SlideShare a Scribd company logo
1 of 10
Presented by:-
Rajan Chhangani
Hemant Gaur
MBA 2nd Sem.
JIET-SOM
Ethics: Ethics are the moral principles that govern a
person's behaviour or the conducting of an activity.
Ethics are a set of moral principles that govern an
individual or a group on what is acceptable
behaviour while using a computer.
Hacking: Hacking is the practice of modifying the
features of a system, in order to accomplish a
goal outside of the creator's original purpose.
The person who is consistently engaging in
hacking activities, and has accepted hacking as
a lifestyle and philosophy of their choice, is
called a Hacker.
Ethical Hacking
Methodology adopted by ethical hackers to discover
the vulnerabilities existing in information systems,
operating environments.
An ethical hacker is a computer and networking
expert who systematically attempts to penetrate a
computer system or network on behalf of its owners
for the purpose of finding security vulnerabilities that
a malicious hacker could potentially exploit.
Types of Hackers
1. White Hat Hackers
The term "white hat" in Internet slang refers to an
ethical computer hacker, or a computer
security expert, who specializes in penetration
testing and in other testing methodologies to ensure
the security of an organization's information systems.
2. Black Hat Hackers
A black hat hacker is an individual with extensive
computer knowledge whose purpose is to breach or
bypass internet security.
Black hat hackers break into secure networks to
destroy, modify, or steal data; or to make the network
unusable for those who are authorized to use the
network.
3. Grey Hat Hackers
A grey hat hacker lies between a black hat and a white
hat hacker. A grey hat hacker may surf the internet
and hack into a computer system for the sole purpose
of notifying the administrator that their system has a
security defect, for example. They may then offer to
correct the defect for a fee.
Commandment of Ethical
Hacking
Obtain Permission
Work Ethically
Keep Records
Do no Harm
Respect the Privacy of others
Plan your testing process
Respect other’s rights
Use a scientific process
Cont.
Conclusion
The term “ethical hacking” has received
criticism at times from people who say that
there is no such thing as an “ethical” hacking.
Individual interested in becoming an ethical
hacker can work towards a certification to
become a Certified Ethical Hacker or CEH.

More Related Content

What's hot (20)

Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Hacking
HackingHacking
Hacking
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Hacking
HackingHacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
Haking PPT
Haking PPTHaking PPT
Haking PPT
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Digital signature
Digital signatureDigital signature
Digital signature
 

Viewers also liked

El sistema económico
El sistema económicoEl sistema económico
El sistema económicoElkin Guillen
 
The killers[1]
The killers[1]The killers[1]
The killers[1]breygood
 
Sharkey response
Sharkey responseSharkey response
Sharkey responseaquae43
 
Who is Derek Dashti
Who is Derek DashtiWho is Derek Dashti
Who is Derek Dashtibprzest
 
Actividaddeaprendizaje08 (1)
Actividaddeaprendizaje08 (1)Actividaddeaprendizaje08 (1)
Actividaddeaprendizaje08 (1)joycirivera
 
Gran rendimiento cuando no se exigen grandes cualificaciones
Gran rendimiento cuando no se exigen grandes cualificacionesGran rendimiento cuando no se exigen grandes cualificaciones
Gran rendimiento cuando no se exigen grandes cualificacionesjoycirivera
 
Jesse's 1st Photo Story
Jesse's 1st Photo StoryJesse's 1st Photo Story
Jesse's 1st Photo StoryJesse Blume
 
Симметрии, асимметрии и антисимметрии в пространстве НИРов
Симметрии, асимметрии и антисимметрии в пространстве НИРовСимметрии, асимметрии и антисимметрии в пространстве НИРов
Симметрии, асимметрии и антисимметрии в пространстве НИРовlukoshka
 
Using social for customer service: Separating content and support - Claire Ka...
Using social for customer service: Separating content and support - Claire Ka...Using social for customer service: Separating content and support - Claire Ka...
Using social for customer service: Separating content and support - Claire Ka...OpenKnowledge srl
 
2.3 investigación de la comunicación en los estados unidos
2.3 investigación de la comunicación en los estados unidos2.3 investigación de la comunicación en los estados unidos
2.3 investigación de la comunicación en los estados unidosRichard Pastor Hernandez
 
2 epistemología de la comunicación hilda saladrigas
2  epistemología de la comunicación  hilda saladrigas2  epistemología de la comunicación  hilda saladrigas
2 epistemología de la comunicación hilda saladrigasRichard Pastor Hernandez
 
7 naturaleza y función de la communicación de masas
7  naturaleza y función de la communicación de masas7  naturaleza y función de la communicación de masas
7 naturaleza y función de la communicación de masasRichard Pastor Hernandez
 

