2. Hacking:
is the act of compromising digital devices
and networks through unauthorized access to
an account or computer system.
Positive
Negative
Ethical Hacking:
methodology adopted by ethical hackers to discover the
harmed existing in information systems of operating
environments
3. Ethical Hacker Goals
• What can an hacker see on the target systems?
• What can an hacker do with that information?
• What are you trying to protect?
• What are you trying to protect against?
• How much time, money, and effort are you willing to
spend in order to have proper protection?
5. Classification of Hackers
Have ability to find unique
vulnerability
Have experience with OS and exploit
existing vulnerabilities
Use scripts and programs developed by
Others for miscellaneous use.
8. • Confidentiality
• Integrity
• Availability
• Use antivirus.
• Proper logout after use of email id.
• Don’t open spam.
Protection Methods
9. Advantage of Ethical Hacking
▪ Helping in closing the open holes in the system network
▪ Provides security to banking and financial
establishments
▪ Prevent website damage
▪ Fight against terrorism and national security breaches
▪ Having a computer system that prevents malicious
hackers from gaining access
Disadvantages of Ethical Hacking
▪ All depends upon the trustworthiness of the
ethical hacker
▪ Hiring professionals is expensive
▪ The ethical hacker using the knowledge they gain to
do malicious hacking activities
▪ Allowing the company’s financial and banking details
to be seen
▪ Massive security breach