3. Content
• Introduction
• Ethical hacking
• Who is hacker?
• Why hacker hack?
• Types of hacker
• What should do after hack?
• How to protect from hacker?
• conclusion
4. Hacker
• Without permission steal the
information or do anything.
Cracker
• Without permission steal
information and destroy the
system.
Introduction
5. Ethical hacker
• Steal the information with the
permission
• Involves same tricks ,techniques that
hacker use
• But major difference is ethical
hacking is legal.
• Not damage system
6. Who is hacker????????
• A person who enjoy the
learning details of
programming language or
system
• A person who picks up
programming quickly.
• A person who is an expert in
any particular programming
language or system.
7. Why do hacker hack?
• Just for fun
• Hack other systems
secretly.
• Steal important
information.
• Destroy enemy’s
computer network during
the war.
9. Black –hat hacker
• a black hat hacker are
individuals with
extraordinary
computing skills ,
resorting to malicious
or destructive activities.
• That is black hat hacker
use their knowledge and
skills for their own
personal gains probably
by hurting other
10. White -hat hacker
White hat hacker are
individuals professing
hacker skills and using
them for defensive
purpose.
This mean that white hat
hacker use their knowledge
and skills for the good of
other .
11. Grey-hat hacker
These are individuals who work
both offensively and defensively
at various times.
We can not predict their
behavior.
Sometimes they use their skills
for the common good or
Sometimes he use their skills
for personal gains.
12. What should do after hacking?
• Shut down or turn off
the system.
• Separate the system
from network.
• Restore the system with
the backup or reinstall
all programs.
• Connect the system to
the network.
• It can be good to call the
police.
13. How to protect from hackers?
• Install antivirus
software.
• Install an anti-
spyware package.
• Use complex
passwords.
• Keep your OS, apps
and browser up to
date.
• Ignore spam.
14. • Keep your OS, apps and browser
up to date.
• Ignore spam.
• Back up your computer.
• Shut it down.
• Secure your network.
• Keep sensitive data off the cloud
15. Conclusion
• Hacking is a crime.
• Ethical hacking is a legal way to securing your
system.
• Keep ourselves updated about those software’s we
and using for official and reliable source.