SlideShare a Scribd company logo
Joseph Francis
Sooraj Sumedan
Jeshin Jose
Elwin Varghese
Joseph Chethalan
Pranav
What

is hacking?
Is hacking a
crime?
Hacking Vs
Cracking
Types of hackers
Case study
Security
Flashback
What is Ethical Hacking??
Ethical Hacking is testing
the resources for a good
cause and for the
betterment of technology.
Technically Ethical Hacking
means penetration
testing which is focused on
Securing and Protecting IT
Systems.
Hacker is a word that has two
meanings:
Traditionally, a Hacker is
someone who likes to play with
Software or Electronic Systems.

Recently, Hacker has taken on a
new meaning — someone who
maliciously breaks into systems for
personal gain. Technically, these
criminals & are known as Crackers.
HACKING WITH MALICIOUS INTENTION
IS CRACKING
The basic difference is hackers do
not do anything disastrous.
Cracking yield more devastating
results.
Cracking is crime.
Cyber crime are the results of
cracking ,not hacking
It is Legal
• Permission is obtained from the target
• Part of an overall security program
• Identify vulnerabilities visible from Internet
at
particular point of time
• Ethical hackers possesses same
skills, mindset
and tools of a hacker but the attacks are
done in
a non-destructive manner
•
Script

kiddies or packet monkeys

• Young in-experienced hackers
• Copy codes and techniques from

knowledgeable hackers .

• Don’t know what’s going beyond

the coding.

• Use techniques for fun purpose.
• Sometimes could be very

dangerous for the system,
These

are good hackers .
Have genuine license to hack.
Have registered police records
Evolves themselves in good works
Generally owned by companies
for security designing
Have high pay scales.
Generally these are coders
very

dangerous persons.
Always have motive to earn
huge profit.
Highly paid persons.
Evolves themselves mostly in
criminal activities.
These could be
coders, admins as well as
script kiddies
Also

known as red hats.
Perform both tasks fair as
well as unfair.
Generally these are admins.
Have little high pay than
white hats.
Generally not so
dangerous, but sometimes
could be.
It is clear from the graph it is increasing day by day.
Use

of anti-viruses.
Proper logout after use
of mail id.
Manual opening browser
don't open spam.
Password protected
admin account.
Nahshon

Even-Chaim (born May 1971), was
the first major computer hacker
Stewert Nelson from America followed
Nehshon in 1972
Ankit Phadia from India is also a well known
name in hackers history
Abdur zahir from Pakistan has also a good
name in this world
HACKING

IS USING AN
AUTHORISE THING IN A UN
AUTHORISED MANNER
HACKIING IS ILLEGAL BUT NOT A
CRIME.
TYPES OF HACKERS.
VIRUSES ,WORMS & TROJANS.
ADMIN PASSWORD HACKING
ethical hacking in the modern times
ethical hacking in the modern times

More Related Content

What's hot

Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
Olivier Busolini
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Goutham Shetty
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Monika Deswal
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Alapan Banerjee
 
Social Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesSocial Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case Studies
Praetorian
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
DEEPIKA WALIA
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
Harsh Bhanushali
 
Cyber security
Cyber securityCyber security
Cyber security
Pihu Goel
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
AmbikaMalgatti
 
Ppt
PptPpt
Social engineering
Social engineering Social engineering
Social engineering
Vîñàý Pãtêl
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
Pankaj Dubey
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Mukul Agarwal
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Foram Gosai
 
Virus
VirusVirus
Virus
Protik Roy
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
Sibghatullah Khattak
 

What's hot (20)

Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Social Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesSocial Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case Studies
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ppt
PptPpt
Ppt
 
Social engineering
Social engineering Social engineering
Social engineering
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Virus
VirusVirus
Virus
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 

Viewers also liked

Strike and lockout
Strike and lockoutStrike and lockout
Strike and lockoutValred Olsim
 
Right To Information And Civil Society Organisations
Right To Information And Civil Society OrganisationsRight To Information And Civil Society Organisations
Right To Information And Civil Society OrganisationsMADAN PANDIA
 
Microsoft Excel- basics
Microsoft Excel-  basicsMicrosoft Excel-  basics
Microsoft Excel- basics
jeshin jose
 
how to introduce yourselves
how to introduce yourselveshow to introduce yourselves
how to introduce yourselves
jeshin jose
 
Body Language 187
Body Language 187Body Language 187
Body Language 187
MADAN PANDIA
 
Industrial Dispute Act 1947 Unit V
Industrial Dispute Act 1947  Unit VIndustrial Dispute Act 1947  Unit V
Industrial Dispute Act 1947 Unit VSachin MK
 
Industrial disputes act etc
Industrial disputes act etcIndustrial disputes act etc
Industrial disputes act etc
jeshin jose
 
Communication Skills
Communication SkillsCommunication Skills
Communication Skills
MADAN PANDIA
 
Judgement
JudgementJudgement
Judgement
MADAN PANDIA
 
Sale of goods act 1930
Sale of goods act 1930Sale of goods act 1930
Sale of goods act 1930
jeshin jose
 
Attitude
AttitudeAttitude
Attitude
MADAN PANDIA
 

Viewers also liked (20)

Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hinduism1
Hinduism1Hinduism1
Hinduism1
 
Strike and lockout
Strike and lockoutStrike and lockout
Strike and lockout
 
Id Act 1947
Id Act 1947Id Act 1947
Id Act 1947
 
Right To Information And Civil Society Organisations
Right To Information And Civil Society OrganisationsRight To Information And Civil Society Organisations
Right To Information And Civil Society Organisations
 
Motivation
MotivationMotivation
Motivation
 
Discipline
DisciplineDiscipline
Discipline
 
Vedas
VedasVedas
Vedas
 
Positive Attitude
Positive AttitudePositive Attitude
Positive Attitude
 
Microsoft Excel- basics
Microsoft Excel-  basicsMicrosoft Excel-  basics
Microsoft Excel- basics
 
how to introduce yourselves
how to introduce yourselveshow to introduce yourselves
how to introduce yourselves
 
Body Language 187
Body Language 187Body Language 187
Body Language 187
 
Positive Attitude
Positive AttitudePositive Attitude
Positive Attitude
 
Id Act 1947
Id Act 1947Id Act 1947
Id Act 1947
 
Industrial Dispute Act 1947 Unit V
Industrial Dispute Act 1947  Unit VIndustrial Dispute Act 1947  Unit V
Industrial Dispute Act 1947 Unit V
 
Industrial disputes act etc
Industrial disputes act etcIndustrial disputes act etc
Industrial disputes act etc
 
Communication Skills
Communication SkillsCommunication Skills
Communication Skills
 
Judgement
JudgementJudgement
Judgement
 
Sale of goods act 1930
Sale of goods act 1930Sale of goods act 1930
Sale of goods act 1930
 
Attitude
AttitudeAttitude
Attitude
 

Similar to ethical hacking in the modern times

1861229635078720084665000 131012131913-phpapp02
1861229635078720084665000 131012131913-phpapp021861229635078720084665000 131012131913-phpapp02
1861229635078720084665000 131012131913-phpapp02Mudit Seth
 
Arya
AryaArya
Arya
galaxy201
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
S Sai Karthik
 
Ethical Hacking (basics)
Ethical Hacking (basics)Ethical Hacking (basics)
Ethical Hacking (basics)
DeepHaria4
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
Georgekutty Francis
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
Akashy Kale
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
ambemPrashanthi
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingManas Das
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingManas Das
 
Hacking
HackingHacking
Hacking
VipinYadav257
 
EthicalHacking_AakashTakale
EthicalHacking_AakashTakaleEthicalHacking_AakashTakale
EthicalHacking_AakashTakaleAakash Takale
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
ankit gandharkar
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Divyadharshini S U
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentationteriwoja
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
ashish kumar
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
Rasheed Ur Rehman
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
MaheshDhope1
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentationStevi Edward
 

Similar to ethical hacking in the modern times (20)

1861229635078720084665000 131012131913-phpapp02
1861229635078720084665000 131012131913-phpapp021861229635078720084665000 131012131913-phpapp02
1861229635078720084665000 131012131913-phpapp02
 
Arya
AryaArya
Arya
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking (basics)
Ethical Hacking (basics)Ethical Hacking (basics)
Ethical Hacking (basics)
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hackers
HackersHackers
Hackers
 
Hacking
HackingHacking
Hacking
 
EthicalHacking_AakashTakale
EthicalHacking_AakashTakaleEthicalHacking_AakashTakale
EthicalHacking_AakashTakale
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 

Recently uploaded

Tom Selleck Net Worth: A Comprehensive Analysis
Tom Selleck Net Worth: A Comprehensive AnalysisTom Selleck Net Worth: A Comprehensive Analysis
Tom Selleck Net Worth: A Comprehensive Analysis
greendigital
 
Christina's Baby Shower Game June 2024.pptx
Christina's Baby Shower Game June 2024.pptxChristina's Baby Shower Game June 2024.pptx
Christina's Baby Shower Game June 2024.pptx
madeline604788
 
Meet Crazyjamjam - A TikTok Sensation | Blog Eternal
Meet Crazyjamjam - A TikTok Sensation | Blog EternalMeet Crazyjamjam - A TikTok Sensation | Blog Eternal
Meet Crazyjamjam - A TikTok Sensation | Blog Eternal
Blog Eternal
 
Reimagining Classics - What Makes a Remake a Success
Reimagining Classics - What Makes a Remake a SuccessReimagining Classics - What Makes a Remake a Success
Reimagining Classics - What Makes a Remake a Success
Mark Murphy Director
 
The Evolution of Animation in Film - Mark Murphy Director
The Evolution of Animation in Film - Mark Murphy DirectorThe Evolution of Animation in Film - Mark Murphy Director
The Evolution of Animation in Film - Mark Murphy Director
Mark Murphy Director
 
Are the X-Men Marvel or DC An In-Depth Exploration.pdf
Are the X-Men Marvel or DC An In-Depth Exploration.pdfAre the X-Men Marvel or DC An In-Depth Exploration.pdf
Are the X-Men Marvel or DC An In-Depth Exploration.pdf
Xtreame HDTV
 
Maximizing Your Streaming Experience with XCIPTV- Tips for 2024.pdf
Maximizing Your Streaming Experience with XCIPTV- Tips for 2024.pdfMaximizing Your Streaming Experience with XCIPTV- Tips for 2024.pdf
Maximizing Your Streaming Experience with XCIPTV- Tips for 2024.pdf
Xtreame HDTV
 
Skeem Saam in June 2024 available on Forum
Skeem Saam in June 2024 available on ForumSkeem Saam in June 2024 available on Forum
Skeem Saam in June 2024 available on Forum
Isaac More
 
This Is The First All Category Quiz That I Made
This Is The First All Category Quiz That I MadeThis Is The First All Category Quiz That I Made
This Is The First All Category Quiz That I Made
Aarush Ghate
 
A TO Z INDIA Monthly Magazine - JUNE 2024
A TO Z INDIA Monthly Magazine - JUNE 2024A TO Z INDIA Monthly Magazine - JUNE 2024
A TO Z INDIA Monthly Magazine - JUNE 2024
Indira Srivatsa
 
Hollywood Actress - The 250 hottest gallery
Hollywood Actress - The 250 hottest galleryHollywood Actress - The 250 hottest gallery
Hollywood Actress - The 250 hottest gallery
Zsolt Nemeth
 
From Slave to Scourge: The Existential Choice of Django Unchained. The Philos...
From Slave to Scourge: The Existential Choice of Django Unchained. The Philos...From Slave to Scourge: The Existential Choice of Django Unchained. The Philos...
From Slave to Scourge: The Existential Choice of Django Unchained. The Philos...
Rodney Thomas Jr
 
Scandal! Teasers June 2024 on etv Forum.co.za
Scandal! Teasers June 2024 on etv Forum.co.zaScandal! Teasers June 2024 on etv Forum.co.za
Scandal! Teasers June 2024 on etv Forum.co.za
Isaac More
 
Panchayat Season 3 - Official Trailer.pdf
Panchayat Season 3 - Official Trailer.pdfPanchayat Season 3 - Official Trailer.pdf
Panchayat Season 3 - Official Trailer.pdf
Suleman Rana
 

Recently uploaded (14)

Tom Selleck Net Worth: A Comprehensive Analysis
Tom Selleck Net Worth: A Comprehensive AnalysisTom Selleck Net Worth: A Comprehensive Analysis
Tom Selleck Net Worth: A Comprehensive Analysis
 
Christina's Baby Shower Game June 2024.pptx
Christina's Baby Shower Game June 2024.pptxChristina's Baby Shower Game June 2024.pptx
Christina's Baby Shower Game June 2024.pptx
 
Meet Crazyjamjam - A TikTok Sensation | Blog Eternal
Meet Crazyjamjam - A TikTok Sensation | Blog EternalMeet Crazyjamjam - A TikTok Sensation | Blog Eternal
Meet Crazyjamjam - A TikTok Sensation | Blog Eternal
 
Reimagining Classics - What Makes a Remake a Success
Reimagining Classics - What Makes a Remake a SuccessReimagining Classics - What Makes a Remake a Success
Reimagining Classics - What Makes a Remake a Success
 
The Evolution of Animation in Film - Mark Murphy Director
The Evolution of Animation in Film - Mark Murphy DirectorThe Evolution of Animation in Film - Mark Murphy Director
The Evolution of Animation in Film - Mark Murphy Director
 
Are the X-Men Marvel or DC An In-Depth Exploration.pdf
Are the X-Men Marvel or DC An In-Depth Exploration.pdfAre the X-Men Marvel or DC An In-Depth Exploration.pdf
Are the X-Men Marvel or DC An In-Depth Exploration.pdf
 
