SlideShare a Scribd company logo
1 of 19
Cyber Ethics
By Dholakiya Mohit
1Noble Group of Institutions, Junagadh
 Why security is required?
 Introduction to hacking
 Hackers
 Types of hackers
 Vulnerability
 Hacking through ports
 Conclusion
2
Index
Noble Group of Institutions, Junagadh
 In today’s day to day life use of Internet has been
increased in vast.
 If we see there is a threat for the security issues.
 At company level if any breach has been found there
may threat of leaking of asset and skills of employees
 At government level any of the security can affect the
reputation of country.
3
Why security is required?
Noble Group of Institutions, Junagadh
 Nowadays the increased use of infrastructures of
internet has been given threat of security
 Many sites which relate to the payment can be
breached and all the money can be stolen
 Phishing is common attack nowadays which leads to
requirement of the security to internet access
 Malware attacks, ransom ware attacks are also results
of lack of security.
4
Cont..
Noble Group of Institutions, Junagadh
 Hacking is nothing but a art through which one can
find breaches and loopholes.
 Hacking can also be termed as anti-social activity.
 Hacking can be relatable to both good and bad uses
of itself
 One can help through finding breaches into any of the
source
5
Introduction to Hacking
Noble Group of Institutions, Junagadh
 When any hacker use it in a bad way it can lead to
many of the critical damages to sources.
 It can lead to dangerous issues of the crimes as well
profitable acts also.
 Many script kiddies can be available with negative
sidelines.
 Thus hacking can lead to both positive and negative
effects.
6
Cont..
Noble Group of Institutions, Junagadh
 Hackers are those persons who can use the term
hacking in there own way in a professional way.
 In simple terms hackers are intelligent computer
professional.
 There can be different motives for an hacker by there
hacking.
 It can be both positive and negative.
7
Hackers
Noble Group of Institutions, Junagadh
Motives or intentions:
• One can hack something to get deepest knowledge of the
system.
• Many hackers can hack something for knowing the backened
process of the system.
• Main motive can be finding the vulnerabilities in any system.
• The hackeres can create security awareness in people of the
organization or institutions.
• Malicious intentions can be one of the motive.
• Many other motives are been notified.
8
Cont..
Noble Group of Institutions, Junagadh
Types of Hackers are defined or based on the motives
or intentions.
They can also be said on the work or type of hacking
they do.
There are different types of Hackers:
• Black hat
• White hat
• Grey hat
9
Types of Hackers
Noble Group of Institutions, Junagadh
 Black hat hackers is the term which is given to such
hackers who do some illegal activities
 They are the hackers who have not thought about the
postiveness.
 They are the stereotypical groups who don’t care
about any good motives.
 They hack into any system to destroy, deploy, steal
data, modify data and many other.
10
Black Hat
Noble Group of Institutions, Junagadh
 White hat hackers are totally opposite from balck hat
hackers.
 They are hackers which are helping the instituitons
and organizations.
 They find the vulnerabilities in any of the system for
helping purpose
 They are not giving the threats to any of the
companies or organization.
11
White hat
Noble Group of Institutions, Junagadh
 Gray hat hackers are the hackers which can be said to
be combination of black hat and white hat hackers
 Gray hat hackers hack any of the system on the order
of any organization or institutions.
 The do not have any of intentions of destroying or
damaging any system.
 Thus they are not having criminal ideas.
12
Grey Hat
Noble Group of Institutions, Junagadh
 Phreaks are very interesting persons who use
different breaching processes
 They are included in types of Hackers in terms for
different types of hacking.
 They are named Phreaks because those are the
hackers who breaks into mobile phones.
 They do so by using different computer networks and
devices.
13
Phreaks
Noble Group of Institutions, Junagadh
 Those can also be included into types of Hackers.
 They don’t have any of the technical skills for hacking
any of the systems.
 Though they are included because they use available
information from any other source to break into the
systems or organization.
 They do such activities for fun or curiosity activities.
14
Script Kiddies
Noble Group of Institutions, Junagadh
 Term vulnerability is nothing but the mistakes in any
of the sites or any of the organizations or institutions.
 Those are the available loopholes in server system or
network.
 Vulnerability can be found out anywhere by any
means through different methods.
 It’s notes can be searched on internet through
number or CVE.
15
Vulnerability
Noble Group of Institutions, Junagadh
 There are many ways to hack into something as said
in ahead slides
 One of those is through ports available.
 Ports can be available in hardware part or software
part or network part.
 This method of hacking is simplest way to hack
something available.
16
Hacking through ports
Noble Group of Institutions, Junagadh
We have many available ports for hacking like:
 Physical: USB,Serial
 Virtual: 1 to 65535
 From above 1 to 65535 ports port number 80,443and 21 are
the most important ports for any website. That will be
explained in detail in second PPT.
 SMTP (Simple Mail Transfer Protocol): Port number 25
 POP(Post Office Protocol):Port number 110
17
Cont…
Noble Group of Institutions, Junagadh
 We should be having security in our surroundings
because it is important to be prevented than cured.
 And Ethical Hacking helps to solve many problems
through providing security.
 There are community of hackers available.
 Help others by providing security
 To catch criminal only think like a criminal don’t be a
criminal
18
Conclusion
Noble Group of Institutions, Junagadh
19

