SlideShare a Scribd company logo
1 of 11
NASIR ARAFAT
 In computer networking, hacking is any technical
effort to manipulate the normal behaviour of network
connections and connected systems
 Hacker s any person engaged in hacking
 White hat hacking: These hackings are done for good
purposes by computer security experts to protect the
system from any threat
 Black hat hacking: These hackings are done for wrong
purposes for personal gain like hacking of defense
websites, or hacking a bank system
 Grey hat hacking: It is the combination of white hat
and black hat hacking.
The goal of grey hat hackers is to provide national
security
 It is the process of hacking from the hackers
 Ethical hacking is testing the resources for a
good cause and for the betterment of
technology
 Technically ethical hacking means Penetration
Testing which is focused on securing and
protecting IT systems
 Ethical hacking is also called attack &
penetration testing
 Penetration testing is done to secure and
protect IT system
 It is the attack on a computer system with the
intention of finding security weakness
 It’s a legal way for securing a system
 Part of an overall security program
 Ethical hacker makes the system full proof
 The attacks are done in non-destructive
manner
 Formulating Plan: Approval for ethical
hacking is essential because no one can point
to hackers of his work
 Executing Plan: Requirement of pre planning
of hackers test that they are performing
 Evaluation Result: Evaluating the result &
correlating the specific vulnerabilities
discovered is a skill that’s get better with the
experience
 Using Encryption to encrypt important data
 Set up Firewalls to prevent unauthorized or
unwanted communications between
computer networks or hosts
 Use of Steganography for hiding an
information in a medium, such as a digital
picture or audio files
 To make security stronger (Ethical Hacking)
 Hack other system secretly
 Steal important information
 Destroy enemy’s computer network during
the war
 Hack to notify many people their thought
 Ethical hacking is legal way to secure your
system
 Main way to that giving your system in hands
of ethical hackers so that he can make your
system full proof
 Ethical hackers attacks in non-destructive
manners
Types of Hackers and Ethical Hacking Explained

More Related Content

What's hot

Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityShafaan Khaliq Bhatti
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Ethical Hacker
Ethical HackerEthical Hacker
Ethical Hackerkeriann70
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lectureZara Nawaz
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical HackingRohan Raj
 
06. security concept
06. security concept06. security concept
06. security conceptMuhammad Ahad
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hackingWaseem Rauf
 
CNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewCNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewSam Bowne
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cftoamma
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1limsh
 
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedThreat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedFalgun Rathod
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentationhamzakareem2
 
Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of ComputerFaizan Janjua
 
Wireless Intrusion Techniques
Wireless Intrusion TechniquesWireless Intrusion Techniques
Wireless Intrusion TechniquesCadis1
 

What's hot (20)

Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Network Security Topic 1 intro
Network Security Topic 1 introNetwork Security Topic 1 intro
Network Security Topic 1 intro
 
Ethical Hacker
Ethical HackerEthical Hacker
Ethical Hacker
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Computer security
Computer securityComputer security
Computer security
 
Lesson 2 - IDPS
Lesson 2 - IDPSLesson 2 - IDPS
Lesson 2 - IDPS
 
06. security concept
06. security concept06. security concept
06. security concept
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
CNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewCNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking Overview
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
 
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedThreat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of Computer
 
Wireless Intrusion Techniques
Wireless Intrusion TechniquesWireless Intrusion Techniques
Wireless Intrusion Techniques
 

Viewers also liked

Nscglobal ENC agreement
Nscglobal   ENC agreementNscglobal   ENC agreement
Nscglobal ENC agreementSayed Mousa
 
Salesforce_Certified_Administrator
Salesforce_Certified_AdministratorSalesforce_Certified_Administrator
Salesforce_Certified_AdministratorParamesh marina
 
Design parameters to obtain al2 o3 nanofluid to enhance heat transfer
Design parameters to obtain al2 o3 nanofluid to enhance heat transferDesign parameters to obtain al2 o3 nanofluid to enhance heat transfer
Design parameters to obtain al2 o3 nanofluid to enhance heat transfereSAT Journals
 
Nossa Amizade é um Conto de Fadas
Nossa Amizade é um Conto de FadasNossa Amizade é um Conto de Fadas
Nossa Amizade é um Conto de Fadaselenirmeirelles
 
Abc’s of Canada
Abc’s of Canada  Abc’s of Canada
Abc’s of Canada IESO
 
Sports in Canada
Sports in CanadaSports in Canada
Sports in CanadaIESO
 
Pastore Maria_Coaching Ripple Effect
Pastore Maria_Coaching Ripple EffectPastore Maria_Coaching Ripple Effect
Pastore Maria_Coaching Ripple EffectMaria Pastore
 
Principios de química y estructura ena1 - ejercicio 09 fórmula empírica de...
Principios de química y estructura    ena1 - ejercicio 09 fórmula empírica de...Principios de química y estructura    ena1 - ejercicio 09 fórmula empírica de...
Principios de química y estructura ena1 - ejercicio 09 fórmula empírica de...Triplenlace Química
 
Simulado de Língua Portuguesa 9º ano
Simulado de Língua Portuguesa 9º anoSimulado de Língua Portuguesa 9º ano
Simulado de Língua Portuguesa 9º anoMarcia Oliveira
 

Viewers also liked (20)

salud ocupacional
salud ocupacionalsalud ocupacional
salud ocupacional
 
Nscglobal ENC agreement
Nscglobal   ENC agreementNscglobal   ENC agreement
Nscglobal ENC agreement
 
