Final ethical hacking
Upcoming SlideShare
Loading in...5
×
 

Final ethical hacking

on

  • 192 views

Ethical hacking

Ethical hacking

Statistics

Views

Total Views
192
Views on SlideShare
192
Embed Views
0

Actions

Likes
0
Downloads
6
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Final ethical hacking Final ethical hacking Presentation Transcript

  • Hacker The Person who Hacks. The person who bypasses the systems access control by taking the advantage of security weaknesses left in the system by developers. The intelligent programmers who are totally immerged in computer technology. And using there power against the privacy.
  • Types of Hacker Black Hat Hackers : Bad guys or villains, Using there computer skills for Bad purpose. White Hat Hackers : Good guys. Using there skills to identify security weaknesses and prevent them. These are Ethical Hackers. Grey Hat Hackers : These hackers activity dwell somewhere between white hat and black hat hackers. Being with Black Hat they
  • Why Hacking..? •To Steal the important information. Either for there own or for someone else. •To destroy the computer network. •To destroy the computer security. •For money. •For showoff.
  • Ethical Hacking It is Legal Permission is obtained from the target Part of an overall security program Identify vulnerabilities visible from Internet at particular point of time Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner.
  • Why Ethical Hacking To develop the security Permission is obtained from the target Part of an overall security program Identify vulnerabilities visible from Internet at particular point of time Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner.