SlideShare a Scribd company logo
A PowerPoint Presentation By
Kunal Gawade
Internet & The World
R I S E O F T H E
H A C K E R
U
N
I
C
E
F
H
U
M
I
L
I
A
T
E
D
U
N
I
C
E
F
H
U
M
I
L
I
A
T
E
D
• A Company or Individual
themselves perform
hacking
• To identify threats on
Computer or Network.
• Works for Countrymen
and Online Security
• Also Works for Cyber
Crime Department
• Usually keep Hidden
Identity
Use of Ethical Hacking in Various
Fields
1. Banks & Financial Institutes
2. Anti – Terrorism
3. Departments of Government
4. IT Sector
5. Other Organisations
Use of Ethical Hacking in various
Fields
Banks & Financial Institutes
• Internet Banking
• Debit/Credit Card Security Policies
• ATM Securities
Use of Ethical Hacking in various
Fields
Anti – Terrorism
• ISIS pull – down Programme
• Anti – Terrorist Cyber Cell
Use of Ethical Hacking in various
Fields
Departments of Government
It protects important departments and sections such
as:
Use of Ethical Hacking in various Fields
IT Sector
Helps IT Sector to :
• Find loop holes
• Bugs in Softwares
• Technical errors or issues
• Other software related issues
Use of Ethical Hacking in various Fields
Other Organisations
Helps non Commercial organisations such as :
Commercial organisations such as :
IS ETHICAL HACKING A CAREER ?
• Industry status :
In alone US, Ethical hacking
has become of $3.8 billion
industry
India will require
77000 Hackers
every year.
But the demand is
fulfilled by only
15000 Hackers
IS ETHICAL HACKING A CAREER?
• Skillset Required :
IS ETHICAL HACKING A CAREER?
• Growth Rate :
1. Current worldwide
growth rate of 21%.
2. There are 2.28
million information
security professionals
worldwide which is
expected to increase
to nearly 4.2 million.
IS ETHICAL HACKING A CAREER?
• Remuneration :
 A fresher gets upto Rs 2.5 lakh p.a
 Experienced can get 10-12 lakh per annum.
Conclusion
• The idea of testing the security of a system by
trying to break into it is not new.
• While ethical hackers can help clients better
understand their security needs, it is up to the
clients to keep their guards in place.
Ethical Hacking

More Related Content

What's hot

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Goutham Shetty
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
Burhan Ahmed
 
Prediction of heart disease using machine learning.pptx
Prediction of heart disease using machine learning.pptxPrediction of heart disease using machine learning.pptx
Prediction of heart disease using machine learning.pptx
kumari36
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
Self-employed
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
Perfect Training Center
 
Cryptography
CryptographyCryptography
Cryptography
Shivanand Arur
 
Virus
VirusVirus
Virus
Protik Roy
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
Shravan Sanidhya
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
shraddha_b
 
Keyloggers.ppt
Keyloggers.pptKeyloggers.ppt
Keyloggers.ppt
Chetanmalviya8
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
AmbikaMalgatti
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
CYBERBULLYING DETECTION USING MACHINE LEARNING-1 (1).pdf
CYBERBULLYING DETECTION USING              MACHINE LEARNING-1 (1).pdfCYBERBULLYING DETECTION USING              MACHINE LEARNING-1 (1).pdf
CYBERBULLYING DETECTION USING MACHINE LEARNING-1 (1).pdf
KumbidiGaming
 
IoT Security
IoT SecurityIoT Security
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
NishaYadav177
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
ankit sarode
 
Network attacks
Network attacksNetwork attacks
Network attacks
Manjushree Mashal
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
A Raheem Ansari
 

What's hot (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Prediction of heart disease using machine learning.pptx
Prediction of heart disease using machine learning.pptxPrediction of heart disease using machine learning.pptx
Prediction of heart disease using machine learning.pptx
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Virus
VirusVirus
Virus
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
 
Keyloggers.ppt
Keyloggers.pptKeyloggers.ppt
Keyloggers.ppt
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
CYBERBULLYING DETECTION USING MACHINE LEARNING-1 (1).pdf
CYBERBULLYING DETECTION USING              MACHINE LEARNING-1 (1).pdfCYBERBULLYING DETECTION USING              MACHINE LEARNING-1 (1).pdf
CYBERBULLYING DETECTION USING MACHINE LEARNING-1 (1).pdf
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Viewers also liked

Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
SHAHID ANSARI
 
4 g technology
4 g technology4 g technology
4 g technology
Madhumithah Ilango
 
Computers in Medical field
Computers in Medical fieldComputers in Medical field
Computers in Medical fieldAvinash
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Suryansh Srivastava
 
Uses of Computers in Education
Uses of Computers in EducationUses of Computers in Education
Uses of Computers in EducationAllana Delgado
 

