ethical hacking

7,083 views
6,786 views

Published on

Published in: Lifestyle
3 Comments
6 Likes
Statistics
Notes
No Downloads
Views
Total views
7,083
On SlideShare
0
From Embeds
0
Number of Embeds
84
Actions
Shares
0
Downloads
572
Comments
3
Likes
6
Embeds 0
No embeds

No notes for slide

ethical hacking

  1. 1. welcome
  2. 2. Ethical hacking
  3. 3. What is hacking?History of hacking?Types of hackers.Hacking methods.Process of Ethical hacking.The pros of ethical hacking.The cons of ethical hacking.
  4. 4. What is hacking? It is unconventional way of using a system beyond the original intentions of the manufacturer.Hacking is not limited to computers.
  5. 5. What is ethical hacking?It is the use of programming skills to determine vulnerabilities in computer systems.It is also known as the intrusion testing, penetration testing or red teaming.
  6. 6. History of hacking.the first hackers appeared in the 1960s at the Massachusetts Institute of Technology (MIT).During the 1970s, a different kind of hacker appeared: the perhaps or phone hackers.
  7. 7. History of hacking.In the 1980s, phreaks started to migrate to computers, and the first Bulletin Board Systems(BBS) appeared.During the 1990s, when the use of the internet widespread around the world, hackers multiplied.
  8. 8. Types of hackersWhite Hat hackers also referred as Ethical hacker.Black Hat hackers also referred as cracker.Grey Hat hackers also referred as Skilled Hacker.
  9. 9. Hacking MethodsPhishing Method.Brute Force Hack.Fake Login Hack.Cookie Steal Hack.Web Mail Hack
  10. 10. Process of Ethical hacking.Preparation.Foot printing.Enumeration and fingerprinting.Identification of vulnerabilities.Attack-exploit the vulnerabilities.
  11. 11. The pros of ethical hacking .It enables you to find out the problem.Helps you build up a risk management program.Helps you to think like the enemy
  12. 12. The cons of ethical hacking.It provides only a snapshot of what is happening.Losing data.Being given a false sense of security.
  13. 13. End.Testing is an essential part of any data security program.An ethical hack can reduce the potential exposure of the company to criminal hackers. “It takes a Thief to Catch a Thief”.The periodic ethical hacking and review exercise would enhance the security and mitigate possible loopholes being exploited.
  14. 14. Quries??
  15. 15. visit me at memywld.blogspot.comTHANK YOU.HAVE A NICE DAY.

×