 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.

Slides:



Advertisements
Similar presentations
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Advertisements

Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
Created by: Robert McAndrews Career & Technology Education Humble Independent School District.
Breaking Trust On The Internet
Computer Threats I can understand computer threats and how to protect myself from these threats.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Computer Security and Penetration Testing
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Lecture 17 Introduction to Hacking. WHAT IS NETWORK SECURITY? Security is much larger than just packets, firewalls, and hackers. Security includes: –
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
Security, Privacy, and Ethics Online Computer Crimes.
Ethical Hacking by Shivam.
Hands-On Ethical Hacking and Network Defense
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Cyber Crime Carloe Distor CCS1D. Agenda  Introduction & History  Cyber Criminals  Types of Cyber Crime  Cyber Crime in Pakistan  Protect Computers.
Computer Hacking Cybercrime (1).
Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally.
ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.
Issues Raised by ICT.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
General Purpose Packages
Computer Crime and Information Technology Security
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Cyber crime & Security Prepared by : Rughani Zarana.
PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD NUR’ ARINA ATIQAH BT ASRAR
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
“The act of gaining unauthorized access to computer systems (cracking) should not be criminalized assuming that there is no damage.” Dan Garrison Megan.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
Cybercrime. Professional Hackers Paid per the job, usually flat rates State-side hackers can earn up to $200K a year The work is usually writing tools.
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
Hacking by Tiffany Duff Computing in the Modern World Ms. Stewart.
Presents Ethical Hacking For Inplant Training / Internship, please download the "Inplant training registration form" from our website.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Presents Ethical Hacking 1 For Inplant Training / Internship, please download the "Inplant training registration form" from our.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
Computer and Network Security Brendan Duncombe Bahein Maung.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
1 Figure 1-3: Attack Trends Growing Incident Frequency  Incidents reported to the Computer Emergency Response Team/Coordination Center  1997: 2,134.
Denial of Service Attack Pornography Phising Spoofing Salami Attack Forgery Hackers: enjoy intellectual challenges of overcoming software limitations.
 Define hacking  Types of hackers  History  Intentions  Statistics  Facts  How to Protect yourself.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
CITA 352 Chapter 1 Ethical Hacking Overview. Introduction to Ethical Hacking Ethical hackers –Hired by companies to perform penetration tests Penetration.
PRESENTED BY : Bhupendra Singh
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Seminar On Ethical Hacking Submitted To: Submitted By:
HACKING VS PENTESTING NURUL HAFIZAH HAZWNI BINTI HASHIM (MCS151019)
Chapter 11 crime and security in the networked economy
The Impact Of ICT “Hacking”
Ethical hacking
ECCouncil Exam Real Dumps - ECCouncil Exam 100% Passing Guarantee
John Butters Running Tiger Teams
Risk of the Internet At Home
Cyber Crime Today we will look at: Different types of cyber-crime
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Test 3 review FTP & Cybersecurity
Presentation transcript:

 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration testing which is focused on Securing and Protecting IT Systems.

Hacker is a word that has two meanings:  Traditionally, a Hacker is someone who likes to play with Software or Electronic Systems.  Recently, Hacker has taken on a new meaning — someone who maliciously breaks into systems for personal gain. Technically, these criminals & are known as Crackers.

HACKING WITH MALICIOUS INTENTION IS CRACKING  The basic difference is hackers do not do anything disastrous.  Cracking yield more devastating results.  Cracking is crime.  Cyber crime are the results of cracking,not hacking

It is Legal Permission is obtained from the target Part of an overall security program Identify vulnerabilities visible from Internet at particular point of time Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner

 Have full knowladge.  They know what exactly they are doing  Well aware about the different codes  Have complete idea what is going beyond coding.

 Knows what they are doing.  They don’t have idea that what exactly going beyond codes.  Result oriented persons  They are not so harmful.

 Script kiddies or packet monkeys Young in-experienced hackers Copy codes and techniques from knowledgeable hackers. Don’t know what’s going beyond the coding. Use techniques for fun purpose. Sometimes could be very dangerous for the system,

These are good hackers. Have genuine license to hack. Have registered police records Evolves themselves in good works Generally owned by companies for security designing Have high pay scales. Generally these are coders

 very dangerous persons.  Always have motive to earn huge profit.  Highly paid persons.  Evolves themselves mostly in criminal activities.  These could be coders, admins as well as script kiddies

Also known as red hats. Perform both tasks fair as well as unfair. Generally these are admins. Have little high pay than white hats. Generally not so dangerous, but sometimes could be.

H4cking prone areas

It is clear from the graph it is increasing day by day.

 Use of anti-viruses.  Proper logout after use of mail id.  Manual opening browser  don't open spam.  Password protected admin account.

HACKING IS USING AN AUTHORISE THING IN A UN AUTHORISED MANNER HACKIING IS ILLEGAL BUT NOT A CRIME. TYPES OF HACKERS. VIRUSES,WORMS & TROJANS. ADMIN PASSWORD HACKING