Viewers also liked (8)

Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
4G technology
4G technology 4G technology
4G technology
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
4 g technology
4 g technology4 g technology
4 g technology
 
Computers in Medical field
Computers in Medical fieldComputers in Medical field
Computers in Medical field
 
4g technology
4g technology4g technology
4g technology
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Uses of Computers in Education
Uses of Computers in EducationUses of Computers in Education
Uses of Computers in Education
 

Similar to Ethical Hacking

U nit 4
U nit 4U nit 4
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
IT Governance Ltd
 
Ethical hacking: Safeguarding your digital world.
Ethical hacking: Safeguarding your digital world.Ethical hacking: Safeguarding your digital world.
Ethical hacking: Safeguarding your digital world.
Cetpa Infotech
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
Chinatu Uzuegbu
 
Cyber Security & User's Privacy Invasion
Cyber Security & User's Privacy InvasionCyber Security & User's Privacy Invasion
Cyber Security & User's Privacy Invasion
Isaiah Edem
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
Cyril Soeri
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
lior mazor
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In India
IRJET Journal
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
xosap
 
Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins
Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. HawkinsSteel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins
Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins
lthawkins
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
RambilashTudu
 
cybersecurity analyst.pptx
cybersecurity analyst.pptxcybersecurity analyst.pptx
cybersecurity analyst.pptx
Boni Yeamin
 
The myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MISThe myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MIS
Saazan Shrestha
 
gagan internship.pptx
gagan internship.pptxgagan internship.pptx
gagan internship.pptx
MamthaMam1
 
Leveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future BreachLeveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future Breach
Kevin Murphy
 
INFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics securityINFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics security
Joel Cardella
 
Ethical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportEthical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training Report
Raghav Bisht
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical Hacking
IRJET Journal
 
HAPPIEST MIND TECHNOLOGY ANALYSIS.pptx
HAPPIEST MIND TECHNOLOGY  ANALYSIS.pptxHAPPIEST MIND TECHNOLOGY  ANALYSIS.pptx
HAPPIEST MIND TECHNOLOGY ANALYSIS.pptx
kishore530256
 
5 things digital media companies need to do now
5 things digital media companies need to do now5 things digital media companies need to do now
5 things digital media companies need to do now
Grant Thornton LLP
 

Similar to Ethical Hacking (20)

U nit 4
U nit 4U nit 4
U nit 4
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
Ethical hacking: Safeguarding your digital world.
Ethical hacking: Safeguarding your digital world.Ethical hacking: Safeguarding your digital world.
Ethical hacking: Safeguarding your digital world.
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
Cyber Security & User's Privacy Invasion
Cyber Security & User's Privacy InvasionCyber Security & User's Privacy Invasion
Cyber Security & User's Privacy Invasion
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In India
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
 
Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins
Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. HawkinsSteel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins
Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 
cybersecurity analyst.pptx
cybersecurity analyst.pptxcybersecurity analyst.pptx
cybersecurity analyst.pptx
 
The myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MISThe myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MIS
 
gagan internship.pptx
gagan internship.pptxgagan internship.pptx
gagan internship.pptx
 
Leveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future BreachLeveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future Breach
 
INFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics securityINFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics security
 
Ethical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportEthical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training Report
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical Hacking
 
HAPPIEST MIND TECHNOLOGY ANALYSIS.pptx
HAPPIEST MIND TECHNOLOGY  ANALYSIS.pptxHAPPIEST MIND TECHNOLOGY  ANALYSIS.pptx
HAPPIEST MIND TECHNOLOGY ANALYSIS.pptx
 
5 things digital media companies need to do now
5 things digital media companies need to do now5 things digital media companies need to do now
5 things digital media companies need to do now
 

More from Kunal Gawade, CFE

E waste and its impact on India
E waste and its impact on IndiaE waste and its impact on India
E waste and its impact on India
Kunal Gawade, CFE
 
Marketing strategy of Coca-Cola
Marketing strategy of Coca-ColaMarketing strategy of Coca-Cola
Marketing strategy of Coca-Cola
Kunal Gawade, CFE
 
Walmart Operation Management - A slight Overview
Walmart Operation Management - A slight OverviewWalmart Operation Management - A slight Overview
Walmart Operation Management - A slight Overview
Kunal Gawade, CFE
 
ERP Implementation from feasibility Report : An Information System Study
ERP Implementation from feasibility Report : An Information System StudyERP Implementation from feasibility Report : An Information System Study
ERP Implementation from feasibility Report : An Information System Study
Kunal Gawade, CFE
 
"Don Miguel Ruiz The four agreements" A better way to improve communication s...
"Don Miguel Ruiz The four agreements" A better way to improve communication s..."Don Miguel Ruiz The four agreements" A better way to improve communication s...
"Don Miguel Ruiz The four agreements" A better way to improve communication s...
Kunal Gawade, CFE
 
