND BAD SIDES In this presentation, we will talk about the good and bad sides of hacking, and also the different points of view on this.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
Snowfensive At Snowfensive.com, we provide specialized cyber security risk assessments for organizations. We also give security awareness training for.
Defining your requirements for a successful security (and compliance
Seminar On Ethical Hacking Submitted To: Submitted By:
Computer Security and Ethical Hacking
Presented by: Kevin Regaldo Phillip Dai
Ethical Hacking By: Erin Noonan.
HACKING VS PENTESTING NURUL HAFIZAH HAZWNI BINTI HASHIM (MCS151019)
Secure Software Confidentiality Integrity Data Security Authentication
Hacking: The Good and Bad sides
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
The Impact Of ICT “Hacking”
Answer the questions to reveal the blocks and guess the picture.
Year 10 ICT ECDL/ICDL IT Security.
CertStore Solution is a platform of 100+ IT professionals and having 500+ IT/Security and Academic courses. Cert Store is the Gold and Accredited partner.
John Butters Running Tiger Teams
SEC 420 StrCompetitive Success/tutorialrank.com
Taewan kang, Kevin huangfu
Topic 5: Communication and the Internet
Reconnaissance Report Trillium Technologies
Prepared By : Binay Tiwari
Regulating Online Speech
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
WJEC GCSE Computer Science
Information Security.
Chapter 1 Key Security Terms.
Presentation transcript:

Ethical hacking WWW.KAASHIVINFOTECH.COM

Process of Ethical hacking. The pros of ethical hacking. What is hacking? History of hacking? Types of hackers. Hacking methods. Process of Ethical hacking. The pros of ethical hacking. The cons of ethical hacking. WWW.KAASHIVINFOTECH.COM

What is hacking? It is unconventional way of using a system beyond the original intentions of the manufacturer. Hacking is not limited to computers. WWW.KAASHIVINFOTECH.COM

What is ethical hacking? It is the use of programming skills to determine vulnerabilities in computer systems. It is also known as the intrusion testing, penetration testing or red teaming. WWW.KAASHIVINFOTECH.COM

History of hacking. the first hackers appeared in the 1960's at the Massachusetts Institute of Technology (MIT). During the 1970's, a different kind of hacker appeared: the perhaps or phone hackers. WWW.KAASHIVINFOTECH.COM

History of hacking. In the 1980's, phreaks started to migrate to computers, and the first Bulletin Board Systems(BBS) appeared. During the 1990's, when the use of the internet widespread around the world, hackers multiplied. WWW.KAASHIVINFOTECH.COM

Types of hackers White Hat hackers also referred as Ethical hacker. Black Hat hackers also referred as cracker. Grey Hat hackers also referred as Skilled Hacker. WWW.KAASHIVINFOTECH.COM

Hacking Methods Phishing Method. Brute Force Hack. Fake Login Hack. Cookie Steal Hack. Web Mail Hack WWW.KAASHIVINFOTECH.COM

Process of Ethical hacking. Preparation. Foot printing. Enumeration and fingerprinting. Identification of vulnerabilities. Attack-exploit the vulnerabilities. WWW.KAASHIVINFOTECH.COM

The pros of ethical hacking . It enables you to find out the problem. Helps you build up a risk management program. Helps you to think like the enemy WWW.KAASHIVINFOTECH.COM

The cons of ethical hacking. It provides only a snapshot of what is happening. Losing data. Being given a false sense of security. WWW.KAASHIVINFOTECH.COM

End. Testing is an essential part of any data security program. An ethical hack can reduce the potential exposure of the company to criminal hackers. “It takes a Thief to Catch a Thief”. The periodic ethical hacking and review exercise would enhance the security and mitigate possible loopholes being exploited. WWW.KAASHIVINFOTECH.COM

THANK YOU. WWW.KAASHIVINFOTECH.COM