Your SlideShare is downloading. ×
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Ethical hacking

903

Published on

0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
903
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
106
Comments
0
Likes
3
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. HackingAuthorized or unauthorizedattempts to bypass thesecurity mechanisms of aninformation system ornetwork.
  • 2. Who is a “HACKER” ? A person who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers.
  • 3. Types of Hackers
  • 4.  The good guys who identify the security weakness of the system or network and inform the owner about them.
  • 5. ◦ A black hat hacker is the villain or bad guy, who crash into victim’s security to steal information and destroy the victims security network.
  • 6. ◦ A grey hat hacker, in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackers.
  • 7. 1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3th1s wh3|| 1 h4ck3d 1nI did not hack this page, it was likethis when I hacked in.
  • 8.  To make security stronger ( Ethical Hacking ). Just for fun. Hack other systems secretly. Steal important information. Destroy enemy’s computer network.
  • 9. ETHICAL HACKING This is a positive approach of hacking. In this type of hacking company’s own software engineers Hack into its server and crack its password. If the password is cracked one time nobody can crack it again so the server is kept secured.
  • 10. World’s famous hackers• Stephen Wozniac• Tsutomu Shimomura
  • 11. World’s famous hackers• Kevin Mitnick• Kevin Poulsen
  • 12. Cybercrime in World
  • 13. Did you know ? Social networking sites like ‘FACEBOOK’,’GMAIL’,’YAHOO” comprised of 60% of direct or indirect hacking incidents. The average age group of hackers are aged between 14-24 yrs. …
  • 14. Preventivemeasures Install a strong anti-virus software. Always run a anti-virus check before you download a program or a file from the internet. Avoid disclosing personal details like phone number, credit card details to strangers.
  • 15. Thank You PRESENTED BY D H RU M I L K H A T R I . V I R A L C H H A T BA R . R I S H I T C H AU H A N . NA K U L K A NA R . MIRAJ THACKER.

×