Presentation on Ethical Hacking this presentation was presented in Nation Conference 2016 on emerging issue in technology management. And a paper on this was also published in college journal
2. Ethics: Ethics are the moral principles that govern a
person's behaviour or the conducting of an activity.
Ethics are a set of moral principles that govern an
individual or a group on what is acceptable
behaviour while using a computer.
Hacking: Hacking is the practice of modifying the
features of a system, in order to accomplish a
goal outside of the creator's original purpose.
The person who is consistently engaging in
hacking activities, and has accepted hacking as
a lifestyle and philosophy of their choice, is
called a Hacker.
3. Ethical Hacking
Methodology adopted by ethical hackers to discover
the vulnerabilities existing in information systems,
operating environments.
An ethical hacker is a computer and networking
expert who systematically attempts to penetrate a
computer system or network on behalf of its owners
for the purpose of finding security vulnerabilities that
a malicious hacker could potentially exploit.
5. 1. White Hat Hackers
The term "white hat" in Internet slang refers to an
ethical computer hacker, or a computer
security expert, who specializes in penetration
testing and in other testing methodologies to ensure
the security of an organization's information systems.
6. 2. Black Hat Hackers
A black hat hacker is an individual with extensive
computer knowledge whose purpose is to breach or
bypass internet security.
Black hat hackers break into secure networks to
destroy, modify, or steal data; or to make the network
unusable for those who are authorized to use the
network.
7. 3. Grey Hat Hackers
A grey hat hacker lies between a black hat and a white
hat hacker. A grey hat hacker may surf the internet
and hack into a computer system for the sole purpose
of notifying the administrator that their system has a
security defect, for example. They may then offer to
correct the defect for a fee.
9. Respect the Privacy of others
Plan your testing process
Respect other’s rights
Use a scientific process
Cont.
10. Conclusion
The term “ethical hacking” has received
criticism at times from people who say that
there is no such thing as an “ethical” hacking.
Individual interested in becoming an ethical
hacker can work towards a certification to
become a Certified Ethical Hacker or CEH.