Cyber Ethics
By Dholakiya Mohit
1Noble Group of Institutions, Junagadh
 Why security is required?
 Introduction to hacking
 Hackers
 Types of hackers
 Vulnerability
 Hacking through ports
 Conclusion
2
Index
Noble Group of Institutions, Junagadh
 In today’s day to day life use of Internet has been
increased in vast.
 If we see there is a threat for the security issues.
 At company level if any breach has been found there
may threat of leaking of asset and skills of employees
 At government level any of the security can affect the
reputation of country.
3
Why security is required?
Noble Group of Institutions, Junagadh
 Nowadays the increased use of infrastructures of
internet has been given threat of security
 Many sites which relate to the payment can be
breached and all the money can be stolen
 Phishing is common attack nowadays which leads to
requirement of the security to internet access
 Malware attacks, ransom ware attacks are also results
of lack of security.
4
Cont..
Noble Group of Institutions, Junagadh
 Hacking is nothing but a art through which one can
find breaches and loopholes.
 Hacking can also be termed as anti-social activity.
 Hacking can be relatable to both good and bad uses
of itself
 One can help through finding breaches into any of the
source
5
Introduction to Hacking
Noble Group of Institutions, Junagadh
 When any hacker use it in a bad way it can lead to
many of the critical damages to sources.
 It can lead to dangerous issues of the crimes as well
profitable acts also.
 Many script kiddies can be available with negative
sidelines.
 Thus hacking can lead to both positive and negative
effects.
6
Cont..
Noble Group of Institutions, Junagadh
 Hackers are those persons who can use the term
hacking in there own way in a professional way.
 In simple terms hackers are intelligent computer
professional.
 There can be different motives for an hacker by there
hacking.
 It can be both positive and negative.
7
Hackers
Noble Group of Institutions, Junagadh
Motives or intentions:
• One can hack something to get deepest knowledge of the
system.
• Many hackers can hack something for knowing the backened
process of the system.
• Main motive can be finding the vulnerabilities in any system.
• The hackeres can create security awareness in people of the
organization or institutions.
• Malicious intentions can be one of the motive.
• Many other motives are been notified.
8
Cont..
Noble Group of Institutions, Junagadh
Types of Hackers are defined or based on the motives
or intentions.
They can also be said on the work or type of hacking
they do.
There are different types of Hackers:
• Black hat
• White hat
• Grey hat
9
Types of Hackers
Noble Group of Institutions, Junagadh
 Black hat hackers is the term which is given to such
hackers who do some illegal activities
 They are the hackers who have not thought about the
postiveness.
 They are the stereotypical groups who don’t care
about any good motives.
 They hack into any system to destroy, deploy, steal
data, modify data and many other.
10
Black Hat
Noble Group of Institutions, Junagadh
 White hat hackers are totally opposite from balck hat
hackers.
 They are hackers which are helping the instituitons
and organizations.
 They find the vulnerabilities in any of the system for
helping purpose
 They are not giving the threats to any of the
companies or organization.
11
White hat
Noble Group of Institutions, Junagadh
 Gray hat hackers are the hackers which can be said to
be combination of black hat and white hat hackers
 Gray hat hackers hack any of the system on the order
of any organization or institutions.
 The do not have any of intentions of destroying or
damaging any system.
 Thus they are not having criminal ideas.
12
Grey Hat
Noble Group of Institutions, Junagadh
 Phreaks are very interesting persons who use
different breaching processes
 They are included in types of Hackers in terms for
different types of hacking.
 They are named Phreaks because those are the
hackers who breaks into mobile phones.
 They do so by using different computer networks and
devices.
13
Phreaks
Noble Group of Institutions, Junagadh
 Those can also be included into types of Hackers.
 They don’t have any of the technical skills for hacking
any of the systems.
 Though they are included because they use available
information from any other source to break into the
systems or organization.
 They do such activities for fun or curiosity activities.
14
Script Kiddies
Noble Group of Institutions, Junagadh
 Term vulnerability is nothing but the mistakes in any
of the sites or any of the organizations or institutions.
 Those are the available loopholes in server system or
network.
 Vulnerability can be found out anywhere by any
means through different methods.
 It’s notes can be searched on internet through
number or CVE.
15
Vulnerability
Noble Group of Institutions, Junagadh
 There are many ways to hack into something as said
in ahead slides
 One of those is through ports available.
 Ports can be available in hardware part or software
part or network part.
 This method of hacking is simplest way to hack
something available.
16
Hacking through ports
Noble Group of Institutions, Junagadh
We have many available ports for hacking like:
 Physical: USB,Serial
 Virtual: 1 to 65535
 From above 1 to 65535 ports port number 80,443and 21 are
the most important ports for any website. That will be
explained in detail in second PPT.
 SMTP (Simple Mail Transfer Protocol): Port number 25
 POP(Post Office Protocol):Port number 110
17
Cont…
Noble Group of Institutions, Junagadh
 We should be having security in our surroundings
because it is important to be prevented than cured.
 And Ethical Hacking helps to solve many problems
through providing security.
 There are community of hackers available.
 Help others by providing security
 To catch criminal only think like a criminal don’t be a
criminal
18
Conclusion
Noble Group of Institutions, Junagadh
19

Cyber ethics

  • 1.
