SlideShare a Scribd company logo
1 of 20
Joseph Francis
Sooraj Sumedan
Jeshin Jose
Elwin Varghese
Joseph Chethalan
Pranav
What is hacking?
Is hacking a
crime?
Hacking Vs
Cracking
Types of hackers
Case study
Security
Flashback
What is Ethical Hacking??
Ethical Hacking is testing
the resources for a good
cause and for the
betterment of technology.
Technically Ethical Hacking
means penetration
testing which is focused on
Securing and Protecting IT
Systems.
Hacker is a word that has two
meanings:
Traditionally, a Hacker is
someone who likes to play with
Software or Electronic Systems.
Recently, Hacker has taken on a
new meaning — someone who
maliciously breaks into systems for
personal gain. Technically, these
criminals & are known as Crackers.
HACKING WITH MALICIOUS INTENTION
IS CRACKING
The basic difference is hackers do
not do anything disastrous.
Cracking yield more devastating
results.
Cracking is crime.
Cyber crime are the results of
cracking ,not hacking
• It is Legal
• Permission is obtained from the target
• Part of an overall security program
• Identify vulnerabilities visible from Internet
at
particular point of time
• Ethical hackers possesses same skills,
mindset
and tools of a hacker but the attacks are
done in
a non-destructive manner
Script kiddies or packet monkeys
• Young in-experienced hackers
• Copy codes and techniques from
knowledgeable hackers .
• Don’t know what’s going beyond
the coding.
• Use techniques for fun purpose.
• Sometimes could be very
dangerous for the system,
These are good hackers .
Have genuine license to hack.
Have registered police records
Evolves themselves in good works
Generally owned by companies
for security designing
Have high pay scales.
Generally these are coders
very dangerous persons.
Always have motive to earn
huge profit.
Highly paid persons.
Evolves themselves mostly in
criminal activities.
These could be coders,
admins as well as script kiddies
Also known as red hats.
Perform both tasks fair as
well as unfair.
Generally these are admins.
Have little high pay than
white hats.
Generally not so
dangerous, but sometimes
could be.
It is clear from the graph it is increasing day by day.
Use of anti-viruses.
Proper logout after use
of mail id.
Manual opening browser
don't open spam.
Password protected
admin account.
Nahshon Even-Chaim (born May 1971), was
the first major computer hacker
Stewert Nelson from America followed
Nehshon in 1972
Ankit Phadia from India is also a well known
name in hackers history
Abdur zahir from Pakistan has also a good
name in this world
HACKING IS USING AN
AUTHORISE THING IN A UN
AUTHORISED MANNER
HACKIING IS ILLEGAL BUT NOT A
CRIME.
TYPES OF HACKERS.
VIRUSES ,WORMS & TROJANS.
ADMIN PASSWORD HACKING
1861229635078720084665000 131012131913-phpapp02
1861229635078720084665000 131012131913-phpapp02

More Related Content

What's hot (20)

Hacking
HackingHacking
Hacking
 
Ethical hacking course
Ethical hacking courseEthical hacking course
Ethical hacking course
 
Ethical hacking composed
Ethical hacking composedEthical hacking composed
Ethical hacking composed
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Hacking
HackingHacking
Hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical Hacking Ethical Hacking
Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Hackers
HackersHackers
Hackers
 
Computer and Internet hacking
Computer and Internet hackingComputer and Internet hacking
Computer and Internet hacking
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
 
Hackers
HackersHackers
Hackers
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Viewers also liked

Viewers also liked (20)

Doc1
Doc1Doc1
Doc1
 
Sistema tegumentario y faneras (1)
Sistema tegumentario y faneras (1)Sistema tegumentario y faneras (1)
Sistema tegumentario y faneras (1)
 
7 Helpful Tips for Better Personal Organisation
7 Helpful Tips for Better Personal Organisation7 Helpful Tips for Better Personal Organisation
7 Helpful Tips for Better Personal Organisation
 
Evid001
Evid001Evid001
Evid001
 
Tejido conj clase1
Tejido conj clase1Tejido conj clase1
Tejido conj clase1
 
Competencias De La Informacion
Competencias De La InformacionCompetencias De La Informacion
Competencias De La Informacion
 
messumarkkinointi
messumarkkinointimessumarkkinointi
messumarkkinointi
 
LiQuiTube Price Per Truck Tire
LiQuiTube  Price Per Truck TireLiQuiTube  Price Per Truck Tire
LiQuiTube Price Per Truck Tire
 
Conectores Básicos
Conectores BásicosConectores Básicos
Conectores Básicos
 
3d9e78c1 b113-470d-881e-0e07bec6fdfd
3d9e78c1 b113-470d-881e-0e07bec6fdfd3d9e78c1 b113-470d-881e-0e07bec6fdfd
3d9e78c1 b113-470d-881e-0e07bec6fdfd
 
Heidys jaraba. infor
Heidys jaraba. inforHeidys jaraba. infor
Heidys jaraba. infor
 
