On October 23rd, 2014, we updated our
By continuing to use LinkedIn’s SlideShare service, you agree to the revised terms, so please take a few minutes to review them.
What is hacking?History of hacking?Types of hackers.Hacking methods.Process of Ethical hacking.The pros of ethical hacking.The cons of ethical hacking.
What is hacking? It is unconventional way of using a system beyond the original intentions of the manufacturer.Hacking is not limited to computers.
What is ethical hacking?It is the use of programming skills to determine vulnerabilities in computer systems.It is also known as the intrusion testing, penetration testing or red teaming.
History of hacking.the first hackers appeared in the 1960s at the Massachusetts Institute of Technology (MIT).During the 1970s, a different kind of hacker appeared: the perhaps or phone hackers.
History of hacking.In the 1980s, phreaks started to migrate to computers, and the first Bulletin Board Systems(BBS) appeared.During the 1990s, when the use of the internet widespread around the world, hackers multiplied.
Types of hackersWhite Hat hackers also referred as Ethical hacker.Black Hat hackers also referred as cracker.Grey Hat hackers also referred as Skilled Hacker.
Hacking MethodsPhishing Method.Brute Force Hack.Fake Login Hack.Cookie Steal Hack.Web Mail Hack
Process of Ethical hacking.Preparation.Foot printing.Enumeration and fingerprinting.Identification of vulnerabilities.Attack-exploit the vulnerabilities.
The pros of ethical hacking .It enables you to find out the problem.Helps you build up a risk management program.Helps you to think like the enemy
The cons of ethical hacking.It provides only a snapshot of what is happening.Losing data.Being given a false sense of security.
End.Testing is an essential part of any data security program.An ethical hack can reduce the potential exposure of the company to criminal hackers. “It takes a Thief to Catch a Thief”.The periodic ethical hacking and review exercise would enhance the security and mitigate possible loopholes being exploited.
visit me at memywld.blogspot.comTHANK YOU.HAVE A NICE DAY.