presentation on ethical hacking

8,980 views

Published on

Published in: Technology
5 Comments
9 Likes
Statistics
Notes
No Downloads
Views
Total views
8,980
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
700
Comments
5
Likes
9
Embeds 0
No embeds

No notes for slide

presentation on ethical hacking

  1. 1. WELCOME TO TECHNO PAPER PRESENTATION
  2. 2. ETHICAL HACKING BY AMOL DESHMUKH DHIRAJ BAHAKAR AMOL DAMBALE
  3. 3. WHAT IS ETHICAL HACKING? It is Legal Permission is obtained from the target Part of an overall security program Identify vulnerabilities visible from Internet at particular point of time Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner
  4. 4. WHY ETHICAL HACKING IS NEEDED? Hacker is a person who maliciously breaks into systems for personal gain. Technically, these criminals are crackers . Crackers break into systems with malicious intent.  Hackers try to compromise computers. They modify, delete, and steal critical information, often making their people miserable .
  5. 5. Working principle of ethical hacker : “TO CATCH A THIEF , THINK LIKE A THIEF…….”
  6. 6. ETHICAL HACKING PROCESS Formulating plan Executing plan Evaluating result Ethical hacking process formulating plan evaluating results executing plan
  7. 7. FORMULATING PLAN Approval for ethical hacking is essential. Make what you’re doing known and visible — at least to the decision makers. Because no one can point to your work.
  8. 8. EXECUTING PLAN There is a requirement of preplanning of your test that you are performing. Ethical hacking can take persistence. Time and patience are important. Be careful when you’re performing your ethical hacking tests.
  9. 9. EVALUATING RESULT Assess your results to see what you uncovered, assuming that the vulnerabilities haven’t been made obvious before now. This is where knowledge counts. Evaluating the results and correlating the specific vulnerabilities discovered is a skill that gets better with experience.
  10. 10. CONCLUSION  Ethical hacking is legal way to securing your system. main way to that giving your system in hands of ethical hacker so that he can make your system full proof . it is a part of overall security program . system administrator should always try to find loop holes in to the system and make preventive majors. Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a nondestructive manner.

×