Download presentation
Presentation is loading. Please wait.
1
Ethical hacking
2
Process of Ethical hacking. The pros of ethical hacking.
What is hacking? History of hacking? Types of hackers. Hacking methods. Process of Ethical hacking. The pros of ethical hacking. The cons of ethical hacking.
3
What is hacking? It is unconventional way of using
a system beyond the original intentions of the manufacturer. Hacking is not limited to computers.
4
What is ethical hacking?
It is the use of programming skills to determine vulnerabilities in computer systems. It is also known as the intrusion testing, penetration testing or red teaming.
5
History of hacking. the first hackers appeared in the 1960's
at the Massachusetts Institute of Technology (MIT). During the 1970's, a different kind of hacker appeared: the perhaps or phone hackers.
6
History of hacking. In the 1980's, phreaks started to migrate
to computers, and the first Bulletin Board Systems(BBS) appeared. During the 1990's, when the use of the internet widespread around the world, hackers multiplied.
7
Types of hackers White Hat hackers also referred as Ethical hacker.
Black Hat hackers also referred as cracker. Grey Hat hackers also referred as Skilled Hacker.
8
Hacking Methods Phishing Method. Brute Force Hack. Fake Login Hack.
Cookie Steal Hack. Web Mail Hack
9
Process of Ethical hacking.
Preparation. Foot printing. Enumeration and fingerprinting. Identification of vulnerabilities. Attack-exploit the vulnerabilities.
10
The pros of ethical hacking .
It enables you to find out the problem. Helps you build up a risk management program. Helps you to think like the enemy
11
The cons of ethical hacking.
It provides only a snapshot of what is happening. Losing data. Being given a false sense of security.
12
End. Testing is an essential part of any data security program.
An ethical hack can reduce the potential exposure of the company to criminal hackers. “It takes a Thief to Catch a Thief”. The periodic ethical hacking and review exercise would enhance the security and mitigate possible loopholes being exploited.
13
THANK YOU.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.