Arte en hierro
Arte en hierroArte en hierro
Arte en hierro
 
COMUNICADO DE LA MARCHA DEL 18 DE DICIEMBRE DEL 2014
COMUNICADO DE LA MARCHA DEL 18 DE DICIEMBRE DEL 2014COMUNICADO DE LA MARCHA DEL 18 DE DICIEMBRE DEL 2014
COMUNICADO DE LA MARCHA DEL 18 DE DICIEMBRE DEL 2014
 
Tsag uyee medertsgeeye
Tsag uyee medertsgeeyeTsag uyee medertsgeeye
Tsag uyee medertsgeeye
 
комп’ютерна графіка
комп’ютерна графікакомп’ютерна графіка
комп’ютерна графіка
 
Avances tecnologicos
Avances tecnologicosAvances tecnologicos
Avances tecnologicos
 
Promocionales
PromocionalesPromocionales
Promocionales
 
My family
My familyMy family
My family
 
Project
ProjectProject
Project
 
Aaaaaaaaaaaaaaaaaaaaant
AaaaaaaaaaaaaaaaaaaaantAaaaaaaaaaaaaaaaaaaaant
Aaaaaaaaaaaaaaaaaaaaant
 

Similar to 1861229635078720084665000 131012131913-phpapp02

ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern timesjeshin jose
 
Ethical Hacking (basics)
Ethical Hacking (basics)Ethical Hacking (basics)
Ethical Hacking (basics)DeepHaria4
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical HackingAkashy Kale
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingManas Das
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingManas Das
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentationteriwoja
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingAkshay Kale
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPTashish kumar
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...PavanKumarSurala
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber securityankit gandharkar
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
EthicalHacking_AakashTakale
EthicalHacking_AakashTakaleEthicalHacking_AakashTakale
EthicalHacking_AakashTakaleAakash Takale
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxGautam708801
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxMaheshDhope1
 

Similar to 1861229635078720084665000 131012131913-phpapp02 (20)

ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking (basics)
Ethical Hacking (basics)Ethical Hacking (basics)
Ethical Hacking (basics)
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
EthicalHacking_AakashTakale
EthicalHacking_AakashTakaleEthicalHacking_AakashTakale
EthicalHacking_AakashTakale
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 

1861229635078720084665000 131012131913-phpapp02

  • 1.
  • 2. Joseph Francis Sooraj Sumedan Jeshin Jose Elwin Varghese Joseph Chethalan Pranav
  • 3. What is hacking? Is hacking a crime? Hacking Vs Cracking Types of hackers Case study Security Flashback
  • 4. What is Ethical Hacking?? Ethical Hacking is testing the resources for a good cause and for the betterment of technology. Technically Ethical Hacking means penetration testing which is focused on Securing and Protecting IT Systems.
  • 5.
  • 6. Hacker is a word that has two meanings: Traditionally, a Hacker is someone who likes to play with Software or Electronic Systems. Recently, Hacker has taken on a new meaning — someone who maliciously breaks into systems for personal gain. Technically, these criminals & are known as Crackers.
  • 7. HACKING WITH MALICIOUS INTENTION IS CRACKING The basic difference is hackers do not do anything disastrous. Cracking yield more devastating results. Cracking is crime. Cyber crime are the results of cracking ,not hacking
  • 8. • It is Legal • Permission is obtained from the target • Part of an overall security program • Identify vulnerabilities visible from Internet at particular point of time • Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner
  • 9.
  • 10. Script kiddies or packet monkeys • Young in-experienced hackers • Copy codes and techniques from knowledgeable hackers . • Don’t know what’s going beyond the coding. • Use techniques for fun purpose. • Sometimes could be very dangerous for the system,
  • 11. These are good hackers . Have genuine license to hack. Have registered police records Evolves themselves in good works Generally owned by companies for security designing Have high pay scales. Generally these are coders
  • 12. very dangerous persons. Always have motive to earn huge profit. Highly paid persons. Evolves themselves mostly in criminal activities. These could be coders, admins as well as script kiddies
  • 13. Also known as red hats. Perform both tasks fair as well as unfair. Generally these are admins. Have little high pay than white hats. Generally not so dangerous, but sometimes could be.
  • 14. It is clear from the graph it is increasing day by day.
  • 15. Use of anti-viruses. Proper logout after use of mail id. Manual opening browser don't open spam. Password protected admin account.
  • 16.
  • 17. Nahshon Even-Chaim (born May 1971), was the first major computer hacker Stewert Nelson from America followed Nehshon in 1972 Ankit Phadia from India is also a well known name in hackers history Abdur zahir from Pakistan has also a good name in this world
  • 18. HACKING IS USING AN AUTHORISE THING IN A UN AUTHORISED MANNER HACKIING IS ILLEGAL BUT NOT A CRIME. TYPES OF HACKERS. VIRUSES ,WORMS & TROJANS. ADMIN PASSWORD HACKING