Maximizing Your Streaming Experience with XCIPTV- Tips for 2024.pdf
Maximizing Your Streaming Experience with XCIPTV- Tips for 2024.pdfMaximizing Your Streaming Experience with XCIPTV- Tips for 2024.pdf
Maximizing Your Streaming Experience with XCIPTV- Tips for 2024.pdf
 
Skeem Saam in June 2024 available on Forum
Skeem Saam in June 2024 available on ForumSkeem Saam in June 2024 available on Forum
Skeem Saam in June 2024 available on Forum
 
This Is The First All Category Quiz That I Made
This Is The First All Category Quiz That I MadeThis Is The First All Category Quiz That I Made
This Is The First All Category Quiz That I Made
 
A TO Z INDIA Monthly Magazine - JUNE 2024
A TO Z INDIA Monthly Magazine - JUNE 2024A TO Z INDIA Monthly Magazine - JUNE 2024
A TO Z INDIA Monthly Magazine - JUNE 2024
 
Hollywood Actress - The 250 hottest gallery
Hollywood Actress - The 250 hottest galleryHollywood Actress - The 250 hottest gallery
Hollywood Actress - The 250 hottest gallery
 
From Slave to Scourge: The Existential Choice of Django Unchained. The Philos...
From Slave to Scourge: The Existential Choice of Django Unchained. The Philos...From Slave to Scourge: The Existential Choice of Django Unchained. The Philos...
From Slave to Scourge: The Existential Choice of Django Unchained. The Philos...
 
Scandal! Teasers June 2024 on etv Forum.co.za
Scandal! Teasers June 2024 on etv Forum.co.zaScandal! Teasers June 2024 on etv Forum.co.za
Scandal! Teasers June 2024 on etv Forum.co.za
 
Panchayat Season 3 - Official Trailer.pdf
Panchayat Season 3 - Official Trailer.pdfPanchayat Season 3 - Official Trailer.pdf
Panchayat Season 3 - Official Trailer.pdf
 

ethical hacking in the modern times

  • 1.
  • 2. Joseph Francis Sooraj Sumedan Jeshin Jose Elwin Varghese Joseph Chethalan Pranav
  • 3. What is hacking? Is hacking a crime? Hacking Vs Cracking Types of hackers Case study Security Flashback
  • 4. What is Ethical Hacking?? Ethical Hacking is testing the resources for a good cause and for the betterment of technology. Technically Ethical Hacking means penetration testing which is focused on Securing and Protecting IT Systems.
  • 5.
  • 6. Hacker is a word that has two meanings: Traditionally, a Hacker is someone who likes to play with Software or Electronic Systems. Recently, Hacker has taken on a new meaning — someone who maliciously breaks into systems for personal gain. Technically, these criminals & are known as Crackers.
  • 7. HACKING WITH MALICIOUS INTENTION IS CRACKING The basic difference is hackers do not do anything disastrous. Cracking yield more devastating results. Cracking is crime. Cyber crime are the results of cracking ,not hacking
  • 8. It is Legal • Permission is obtained from the target • Part of an overall security program • Identify vulnerabilities visible from Internet at particular point of time • Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner •
  • 9.
  • 10. Script kiddies or packet monkeys • Young in-experienced hackers • Copy codes and techniques from knowledgeable hackers . • Don’t know what’s going beyond the coding. • Use techniques for fun purpose. • Sometimes could be very dangerous for the system,
  • 11. These are good hackers . Have genuine license to hack. Have registered police records Evolves themselves in good works Generally owned by companies for security designing Have high pay scales. Generally these are coders
  • 12. very dangerous persons. Always have motive to earn huge profit. Highly paid persons. Evolves themselves mostly in criminal activities. These could be coders, admins as well as script kiddies
  • 13. Also known as red hats. Perform both tasks fair as well as unfair. Generally these are admins. Have little high pay than white hats. Generally not so dangerous, but sometimes could be.
  • 14. It is clear from the graph it is increasing day by day.
  • 15. Use of anti-viruses. Proper logout after use of mail id. Manual opening browser don't open spam. Password protected admin account.
  • 16.
  • 17. Nahshon Even-Chaim (born May 1971), was the first major computer hacker Stewert Nelson from America followed Nehshon in 1972 Ankit Phadia from India is also a well known name in hackers history Abdur zahir from Pakistan has also a good name in this world
  • 18. HACKING IS USING AN AUTHORISE THING IN A UN AUTHORISED MANNER HACKIING IS ILLEGAL BUT NOT A CRIME. TYPES OF HACKERS. VIRUSES ,WORMS & TROJANS. ADMIN PASSWORD HACKING