Your SlideShare is downloading. ×
0
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Ethical hacking

2,089

Published on

its a ppt presentation by me on ethical hacking,its help you so much. …

its a ppt presentation by me on ethical hacking,its help you so much.
prateek singh
gla univ

0 Comments
4 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
2,089
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
270
Comments
0
Likes
4
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. A presentationby-Shalu gupta
  • 2.  Computer hacking is when someone modifies computer hardware or software in a way that alters the creators original intention, There are two types of people in the world. good one & bad one
  • 3. An ethical hacker is a computer and network expert who attacks a security system on behalf of its ownersAn ethical hacker is sometimes called a white hat, a term that comes from old Western movies, where the "good guy" wore a white hat and the "bad guy" wore a black hat.
  • 4. OTHER TYPES OF HACKER SCRIPT KIDDIES: Script kiddie is a pejorative term for a computer intruder with little or no skill; a person who simply follows directions or uses a cook-book approach . CRACKERS : Those who will enter your computer just for the fun of it, or to prove their technical skills. Gray-hat Hackers: These individuals typically follow the law but sometimes venture over to the darker side of blackhat hacking.
  • 5. HISTORY OF HACKING
  • 6. NEED OF ETHICAL HACKING
  • 7. DRAWBACKS OF EHTICALHACKING
  • 8. CERTIFIED ETHICAL HACKER
  • 9. *Age-28*Occupation-Author, computer security consultant, MTV host.*he wrote Unofficial Guide to Ethical Hacking at the age of 15.*Help in 9/11 attack to decode a messagae of al-qyaeda. *In 2008, the IMT Ghaziabad Centre for Distance Learning signed an MoU with Fadia to organise its one-year Post- Graduate Diploma in Cyber Security.[18]
  • 10.  1# The secret of Hacking 1 Edition. 2# Social Engineering: The Art of Human Hacking. 3# Dangerous Google - Searching For Secrets. 4#Gray Hat Hacking The Ethical Hackers Handbook. 5# Hardware Hacking Have Fun While Voiding Your Warranty
  • 11. CAREERS IN NETWORK SECURITYAND ETHICAL HACKING
  • 12. I am ready tofight for rulesagainst hackers
  • 13. !!--FUTURE OF ETHICAL HACKING--!!
  • 14. LET”S PROTECT YOUR EMAIL PASSWORD…..

×