Ethical hacking WWW.KAASHIVINFOTECH.COM
Process of Ethical hacking. The pros of ethical hacking. What is hacking? History of hacking? Types of hackers. Hacking methods. Process of Ethical hacking. The pros of ethical hacking. The cons of ethical hacking. WWW.KAASHIVINFOTECH.COM
What is hacking? It is unconventional way of using a system beyond the original intentions of the manufacturer. Hacking is not limited to computers. WWW.KAASHIVINFOTECH.COM
What is ethical hacking? It is the use of programming skills to determine vulnerabilities in computer systems. It is also known as the intrusion testing, penetration testing or red teaming. WWW.KAASHIVINFOTECH.COM
History of hacking. the first hackers appeared in the 1960's at the Massachusetts Institute of Technology (MIT). During the 1970's, a different kind of hacker appeared: the perhaps or phone hackers. WWW.KAASHIVINFOTECH.COM
History of hacking. In the 1980's, phreaks started to migrate to computers, and the first Bulletin Board Systems(BBS) appeared. During the 1990's, when the use of the internet widespread around the world, hackers multiplied. WWW.KAASHIVINFOTECH.COM
Types of hackers White Hat hackers also referred as Ethical hacker. Black Hat hackers also referred as cracker. Grey Hat hackers also referred as Skilled Hacker. WWW.KAASHIVINFOTECH.COM
Hacking Methods Phishing Method. Brute Force Hack. Fake Login Hack. Cookie Steal Hack. Web Mail Hack WWW.KAASHIVINFOTECH.COM
Process of Ethical hacking. Preparation. Foot printing. Enumeration and fingerprinting. Identification of vulnerabilities. Attack-exploit the vulnerabilities. WWW.KAASHIVINFOTECH.COM
The pros of ethical hacking . It enables you to find out the problem. Helps you build up a risk management program. Helps you to think like the enemy WWW.KAASHIVINFOTECH.COM
The cons of ethical hacking. It provides only a snapshot of what is happening. Losing data. Being given a false sense of security. WWW.KAASHIVINFOTECH.COM
End. Testing is an essential part of any data security program. An ethical hack can reduce the potential exposure of the company to criminal hackers. “It takes a Thief to Catch a Thief”. The periodic ethical hacking and review exercise would enhance the security and mitigate possible loopholes being exploited. WWW.KAASHIVINFOTECH.COM
THANK YOU. WWW.KAASHIVINFOTECH.COM