HackingAuthorized or unauthorizedattempts to bypass thesecurity mechanisms of aninformation system ornetwork.
Who is a “HACKER” ? A person who bypasses the system’s access controls by taking advantage of security weaknesses left in...
Types of Hackers
   The good guys who identify the    security weakness of the system    or network and inform the owner    about them.
◦ A black hat hacker is the villain or  bad guy, who crash into victim’s  security to steal information and  destroy the v...
◦ A grey hat hacker, in the hacking  community, refers to a skilled hacker  who is somewhere in between white  and black h...
1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3th1s wh3|| 1 h4ck3d 1nI did not hack this page, it was likethis when I hacked in.
 To make security stronger ( Ethical Hacking ). Just for fun. Hack other systems secretly. Steal important information...
ETHICAL HACKING This is a positive approach of hacking. In this type of hacking company’s own  software engineers Hack i...
World’s famous hackers• Stephen Wozniac• Tsutomu Shimomura
World’s famous hackers• Kevin Mitnick• Kevin Poulsen
Cybercrime in World
Did you know ? Social networking sites like  ‘FACEBOOK’,’GMAIL’,’YAHOO”  comprised of 60% of direct or  indirect hacking ...
Preventivemeasures Install a strong anti-virus software. Always run a anti-virus check before  you download a program or...
Thank You PRESENTED BY D H RU M I L K H A T R I . V I R A L C H H A T BA R . R I S H I T C H AU H A N . NA K U L K A ...
Ethical hacking
Upcoming SlideShare
Loading in...5
×

Ethical hacking

934

Published on

0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
934
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
110
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide

Ethical hacking

  1. 1. HackingAuthorized or unauthorizedattempts to bypass thesecurity mechanisms of aninformation system ornetwork.
  2. 2. Who is a “HACKER” ? A person who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers.
  3. 3. Types of Hackers
  4. 4.  The good guys who identify the security weakness of the system or network and inform the owner about them.
  5. 5. ◦ A black hat hacker is the villain or bad guy, who crash into victim’s security to steal information and destroy the victims security network.
  6. 6. ◦ A grey hat hacker, in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackers.
  7. 7. 1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3th1s wh3|| 1 h4ck3d 1nI did not hack this page, it was likethis when I hacked in.
  8. 8.  To make security stronger ( Ethical Hacking ). Just for fun. Hack other systems secretly. Steal important information. Destroy enemy’s computer network.
  9. 9. ETHICAL HACKING This is a positive approach of hacking. In this type of hacking company’s own software engineers Hack into its server and crack its password. If the password is cracked one time nobody can crack it again so the server is kept secured.
  10. 10. World’s famous hackers• Stephen Wozniac• Tsutomu Shimomura
  11. 11. World’s famous hackers• Kevin Mitnick• Kevin Poulsen
  12. 12. Cybercrime in World
  13. 13. Did you know ? Social networking sites like ‘FACEBOOK’,’GMAIL’,’YAHOO” comprised of 60% of direct or indirect hacking incidents. The average age group of hackers are aged between 14-24 yrs. …
  14. 14. Preventivemeasures Install a strong anti-virus software. Always run a anti-virus check before you download a program or a file from the internet. Avoid disclosing personal details like phone number, credit card details to strangers.
  15. 15. Thank You PRESENTED BY D H RU M I L K H A T R I . V I R A L C H H A T BA R . R I S H I T C H AU H A N . NA K U L K A NA R . MIRAJ THACKER.
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×