Viewers also liked (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
El sistema económico
El sistema económicoEl sistema económico
El sistema económico
 
The killers[1]
The killers[1]The killers[1]
The killers[1]
 
IT SCope Fool
IT SCope FoolIT SCope Fool
IT SCope Fool
 
Sharkey response
Sharkey responseSharkey response
Sharkey response
 
Who is Derek Dashti
Who is Derek DashtiWho is Derek Dashti
Who is Derek Dashti
 
Actividaddeaprendizaje08 (1)
Actividaddeaprendizaje08 (1)Actividaddeaprendizaje08 (1)
Actividaddeaprendizaje08 (1)
 
Gran rendimiento cuando no se exigen grandes cualificaciones
Gran rendimiento cuando no se exigen grandes cualificacionesGran rendimiento cuando no se exigen grandes cualificaciones
Gran rendimiento cuando no se exigen grandes cualificaciones
 
Jesse's 1st Photo Story
Jesse's 1st Photo StoryJesse's 1st Photo Story
Jesse's 1st Photo Story
 
Supporting Ryan McElroy Children's Cancer Foundation
Supporting Ryan McElroy Children's Cancer FoundationSupporting Ryan McElroy Children's Cancer Foundation
Supporting Ryan McElroy Children's Cancer Foundation
 
Симметрии, асимметрии и антисимметрии в пространстве НИРов
Симметрии, асимметрии и антисимметрии в пространстве НИРовСимметрии, асимметрии и антисимметрии в пространстве НИРов
Симметрии, асимметрии и антисимметрии в пространстве НИРов
 
Salon bello
Salon belloSalon bello
Salon bello
 
Unique selling propositions for heme iron
Unique selling propositions for heme ironUnique selling propositions for heme iron
Unique selling propositions for heme iron
 
Future Warfare
Future WarfareFuture Warfare
Future Warfare
 
Using social for customer service: Separating content and support - Claire Ka...
Using social for customer service: Separating content and support - Claire Ka...Using social for customer service: Separating content and support - Claire Ka...
Using social for customer service: Separating content and support - Claire Ka...
 
2.3 investigación de la comunicación en los estados unidos
2.3 investigación de la comunicación en los estados unidos2.3 investigación de la comunicación en los estados unidos
2.3 investigación de la comunicación en los estados unidos
 
2 epistemología de la comunicación hilda saladrigas
2  epistemología de la comunicación  hilda saladrigas2  epistemología de la comunicación  hilda saladrigas
2 epistemología de la comunicación hilda saladrigas
 
7 naturaleza y función de la communicación de masas
7  naturaleza y función de la communicación de masas7  naturaleza y función de la communicación de masas
7 naturaleza y función de la communicación de masas
 

Similar to Ethical Hacking

Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical HackingMasih Karimi
 
Why Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdfWhy Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdfvinsys2
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hackingGeorgekutty Francis
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentationteriwoja
 
What is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfWhat is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfJawaidAbdulHameed
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speechtalhaabid
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPTashish kumar
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxBishalRay8
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksAman Gupta
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical HackingAkashy Kale
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxGautam708801
 
Web security chapter#2
Web security chapter#2Web security chapter#2
Web security chapter#2Ishaq Shinwari
 

Similar to Ethical Hacking (20)

Hackers
HackersHackers
Hackers
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical-Hacking.pdf
Ethical-Hacking.pdfEthical-Hacking.pdf
Ethical-Hacking.pdf
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical Hacking
 
Why Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdfWhy Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdf
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
What is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfWhat is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdf
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
Hacking
HackingHacking
Hacking
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
Web security chapter#2
Web security chapter#2Web security chapter#2
Web security chapter#2
 

More from Rajan Chhangani

Modes of Cashless Transactions - Cash-less Indian Economy
Modes of Cashless Transactions - Cash-less Indian EconomyModes of Cashless Transactions - Cash-less Indian Economy
Modes of Cashless Transactions - Cash-less Indian EconomyRajan Chhangani
 
Internship (Training) Report on Brand Awareness Analysis at Ultra Tech Cement...
Internship (Training) Report on Brand Awareness Analysis at Ultra Tech Cement...Internship (Training) Report on Brand Awareness Analysis at Ultra Tech Cement...
Internship (Training) Report on Brand Awareness Analysis at Ultra Tech Cement...Rajan Chhangani
 
Birla white - Aditya Birla Group
Birla white - Aditya Birla GroupBirla white - Aditya Birla Group
Birla white - Aditya Birla GroupRajan Chhangani
 
