Ethical hacking
Upcoming SlideShare
Loading in...5
×
 

Ethical hacking

on

  • 1,749 views

its a ppt presentation by me on ethical hacking,its help you so much.

its a ppt presentation by me on ethical hacking,its help you so much.
prateek singh
gla univ

Statistics

Views

Total Views
1,749
Views on SlideShare
1,749
Embed Views
0

Actions

Likes
3
Downloads
198
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Ethical hacking Ethical hacking Presentation Transcript

  • A presentationby-Shalu gupta
  •  Computer hacking is when someone modifies computer hardware or software in a way that alters the creators original intention, There are two types of people in the world. good one & bad one
  • An ethical hacker is a computer and network expert who attacks a security system on behalf of its ownersAn ethical hacker is sometimes called a white hat, a term that comes from old Western movies, where the "good guy" wore a white hat and the "bad guy" wore a black hat.
  • OTHER TYPES OF HACKER SCRIPT KIDDIES: Script kiddie is a pejorative term for a computer intruder with little or no skill; a person who simply follows directions or uses a cook-book approach . CRACKERS : Those who will enter your computer just for the fun of it, or to prove their technical skills. Gray-hat Hackers: These individuals typically follow the law but sometimes venture over to the darker side of blackhat hacking.
  • HISTORY OF HACKING
  • NEED OF ETHICAL HACKING
  • DRAWBACKS OF EHTICALHACKING
  • CERTIFIED ETHICAL HACKER
  • *Age-28*Occupation-Author, computer security consultant, MTV host.*he wrote Unofficial Guide to Ethical Hacking at the age of 15.*Help in 9/11 attack to decode a messagae of al-qyaeda. *In 2008, the IMT Ghaziabad Centre for Distance Learning signed an MoU with Fadia to organise its one-year Post- Graduate Diploma in Cyber Security.[18]
  •  1# The secret of Hacking 1 Edition. 2# Social Engineering: The Art of Human Hacking. 3# Dangerous Google - Searching For Secrets. 4#Gray Hat Hacking The Ethical Hackers Handbook. 5# Hardware Hacking Have Fun While Voiding Your Warranty
  • CAREERS IN NETWORK SECURITYAND ETHICAL HACKING
  • I am ready tofight for rulesagainst hackers
  • !!--FUTURE OF ETHICAL HACKING--!!
  • LET”S PROTECT YOUR EMAIL PASSWORD…..