ETHICALHACKING
what8is8ETHICS8?888888888888888888888          Ethics?        Moral Responsibility to         do the correct thing
what8is8ETHICS8?888888888888888888888         “ETOS”
what8is8ETHICS8?888888888888888888888       Meta Ethics       Normative Ethics       Applied Ethics
what8is8ETHICS8?888888888888888888888          Why Ethics ?   Make good people & make good actions   Social Consideratio...
ETHICAL8HACKING88888888888888888888888     Art and science of determining           the vulnerabilities of    your informa...
ETHICAL8HACKING88888888888888888888888       Performed by high skilled               ETHICAL        Security Professionals
ETHICAL8HACKING88888888888888888888888         Types of Ethical Hacking                      White Box Testing            ...
ETHICAL8HACKING88888888888888888888888            Types of Ethical Hacking      Black Box Testing    You have full knowled...
Code8of8ethics88888888888888888888888 Original Hacker Ethics              Found in Steven                                 ...
Code8of8ethics88888888888888888888888 New Hacker Ethics Above all else, do no harm   Found in the                        ...
Advantages8of8ethical8hacking888888888      To take preventive measures             against hackers
Advantages8of8ethical8hacking888888888       To fight against terrorism
Advantages8of8ethical8hacking888888888   A system that helps prevent entry by             hackers to create
DISAdvantages8of8ethical8hacking888888  The ethical hacker using the knowledge      they gain to do malicious hacking     ...
DISAdvantages8of8ethical8hacking888888   Allowing the companys financial and         banking details to be seen
DISAdvantages8of8ethical8hacking888888 The possibility that the ethical hacker will send               and/or place malici...
REFERENCES8of8ethical8hacking888888888    Steven Mizrach , Is there a Hacker Ethic for 90s Hackers , 2011    Steven Levy...
Upcoming SlideShare
Loading in …5
×

Ethical Hacking

937 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
937
On SlideShare
0
From Embeds
0
Number of Embeds
5
Actions
Shares
0
Downloads
56
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Ethical Hacking

  1. 1. ETHICALHACKING
  2. 2. what8is8ETHICS8?888888888888888888888 Ethics? Moral Responsibility to do the correct thing
  3. 3. what8is8ETHICS8?888888888888888888888 “ETOS”
  4. 4. what8is8ETHICS8?888888888888888888888  Meta Ethics  Normative Ethics  Applied Ethics
  5. 5. what8is8ETHICS8?888888888888888888888 Why Ethics ?  Make good people & make good actions  Social Consideration  Ethical Consideration
  6. 6. ETHICAL8HACKING88888888888888888888888 Art and science of determining the vulnerabilities of your information infrastructure to Better defend them
  7. 7. ETHICAL8HACKING88888888888888888888888 Performed by high skilled ETHICAL Security Professionals
  8. 8. ETHICAL8HACKING88888888888888888888888 Types of Ethical Hacking White Box Testing You have full knowledge of the network
  9. 9. ETHICAL8HACKING88888888888888888888888 Types of Ethical Hacking Black Box Testing You have full knowledge of the network
  10. 10. Code8of8ethics88888888888888888888888 Original Hacker Ethics Found in Steven Levys 1984 book Hackers: Hands On Imperative Heroes of the Computer Information Wants to Be Free Revolution Mistrust Authority No Bogus Criteria You can create truth and beauty on a computer
  11. 11. Code8of8ethics88888888888888888888888 New Hacker Ethics Above all else, do no harm Found in the article “Is there a Protect Privacy Hacker Ethic for 90s Hackers? Waste not, want not written by Steven Mizrach Exceed Limitations
  12. 12. Advantages8of8ethical8hacking888888888 To take preventive measures against hackers
  13. 13. Advantages8of8ethical8hacking888888888 To fight against terrorism
  14. 14. Advantages8of8ethical8hacking888888888 A system that helps prevent entry by hackers to create
  15. 15. DISAdvantages8of8ethical8hacking888888 The ethical hacker using the knowledge they gain to do malicious hacking activities
  16. 16. DISAdvantages8of8ethical8hacking888888 Allowing the companys financial and banking details to be seen
  17. 17. DISAdvantages8of8ethical8hacking888888 The possibility that the ethical hacker will send and/or place malicious code, viruses, malware and other destructive and harmful things on a computer system
  18. 18. REFERENCES8of8ethical8hacking888888888  Steven Mizrach , Is there a Hacker Ethic for 90s Hackers , 2011  Steven Levys,Heroes of the Computer Revolution,1984  BBC Organization , Ethics Guide , 2012 . [Online]. Available: BBC , http://www.bbc.co.uk/ethics/introduction/ [2012/03/25]  Geeknizer, Hacking as a Service, 2012. [Online]. Available: Security & Future, http://geeknizer.com/hacking-as-a-service-haas-the-security-future-beyond-saas/, [2012/03/25]  H4xOrin T3h World , What is hacking and cracking, 2011 Nov.[Online].Available :MaxOrin The World, http://kingofdkingz99.blogspot.com/2011/08/hacking-cracking-hacking-is-activity- of.html [2012/03/25]

×