Download presentation
Presentation is loading. Please wait.
1
Ethical Hacking By: Erin Noonan
2
What Is Ethical Hacking?
-When independent computer security professionals attempt to break into computer systems
3
Why do they exist? -To find new ways to approach hacker problems
-Best way to evaluate the intruder
4
How do they operate? Attempt same tools and techniques as intruders
Would not damage systems or steal information Evaluate target systems’ security and report vulnerabilities back to owners Provide them with instructions on how to fix these problems
5
Ethical hacking has been in use since the early days of computers.
6
NetWorks Group Most effective way to test a security system on behalf of it’s owners Uncovers vulnerabilities that could be exploited my a hacker Problems are discovered and reported so they can be properly fixed
7
NetWorks Group Performed by a dedicated team consisting of highly-skilled, focused, and experienced security consultants Test for over 25,000 vulnerabilities, logic flow problems, and other risks.
8
NetWorks Group’s Methodology
Discovery Vulnerability Scan Verification and manual testing Exploit Findings reported Heavy emphasis on deliverables Clear and accurate information conveyed on both a technical and business level
9
NetWorks Group Hackers
Based in Washington DC Average experience of 10 years in IT Security Department of Defense Top Secret Clearances Six Industry Certifications from various organizations
10
The Three Basic Questions
What can an intruder see on the target systems? What can an intruder do with that information? Does anyone at the target notice the intruder’s attempts?
11
Every website is a target!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.