A presentationby-Shalu gupta
 Computer hacking is when  someone modifies computer  hardware or software in a  way that alters the creators  original i...
An ethical hacker is a computer and network expert who attacks a security system on behalf of its ownersAn ethical hacker ...
OTHER TYPES OF HACKER SCRIPT KIDDIES: Script kiddie is a pejorative term  for a computer intruder with little or no skill...
HISTORY OF HACKING
NEED OF ETHICAL HACKING
DRAWBACKS OF EHTICALHACKING
CERTIFIED ETHICAL HACKER
*Age-28*Occupation-Author, computer security   consultant, MTV host.*he wrote Unofficial Guide to Ethical   Hacking at the...
 1# The secret of Hacking 1  Edition. 2# Social Engineering: The Art of  Human Hacking. 3# Dangerous Google - Searching...
CAREERS IN NETWORK SECURITYAND ETHICAL HACKING
I am ready tofight for rulesagainst hackers
!!--FUTURE OF ETHICAL HACKING--!!
LET”S PROTECT YOUR EMAIL PASSWORD…..
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Upcoming SlideShare
Loading in...5
×

Ethical hacking

2,154

Published on

its a ppt presentation by me on ethical hacking,its help you so much.
prateek singh
gla univ

0 Comments
4 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
2,154
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
279
Comments
0
Likes
4
Embeds 0
No embeds

No notes for slide

Ethical hacking

  1. 1. A presentationby-Shalu gupta
  2. 2.  Computer hacking is when someone modifies computer hardware or software in a way that alters the creators original intention, There are two types of people in the world. good one & bad one
  3. 3. An ethical hacker is a computer and network expert who attacks a security system on behalf of its ownersAn ethical hacker is sometimes called a white hat, a term that comes from old Western movies, where the "good guy" wore a white hat and the "bad guy" wore a black hat.
  4. 4. OTHER TYPES OF HACKER SCRIPT KIDDIES: Script kiddie is a pejorative term for a computer intruder with little or no skill; a person who simply follows directions or uses a cook-book approach . CRACKERS : Those who will enter your computer just for the fun of it, or to prove their technical skills. Gray-hat Hackers: These individuals typically follow the law but sometimes venture over to the darker side of blackhat hacking.
  5. 5. HISTORY OF HACKING
  6. 6. NEED OF ETHICAL HACKING
  7. 7. DRAWBACKS OF EHTICALHACKING
  8. 8. CERTIFIED ETHICAL HACKER
  9. 9. *Age-28*Occupation-Author, computer security consultant, MTV host.*he wrote Unofficial Guide to Ethical Hacking at the age of 15.*Help in 9/11 attack to decode a messagae of al-qyaeda. *In 2008, the IMT Ghaziabad Centre for Distance Learning signed an MoU with Fadia to organise its one-year Post- Graduate Diploma in Cyber Security.[18]
  10. 10.  1# The secret of Hacking 1 Edition. 2# Social Engineering: The Art of Human Hacking. 3# Dangerous Google - Searching For Secrets. 4#Gray Hat Hacking The Ethical Hackers Handbook. 5# Hardware Hacking Have Fun While Voiding Your Warranty
  11. 11. CAREERS IN NETWORK SECURITYAND ETHICAL HACKING
  12. 12. I am ready tofight for rulesagainst hackers
  13. 13. !!--FUTURE OF ETHICAL HACKING--!!
  14. 14. LET”S PROTECT YOUR EMAIL PASSWORD…..
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×