The document is a seminar report submitted by Ashar Shaikh on the topic of "Ethical Hacking as a Method to Enhance Information Security". It discusses ethical hacking and how it can be used to improve cybersecurity. The report includes an introduction, literature review, advantages and disadvantages of ethical hacking, the phases of ethical hacking (reconnaissance, scanning, gaining access, maintaining access, and takeover), and applications of ethical hacking such as finding vulnerabilities and demonstrating hacking methods. It also briefly discusses future scope in cyber security and concludes that ethical hacking is an important examination method to check systems for potential security issues and help enhance information protection.