    Cyber Ethics By DholakiyaMohit 1Noble Group of Institutions, Junagadh
  • 2.
     Why securityis required?  Introduction to hacking  Hackers  Types of hackers  Vulnerability  Hacking through ports  Conclusion 2 Index Noble Group of Institutions, Junagadh
  • 3.
     In today’sday to day life use of Internet has been increased in vast.  If we see there is a threat for the security issues.  At company level if any breach has been found there may threat of leaking of asset and skills of employees  At government level any of the security can affect the reputation of country. 3 Why security is required? Noble Group of Institutions, Junagadh
  • 4.
     Nowadays theincreased use of infrastructures of internet has been given threat of security  Many sites which relate to the payment can be breached and all the money can be stolen  Phishing is common attack nowadays which leads to requirement of the security to internet access  Malware attacks, ransom ware attacks are also results of lack of security. 4 Cont.. Noble Group of Institutions, Junagadh
  • 5.
     Hacking isnothing but a art through which one can find breaches and loopholes.  Hacking can also be termed as anti-social activity.  Hacking can be relatable to both good and bad uses of itself  One can help through finding breaches into any of the source 5 Introduction to Hacking Noble Group of Institutions, Junagadh
  • 6.
     When anyhacker use it in a bad way it can lead to many of the critical damages to sources.  It can lead to dangerous issues of the crimes as well profitable acts also.  Many script kiddies can be available with negative sidelines.  Thus hacking can lead to both positive and negative effects. 6 Cont.. Noble Group of Institutions, Junagadh
  • 7.
     Hackers arethose persons who can use the term hacking in there own way in a professional way.  In simple terms hackers are intelligent computer professional.  There can be different motives for an hacker by there hacking.  It can be both positive and negative. 7 Hackers Noble Group of Institutions, Junagadh
  • 8.
    Motives or intentions: •One can hack something to get deepest knowledge of the system. • Many hackers can hack something for knowing the backened process of the system. • Main motive can be finding the vulnerabilities in any system. • The hackeres can create security awareness in people of the organization or institutions. • Malicious intentions can be one of the motive. • Many other motives are been notified. 8 Cont.. Noble Group of Institutions, Junagadh
  • 9.
    Types of Hackersare defined or based on the motives or intentions. They can also be said on the work or type of hacking they do. There are different types of Hackers: • Black hat • White hat • Grey hat 9 Types of Hackers Noble Group of Institutions, Junagadh
  • 10.
     Black hathackers is the term which is given to such hackers who do some illegal activities  They are the hackers who have not thought about the postiveness.  They are the stereotypical groups who don’t care about any good motives.  They hack into any system to destroy, deploy, steal data, modify data and many other. 10 Black Hat Noble Group of Institutions, Junagadh
  • 11.
     White hathackers are totally opposite from balck hat hackers.  They are hackers which are helping the instituitons and organizations.  They find the vulnerabilities in any of the system for helping purpose  They are not giving the threats to any of the companies or organization. 11 White hat Noble Group of Institutions, Junagadh
  • 12.
     Gray hathackers are the hackers which can be said to be combination of black hat and white hat hackers  Gray hat hackers hack any of the system on the order of any organization or institutions.  The do not have any of intentions of destroying or damaging any system.  Thus they are not having criminal ideas. 12 Grey Hat Noble Group of Institutions, Junagadh
  • 13.
     Phreaks arevery interesting persons who use different breaching processes  They are included in types of Hackers in terms for different types of hacking.  They are named Phreaks because those are the hackers who breaks into mobile phones.  They do so by using different computer networks and devices. 13 Phreaks Noble Group of Institutions, Junagadh
  • 14.
     Those canalso be included into types of Hackers.  They don’t have any of the technical skills for hacking any of the systems.  Though they are included because they use available information from any other source to break into the systems or organization.  They do such activities for fun or curiosity activities. 14 Script Kiddies Noble Group of Institutions, Junagadh
  • 15.
     Term vulnerabilityis nothing but the mistakes in any of the sites or any of the organizations or institutions.  Those are the available loopholes in server system or network.  Vulnerability can be found out anywhere by any means through different methods.  It’s notes can be searched on internet through number or CVE. 15 Vulnerability Noble Group of Institutions, Junagadh
  • 16.
     There aremany ways to hack into something as said in ahead slides  One of those is through ports available.  Ports can be available in hardware part or software part or network part.  This method of hacking is simplest way to hack something available. 16 Hacking through ports Noble Group of Institutions, Junagadh
  • 17.
    We have manyavailable ports for hacking like:  Physical: USB,Serial  Virtual: 1 to 65535  From above 1 to 65535 ports port number 80,443and 21 are the most important ports for any website. That will be explained in detail in second PPT.  SMTP (Simple Mail Transfer Protocol): Port number 25  POP(Post Office Protocol):Port number 110 17 Cont… Noble Group of Institutions, Junagadh
  • 18.
     We shouldbe having security in our surroundings because it is important to be prevented than cured.  And Ethical Hacking helps to solve many problems through providing security.  There are community of hackers available.  Help others by providing security  To catch criminal only think like a criminal don’t be a criminal 18 Conclusion Noble Group of Institutions, Junagadh
  • 19.