Salesforce_Certified_Administrator
Salesforce_Certified_AdministratorSalesforce_Certified_Administrator
Salesforce_Certified_Administrator
 
Design parameters to obtain al2 o3 nanofluid to enhance heat transfer
Design parameters to obtain al2 o3 nanofluid to enhance heat transferDesign parameters to obtain al2 o3 nanofluid to enhance heat transfer
Design parameters to obtain al2 o3 nanofluid to enhance heat transfer
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
2013 хцү 02
2013 хцү 022013 хцү 02
2013 хцү 02
 
Nossa Amizade é um Conto de Fadas
Nossa Amizade é um Conto de FadasNossa Amizade é um Conto de Fadas
Nossa Amizade é um Conto de Fadas
 
Abc’s of Canada
Abc’s of Canada  Abc’s of Canada
Abc’s of Canada
 
Sports in Canada
Sports in CanadaSports in Canada
Sports in Canada
 
Trabajo exel
Trabajo exelTrabajo exel
Trabajo exel
 
Storia_del_Canada
Storia_del_CanadaStoria_del_Canada
Storia_del_Canada
 
Pastore Maria_Coaching Ripple Effect
Pastore Maria_Coaching Ripple EffectPastore Maria_Coaching Ripple Effect
Pastore Maria_Coaching Ripple Effect
 
Material calculo-integral-2
Material calculo-integral-2Material calculo-integral-2
Material calculo-integral-2
 
Kolač
KolačKolač
Kolač
 
Atp, cromosomas
Atp, cromosomasAtp, cromosomas
Atp, cromosomas
 
Etica y-liderazgo-empresarial
Etica y-liderazgo-empresarialEtica y-liderazgo-empresarial
Etica y-liderazgo-empresarial
 
Principios de química y estructura ena1 - ejercicio 09 fórmula empírica de...
Principios de química y estructura    ena1 - ejercicio 09 fórmula empírica de...Principios de química y estructura    ena1 - ejercicio 09 fórmula empírica de...
Principios de química y estructura ena1 - ejercicio 09 fórmula empírica de...
 
Simulado de Língua Portuguesa 9º ano
Simulado de Língua Portuguesa 9º anoSimulado de Língua Portuguesa 9º ano
Simulado de Língua Portuguesa 9º ano
 
Band Folio.Book 1 - Fagote
Band Folio.Book 1 - FagoteBand Folio.Book 1 - Fagote
Band Folio.Book 1 - Fagote
 
Band Folio.Book 1 - Sax Tenor
Band Folio.Book 1 - Sax TenorBand Folio.Book 1 - Sax Tenor
Band Folio.Book 1 - Sax Tenor
 

Similar to Types of Hackers and Ethical Hacking Explained

Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraVaishnaviKhandelwal6
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical HackingMasih Karimi
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptShravan Sanidhya
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPTashish kumar
 
An Introduction to Ethical Hacking
An Introduction to Ethical HackingAn Introduction to Ethical Hacking
An Introduction to Ethical HackingVinny Vessel
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipurcyber cure
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to HackingRishabha Garg
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxJanani S
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking reportAkhilesh Patel
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxMaheshDhope1
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guidePankaj Dubey
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber securityankit gandharkar
 
Information security
Information securityInformation security
Information securityVarshil Patel
 

Similar to Types of Hackers and Ethical Hacking Explained (20)

Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical Hacking
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
An Introduction to Ethical Hacking
An Introduction to Ethical HackingAn Introduction to Ethical Hacking
An Introduction to Ethical Hacking
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptx
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
 
Information security
Information securityInformation security
Information security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Recently uploaded (20)

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Types of Hackers and Ethical Hacking Explained

  • 2.  In computer networking, hacking is any technical effort to manipulate the normal behaviour of network connections and connected systems  Hacker s any person engaged in hacking
  • 3.  White hat hacking: These hackings are done for good purposes by computer security experts to protect the system from any threat  Black hat hacking: These hackings are done for wrong purposes for personal gain like hacking of defense websites, or hacking a bank system  Grey hat hacking: It is the combination of white hat and black hat hacking. The goal of grey hat hackers is to provide national security
  • 4.  It is the process of hacking from the hackers  Ethical hacking is testing the resources for a good cause and for the betterment of technology  Technically ethical hacking means Penetration Testing which is focused on securing and protecting IT systems
  • 5.  Ethical hacking is also called attack & penetration testing  Penetration testing is done to secure and protect IT system  It is the attack on a computer system with the intention of finding security weakness
  • 6.  It’s a legal way for securing a system  Part of an overall security program  Ethical hacker makes the system full proof  The attacks are done in non-destructive manner
  • 7.  Formulating Plan: Approval for ethical hacking is essential because no one can point to hackers of his work  Executing Plan: Requirement of pre planning of hackers test that they are performing  Evaluation Result: Evaluating the result & correlating the specific vulnerabilities discovered is a skill that’s get better with the experience
  • 8.  Using Encryption to encrypt important data  Set up Firewalls to prevent unauthorized or unwanted communications between computer networks or hosts  Use of Steganography for hiding an information in a medium, such as a digital picture or audio files
  • 9.  To make security stronger (Ethical Hacking)  Hack other system secretly  Steal important information  Destroy enemy’s computer network during the war  Hack to notify many people their thought
  • 10.  Ethical hacking is legal way to secure your system  Main way to that giving your system in hands of ethical hackers so that he can make your system full proof  Ethical hackers attacks in non-destructive manners