More Related Content

What's hot

What's hot (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & Cybercrime
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Cyber safe girl e book
Cyber safe girl e bookCyber safe girl e book
Cyber safe girl e book
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
 
Ppt growing need of cyber security
Ppt  growing need of cyber securityPpt  growing need of cyber security
Ppt growing need of cyber security
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and Sexting
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 
cyber security
cyber securitycyber security
cyber security
 

Similar to Cyber ethics

Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingCSITiaesprime
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksAman Gupta
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
 
Ethical hacking basics
Ethical hacking basicsEthical hacking basics
Ethical hacking basicsMeenesh Jain
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 
IRJET- Impact of Ethical Hacking on Business and Governments
IRJET-  	  Impact of Ethical Hacking on Business and GovernmentsIRJET-  	  Impact of Ethical Hacking on Business and Governments
IRJET- Impact of Ethical Hacking on Business and GovernmentsIRJET Journal
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptxjohnnymaaza
 
What is Ethical Hacking?.pptx
What is Ethical Hacking?.pptxWhat is Ethical Hacking?.pptx
What is Ethical Hacking?.pptxStrongboxAcademy
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfuzair
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hackingijtsrd
 
Create a software key logger
Create a software key logger Create a software key logger
Create a software key logger GiralFaurel
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 

Similar to Cyber ethics (20)

Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Ethical hacking basics
Ethical hacking basicsEthical hacking basics
Ethical hacking basics
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
ethics final project
ethics final projectethics final project
ethics final project
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
IRJET- Impact of Ethical Hacking on Business and Governments
IRJET-  	  Impact of Ethical Hacking on Business and GovernmentsIRJET-  	  Impact of Ethical Hacking on Business and Governments
IRJET- Impact of Ethical Hacking on Business and Governments
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
What is Ethical Hacking?.pptx
What is Ethical Hacking?.pptxWhat is Ethical Hacking?.pptx
What is Ethical Hacking?.pptx
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdf
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Create a software key logger
Create a software key logger Create a software key logger
Create a software key logger
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 

More from Mohit Dholakiya

More from Mohit Dholakiya (6)

Data science
Data scienceData science
Data science
 
Vulnerability
VulnerabilityVulnerability
Vulnerability
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
How to grow on you tube
How to grow on you tubeHow to grow on you tube
How to grow on you tube
 
Instagram strategies
Instagram strategiesInstagram strategies
Instagram strategies
 
Scanning web vulnerabilities
Scanning web vulnerabilitiesScanning web vulnerabilities
Scanning web vulnerabilities
 

Recently uploaded

ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 

Recently uploaded (20)

ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 

Cyber ethics

  • 1. Cyber Ethics By Dholakiya Mohit 1Noble Group of Institutions, Junagadh
  • 2.  Why security is required?  Introduction to hacking  Hackers  Types of hackers  Vulnerability  Hacking through ports  Conclusion 2 Index Noble Group of Institutions, Junagadh
  • 3.  In today’s day to day life use of Internet has been increased in vast.  If we see there is a threat for the security issues.  At company level if any breach has been found there may threat of leaking of asset and skills of employees  At government level any of the security can affect the reputation of country. 3 Why security is required? Noble Group of Institutions, Junagadh
  • 4.  Nowadays the increased use of infrastructures of internet has been given threat of security  Many sites which relate to the payment can be breached and all the money can be stolen  Phishing is common attack nowadays which leads to requirement of the security to internet access  Malware attacks, ransom ware attacks are also results of lack of security. 4 Cont.. Noble Group of Institutions, Junagadh
  • 5.  Hacking is nothing but a art through which one can find breaches and loopholes.  Hacking can also be termed as anti-social activity.  Hacking can be relatable to both good and bad uses of itself  One can help through finding breaches into any of the source 5 Introduction to Hacking Noble Group of Institutions, Junagadh
  • 6.  When any hacker use it in a bad way it can lead to many of the critical damages to sources.  It can lead to dangerous issues of the crimes as well profitable acts also.  Many script kiddies can be available with negative sidelines.  Thus hacking can lead to both positive and negative effects. 6 Cont.. Noble Group of Institutions, Junagadh
  • 7.  Hackers are those persons who can use the term hacking in there own way in a professional way.  In simple terms hackers are intelligent computer professional.  There can be different motives for an hacker by there hacking.  It can be both positive and negative. 7 Hackers Noble Group of Institutions, Junagadh
  • 8. Motives or intentions: • One can hack something to get deepest knowledge of the system. • Many hackers can hack something for knowing the backened process of the system. • Main motive can be finding the vulnerabilities in any system. • The hackeres can create security awareness in people of the organization or institutions. • Malicious intentions can be one of the motive. • Many other motives are been notified. 8 Cont.. Noble Group of Institutions, Junagadh
  • 9. Types of Hackers are defined or based on the motives or intentions. They can also be said on the work or type of hacking they do. There are different types of Hackers: • Black hat • White hat • Grey hat 9 Types of Hackers Noble Group of Institutions, Junagadh
  • 10.  Black hat hackers is the term which is given to such hackers who do some illegal activities  They are the hackers who have not thought about the postiveness.  They are the stereotypical groups who don’t care about any good motives.  They hack into any system to destroy, deploy, steal data, modify data and many other. 10 Black Hat Noble Group of Institutions, Junagadh
  • 11.  White hat hackers are totally opposite from balck hat hackers.  They are hackers which are helping the instituitons and organizations.  They find the vulnerabilities in any of the system for helping purpose  They are not giving the threats to any of the companies or organization. 11 White hat Noble Group of Institutions, Junagadh
  • 12.  Gray hat hackers are the hackers which can be said to be combination of black hat and white hat hackers  Gray hat hackers hack any of the system on the order of any organization or institutions.  The do not have any of intentions of destroying or damaging any system.  Thus they are not having criminal ideas. 12 Grey Hat Noble Group of Institutions, Junagadh
  • 13.  Phreaks are very interesting persons who use different breaching processes  They are included in types of Hackers in terms for different types of hacking.  They are named Phreaks because those are the hackers who breaks into mobile phones.  They do so by using different computer networks and devices. 13 Phreaks Noble Group of Institutions, Junagadh
  • 14.  Those can also be included into types of Hackers.  They don’t have any of the technical skills for hacking any of the systems.  Though they are included because they use available information from any other source to break into the systems or organization.  They do such activities for fun or curiosity activities. 14 Script Kiddies Noble Group of Institutions, Junagadh
  • 15.  Term vulnerability is nothing but the mistakes in any of the sites or any of the organizations or institutions.  Those are the available loopholes in server system or network.  Vulnerability can be found out anywhere by any means through different methods.  It’s notes can be searched on internet through number or CVE. 15 Vulnerability Noble Group of Institutions, Junagadh
  • 16.  There are many ways to hack into something as said in ahead slides  One of those is through ports available.  Ports can be available in hardware part or software part or network part.  This method of hacking is simplest way to hack something available. 16 Hacking through ports Noble Group of Institutions, Junagadh
  • 17. We have many available ports for hacking like:  Physical: USB,Serial  Virtual: 1 to 65535  From above 1 to 65535 ports port number 80,443and 21 are the most important ports for any website. That will be explained in detail in second PPT.  SMTP (Simple Mail Transfer Protocol): Port number 25  POP(Post Office Protocol):Port number 110 17 Cont… Noble Group of Institutions, Junagadh
  • 18.  We should be having security in our surroundings because it is important to be prevented than cured.  And Ethical Hacking helps to solve many problems through providing security.  There are community of hackers available.  Help others by providing security  To catch criminal only think like a criminal don’t be a criminal 18 Conclusion Noble Group of Institutions, Junagadh
  • 19. 19