• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Ethical hacking

Ethical hacking






Total Views
Views on SlideShare
Embed Views



0 Embeds 0

No embeds



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    Ethical hacking Ethical hacking Presentation Transcript

    • HackingAuthorized or unauthorizedattempts to bypass thesecurity mechanisms of aninformation system ornetwork.
    • Who is a “HACKER” ? A person who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers.
    • Types of Hackers
    •  The good guys who identify the security weakness of the system or network and inform the owner about them.
    • ◦ A black hat hacker is the villain or bad guy, who crash into victim’s security to steal information and destroy the victims security network.
    • ◦ A grey hat hacker, in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackers.
    • 1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3th1s wh3|| 1 h4ck3d 1nI did not hack this page, it was likethis when I hacked in.
    •  To make security stronger ( Ethical Hacking ). Just for fun. Hack other systems secretly. Steal important information. Destroy enemy’s computer network.
    • ETHICAL HACKING This is a positive approach of hacking. In this type of hacking company’s own software engineers Hack into its server and crack its password. If the password is cracked one time nobody can crack it again so the server is kept secured.
    • World’s famous hackers• Stephen Wozniac• Tsutomu Shimomura
    • World’s famous hackers• Kevin Mitnick• Kevin Poulsen
    • Cybercrime in World
    • Did you know ? Social networking sites like ‘FACEBOOK’,’GMAIL’,’YAHOO” comprised of 60% of direct or indirect hacking incidents. The average age group of hackers are aged between 14-24 yrs. …
    • Preventivemeasures Install a strong anti-virus software. Always run a anti-virus check before you download a program or a file from the internet. Avoid disclosing personal details like phone number, credit card details to strangers.
    • Thank You PRESENTED BY D H RU M I L K H A T R I . V I R A L C H H A T BA R . R I S H I T C H AU H A N . NA K U L K A NA R . MIRAJ THACKER.