ethical hacking
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

ethical hacking

on

  • 6,134 views

 

Statistics

Views

Total Views
6,134
Views on SlideShare
6,112
Embed Views
22

Actions

Likes
5
Downloads
538
Comments
3

2 Embeds 22

http://memywld.blogspot.in 18
http://memywld.blogspot.com 4

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

ethical hacking Presentation Transcript

  • 1. welcome
  • 2. Ethical hacking
  • 3. What is hacking?History of hacking?Types of hackers.Hacking methods.Process of Ethical hacking.The pros of ethical hacking.The cons of ethical hacking.
  • 4. What is hacking? It is unconventional way of using a system beyond the original intentions of the manufacturer.Hacking is not limited to computers.
  • 5. What is ethical hacking?It is the use of programming skills to determine vulnerabilities in computer systems.It is also known as the intrusion testing, penetration testing or red teaming.
  • 6. History of hacking.the first hackers appeared in the 1960s at the Massachusetts Institute of Technology (MIT).During the 1970s, a different kind of hacker appeared: the perhaps or phone hackers.
  • 7. History of hacking.In the 1980s, phreaks started to migrate to computers, and the first Bulletin Board Systems(BBS) appeared.During the 1990s, when the use of the internet widespread around the world, hackers multiplied.
  • 8. Types of hackersWhite Hat hackers also referred as Ethical hacker.Black Hat hackers also referred as cracker.Grey Hat hackers also referred as Skilled Hacker.
  • 9. Hacking MethodsPhishing Method.Brute Force Hack.Fake Login Hack.Cookie Steal Hack.Web Mail Hack
  • 10. Process of Ethical hacking.Preparation.Foot printing.Enumeration and fingerprinting.Identification of vulnerabilities.Attack-exploit the vulnerabilities.
  • 11. The pros of ethical hacking .It enables you to find out the problem.Helps you build up a risk management program.Helps you to think like the enemy
  • 12. The cons of ethical hacking.It provides only a snapshot of what is happening.Losing data.Being given a false sense of security.
  • 13. End.Testing is an essential part of any data security program.An ethical hack can reduce the potential exposure of the company to criminal hackers. “It takes a Thief to Catch a Thief”.The periodic ethical hacking and review exercise would enhance the security and mitigate possible loopholes being exploited.
  • 14. Quries??
  • 15. visit me at memywld.blogspot.comTHANK YOU.HAVE A NICE DAY.