Hacker
The

Person who Hacks.
The person who bypasses the systems access control
by taking the advantage of security wea...
Types of Hacker
Black

Hat Hackers :

Bad guys or villains, Using there computer skills for Bad
purpose.

White Hat

Hac...
Why Hacking..?
•To

Steal the important information.
Either for there own or for someone else.
•To destroy the computer ne...
Ethical Hacking
It

is Legal
Permission is obtained from the target
Part of an overall security program
Identify vulne...
Why Ethical Hacking
To

develop the security
Permission is obtained from the target
Part of an overall security program...
Final ethical hacking
Final ethical hacking
Final ethical hacking
Final ethical hacking
Upcoming SlideShare
Loading in …5
×

Final ethical hacking

170
-1

Published on

Ethical hacking

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
170
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Final ethical hacking

  1. 1. Hacker The Person who Hacks. The person who bypasses the systems access control by taking the advantage of security weaknesses left in the system by developers. The intelligent programmers who are totally immerged in computer technology. And using there power against the privacy.
  2. 2. Types of Hacker Black Hat Hackers : Bad guys or villains, Using there computer skills for Bad purpose. White Hat Hackers : Good guys. Using there skills to identify security weaknesses and prevent them. These are Ethical Hackers. Grey Hat Hackers : These hackers activity dwell somewhere between white hat and black hat hackers. Being with Black Hat they
  3. 3. Why Hacking..? •To Steal the important information. Either for there own or for someone else. •To destroy the computer network. •To destroy the computer security. •For money. •For showoff.
  4. 4. Ethical Hacking It is Legal Permission is obtained from the target Part of an overall security program Identify vulnerabilities visible from Internet at particular point of time Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner.
  5. 5. Why Ethical Hacking To develop the security Permission is obtained from the target Part of an overall security program Identify vulnerabilities visible from Internet at particular point of time Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner.

×