3. WHAT IS ETHICAL HACKING?
It is Legal
Permission is obtained from the target
Part of an overall security program
Identify vulnerabilities visible from Internet
at particular point of time
Ethical hackers possesses same skills,
mindset and tools of a hacker but the
attacks are done in a non-destructive
manner
4. WHY ETHICAL HACKING IS
NEEDED?
Hacker is a person who maliciously breaks
into systems for personal gain.
Technically, these criminals are crackers .
Crackers break into systems with
malicious intent.
Hackers try to compromise computers.
They modify, delete, and steal critical
information, often making their people
miserable .
6. ETHICAL HACKING PROCESS
Formulating plan
Executing plan
Evaluating result
Ethical hacking process
formulating plan
evaluating results
executing plan
7. FORMULATING PLAN
Approval for ethical hacking is essential.
Make what you’re doing known and visible
— at least to the decision makers.
Because no one can point to your work.
8. EXECUTING PLAN
There is a requirement of preplanning of
your test that you are performing.
Ethical hacking can take persistence. Time
and patience are important. Be careful
when you’re performing your ethical
hacking tests.
9. EVALUATING RESULT
Assess your results to see what you
uncovered, assuming that the
vulnerabilities haven’t been made obvious
before now. This is where knowledge
counts. Evaluating the results and
correlating the specific vulnerabilities
discovered is a skill that gets better with
experience.
10. CONCLUSION
Ethical hacking is legal way to securing your
system. main way to that giving your system in
hands of ethical hacker so that he can make
your system full proof . it is a part of overall
security program . system administrator should
always try to find loop holes in to the system and
make preventive majors. Ethical hackers
possesses same skills, mindset and tools of a
hacker but the attacks are done in a nondestructive manner.