Ethical hacking ppt

9,325
-1

Published on

A presentation on ethical hacking that covers some basic concepts on it and help audience understand it.
But before presenting don't forget to reharse.

Published in: Technology, News & Politics
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
9,325
On Slideshare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
543
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Ethical hacking ppt

  1. 1. HACKING Unlike most computer crime / misuse areas which are clear cut in terms of actions and legalities , computer hacking is more difficult to define. There is no exact definition of hacking. Hacking means finding out weaknesses in an established system and exploiting them. Computer hacking always involves some degree of infringement on the privacy of others or damage to computer-based property such as files, web pages or software
  2. 2. WHO IS A HACKER? On hearing the word “HACKER” most of the peoples are scared. Most of them think of hacker as a computer vandals. But hackers are not computer criminals. Traditionally, hackers were computer geeks who know almost everything about computers both hardware and software and are widely respected for there knowledge.
  3. 3.  People who break into someone’s system are called “CRACKERS”. People who code and release viruses are not necessarily hackers, they are “VIRIiCODERS”.
  4. 4. TYPES OF HACKERS • BLACK HAT HACKERS • WHITE HAT HACKERS • GRAY HAT HACKERS
  5. 5. THREE TOP SIGNS SHOWING THAT A PERSON IS NOT A REAL HACKER He uses weird handles like avenger, skull, kewl etc. He boasts about how much he knows, a sure sign of a person who lacks real knowledge. He flames newbie's of people who ask questions, instead of helping them learn.
  6. 6. CYBER CRIME We can categorize Cyber crimes in two ways The Computer as a Target :-using a computer to attack other computers e.g. Hacking, Virus/Worm attacks, DOS attack etc. The computer as a weapon :-using a computer to commit real world crimes. e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.
  7. 7. IT ACT 2000 • In May 2000, both the houses of the Indian Parliament passed the Information Technology Bill. The Bill received the assent of the President in August 2000 and came to be known as the Information Technology Act, 2000. Cyber laws are contained in the IT Act, 2000. • This Act aims to provide the legal infrastructure for e-commerce in India. And the cyber laws have a major impact for e-businesses and the new economy in India. So, it is important to understand what are the various perspectives of the IT Act, 2000 and what it offers.
  8. 8. WHAT CAN BE HACKED? WINDOWS MOBILE NETWORK WEB PASSWORDS
  9. 9. HACKING WINDOWS • Simple step just open the computer then look for a round lithium round battery it will probably look like a silver coin. Remove the battery and after 30 seconds or so put it back. Some computers may also require you to reset the jumper, so look for a 3-pin jumper and reset it. If you move the jumper to pins two and three and leave it there for over five seconds, it will reset the CMOS.
  10. 10. CAREER IN ETHICAL HACKING • In the past few years the demand of ethical hackers is increased in the industry. Undoubtly it is a highly paid job. • You can become a “CERTIFIED ETHICAL HACKER”(CEH) or a “PENETRATION TESTER”
  11. 11. Some terms related to Hacking • INTERNET WORMS Worms are often used to infect large no. of broadband connected computers with remote control software.It works differently then a virus.It won’t attach to different programs but it will produce precise copies of itself
  12. 12. • ROOTKITS A rootkit is often a collection of programs which are hidden deep into your computer system. They enable administrator level access to a computer or network. For installing a rootkit first of all a programmer has to gain user level access in a system
  13. 13. • ZOMBIES A zombie computer or a “DRONE” is a computer that has been secretly compromised by hacking tools which allow third party to control the computer and its resources remotely.
  14. 14. • SPAM Used to be a junk or bulk email sent by the spammer to various recipients aimed at advertising, scamming and sending viruses.
  15. 15. THANK YOU
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×