Case Study of Reliance with various managerial functions
Case Study of Reliance with various managerial functionsCase Study of Reliance with various managerial functions
Case Study of Reliance with various managerial functions
Kunal Gawade, CFE
 
Social Media Power : Positive or Negative
Social Media Power : Positive or NegativeSocial Media Power : Positive or Negative
Social Media Power : Positive or Negative
Kunal Gawade, CFE
 
Economic reforms in india
Economic reforms in indiaEconomic reforms in india
Economic reforms in india
Kunal Gawade, CFE
 
A Case Study : Reasons for separation of Hero Honda
A Case Study : Reasons for separation of Hero HondaA Case Study : Reasons for separation of Hero Honda
A Case Study : Reasons for separation of Hero Honda
Kunal Gawade, CFE
 

More from Kunal Gawade, CFE (9)

E waste and its impact on India
E waste and its impact on IndiaE waste and its impact on India
E waste and its impact on India
 
Marketing strategy of Coca-Cola
Marketing strategy of Coca-ColaMarketing strategy of Coca-Cola
Marketing strategy of Coca-Cola
 
Walmart Operation Management - A slight Overview
Walmart Operation Management - A slight OverviewWalmart Operation Management - A slight Overview
Walmart Operation Management - A slight Overview
 
ERP Implementation from feasibility Report : An Information System Study
ERP Implementation from feasibility Report : An Information System StudyERP Implementation from feasibility Report : An Information System Study
ERP Implementation from feasibility Report : An Information System Study
 
"Don Miguel Ruiz The four agreements" A better way to improve communication s...
"Don Miguel Ruiz The four agreements" A better way to improve communication s..."Don Miguel Ruiz The four agreements" A better way to improve communication s...
"Don Miguel Ruiz The four agreements" A better way to improve communication s...
 
Case Study of Reliance with various managerial functions
Case Study of Reliance with various managerial functionsCase Study of Reliance with various managerial functions
Case Study of Reliance with various managerial functions
 
Social Media Power : Positive or Negative
Social Media Power : Positive or NegativeSocial Media Power : Positive or Negative
Social Media Power : Positive or Negative
 
Economic reforms in india
Economic reforms in indiaEconomic reforms in india
Economic reforms in india
 
A Case Study : Reasons for separation of Hero Honda
A Case Study : Reasons for separation of Hero HondaA Case Study : Reasons for separation of Hero Honda
A Case Study : Reasons for separation of Hero Honda
 

Recently uploaded

Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 

Recently uploaded (16)

Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 

Ethical Hacking

  • 1. A PowerPoint Presentation By Kunal Gawade
  • 3. R I S E O F T H E H A C K E R
  • 6.
  • 7.
  • 8. • A Company or Individual themselves perform hacking • To identify threats on Computer or Network.
  • 9. • Works for Countrymen and Online Security • Also Works for Cyber Crime Department • Usually keep Hidden Identity
  • 10.
  • 11. Use of Ethical Hacking in Various Fields 1. Banks & Financial Institutes 2. Anti – Terrorism 3. Departments of Government 4. IT Sector 5. Other Organisations
  • 12. Use of Ethical Hacking in various Fields Banks & Financial Institutes • Internet Banking • Debit/Credit Card Security Policies • ATM Securities
  • 13. Use of Ethical Hacking in various Fields Anti – Terrorism • ISIS pull – down Programme • Anti – Terrorist Cyber Cell
  • 14. Use of Ethical Hacking in various Fields Departments of Government It protects important departments and sections such as:
  • 15. Use of Ethical Hacking in various Fields IT Sector Helps IT Sector to : • Find loop holes • Bugs in Softwares • Technical errors or issues • Other software related issues
  • 16. Use of Ethical Hacking in various Fields Other Organisations Helps non Commercial organisations such as : Commercial organisations such as :
  • 17. IS ETHICAL HACKING A CAREER ? • Industry status : In alone US, Ethical hacking has become of $3.8 billion industry India will require 77000 Hackers every year. But the demand is fulfilled by only 15000 Hackers
  • 18. IS ETHICAL HACKING A CAREER? • Skillset Required :
  • 19. IS ETHICAL HACKING A CAREER? • Growth Rate : 1. Current worldwide growth rate of 21%. 2. There are 2.28 million information security professionals worldwide which is expected to increase to nearly 4.2 million.
  • 20. IS ETHICAL HACKING A CAREER? • Remuneration :  A fresher gets upto Rs 2.5 lakh p.a  Experienced can get 10-12 lakh per annum.
  • 21. Conclusion • The idea of testing the security of a system by trying to break into it is not new. • While ethical hackers can help clients better understand their security needs, it is up to the clients to keep their guards in place.