Management Practices of Narayan Murthi
Management Practices of Narayan MurthiManagement Practices of Narayan Murthi
Management Practices of Narayan MurthiRajan Chhangani
 
Birla White Ltd. Internship/Summer Training Report - Brand Awareness Analysis
Birla White Ltd. Internship/Summer Training Report - Brand Awareness AnalysisBirla White Ltd. Internship/Summer Training Report - Brand Awareness Analysis
Birla White Ltd. Internship/Summer Training Report - Brand Awareness AnalysisRajan Chhangani
 
Working Mechanism of Pinterest and LinkedIn
Working Mechanism of Pinterest and LinkedInWorking Mechanism of Pinterest and LinkedIn
Working Mechanism of Pinterest and LinkedInRajan Chhangani
 
Industrial dispute act. 1947
Industrial dispute act. 1947Industrial dispute act. 1947
Industrial dispute act. 1947Rajan Chhangani
 
Balance scorecard costing - Rajan Chhangani
Balance scorecard costing - Rajan ChhanganiBalance scorecard costing - Rajan Chhangani
Balance scorecard costing - Rajan ChhanganiRajan Chhangani
 

More from Rajan Chhangani (11)

Modes of Cashless Transactions - Cash-less Indian Economy
Modes of Cashless Transactions - Cash-less Indian EconomyModes of Cashless Transactions - Cash-less Indian Economy
Modes of Cashless Transactions - Cash-less Indian Economy
 
Internship (Training) Report on Brand Awareness Analysis at Ultra Tech Cement...
Internship (Training) Report on Brand Awareness Analysis at Ultra Tech Cement...Internship (Training) Report on Brand Awareness Analysis at Ultra Tech Cement...
Internship (Training) Report on Brand Awareness Analysis at Ultra Tech Cement...
 
Birla white - Aditya Birla Group
Birla white - Aditya Birla GroupBirla white - Aditya Birla Group
Birla white - Aditya Birla Group
 
Management Practices of Narayan Murthi
Management Practices of Narayan MurthiManagement Practices of Narayan Murthi
Management Practices of Narayan Murthi
 
Birla White Ltd. Internship/Summer Training Report - Brand Awareness Analysis
Birla White Ltd. Internship/Summer Training Report - Brand Awareness AnalysisBirla White Ltd. Internship/Summer Training Report - Brand Awareness Analysis
Birla White Ltd. Internship/Summer Training Report - Brand Awareness Analysis
 
Working Mechanism of Pinterest and LinkedIn
Working Mechanism of Pinterest and LinkedInWorking Mechanism of Pinterest and LinkedIn
Working Mechanism of Pinterest and LinkedIn
 
Steven paul jobs
Steven paul jobsSteven paul jobs
Steven paul jobs
 
Industrial dispute act. 1947
Industrial dispute act. 1947Industrial dispute act. 1947
Industrial dispute act. 1947
 
Skill india-PMKVY
Skill india-PMKVYSkill india-PMKVY
Skill india-PMKVY
 
Mumbai dabbawala
Mumbai dabbawalaMumbai dabbawala
Mumbai dabbawala
 
Balance scorecard costing - Rajan Chhangani
Balance scorecard costing - Rajan ChhanganiBalance scorecard costing - Rajan Chhangani
Balance scorecard costing - Rajan Chhangani
 

Recently uploaded

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Ethical Hacking

  • 1. Presented by:- Rajan Chhangani Hemant Gaur MBA 2nd Sem. JIET-SOM
  • 2. Ethics: Ethics are the moral principles that govern a person's behaviour or the conducting of an activity. Ethics are a set of moral principles that govern an individual or a group on what is acceptable behaviour while using a computer. Hacking: Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a Hacker.
  • 3. Ethical Hacking Methodology adopted by ethical hackers to discover the vulnerabilities existing in information systems, operating environments. An ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit.
  • 5. 1. White Hat Hackers The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.
  • 6. 2. Black Hat Hackers A black hat hacker is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security. Black hat hackers break into secure networks to destroy, modify, or steal data; or to make the network unusable for those who are authorized to use the network.
  • 7. 3. Grey Hat Hackers A grey hat hacker lies between a black hat and a white hat hacker. A grey hat hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect, for example. They may then offer to correct the defect for a fee.
  • 8. Commandment of Ethical Hacking Obtain Permission Work Ethically Keep Records Do no Harm
  • 9. Respect the Privacy of others Plan your testing process Respect other’s rights Use a scientific process Cont.
  • 10. Conclusion The term “ethical hacking” has received criticism at times from people who say that there is no such thing as an “ethical” hacking. Individual interested in becoming an ethical hacker can work towards a certification to become a Certified Ethical Hacker or CEH.