Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. This presentation covers the following topics:
1. What is Ethical hacking
2. Goals of of ethical hacker
3. Why do we need of ethical hacker
4. Types of ethical hacker
5. Advantages of of ethical hacker
6. Disadvantages of ethical hacker
7. Phases of of ethical hacker
2. What is Ethical Hacking
Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system,
application, or data.
3. Goals of Ethical hacking
Inform hardware and
software vendors of
the identified
weaknesses
Transparently report -
All the identified
weaknesses in the
computer system to
the organization
Protect the privacy of
the organization
been hacked
4. Why do we need Ethical Hacking
◦ Ethical hacking is testing the resources for a good
cause and for the betterment of technology
◦ It also means to secure the system.
◦ There is a tremendous rise in cyber crimes, so in
those cases ethical hacking act as a safeguard on
internet and corporate networks and their websites.
5. Types of Ethical hacker
Black Hat Hacker Grey Hat Hacker White Hat Hacker
6. Advantages of Ethical Hacking
•Fighting against terrorism
and national security
breaches
•Having a computer system
that prevents malicious
hackers from gaining access
•Having adequate
preventative measures in
place to prevent security
breaches
7. Disadvantages of Ethical Hacking
•The ethical hacker using the
knowledge they gain to do
malicious hacking activities
•Allowing the company’s
financial and banking details
to be seen
•The possibility that the
ethical hacker will send
malicious code, viruses,
malware and other
destructive and harmful
things on a computer system
•Massive security breach