SlideShare a Scribd company logo
ETHICAL
HACKING
Concept Of Hacking
Difference Between Hacking & Ethical
Hacking
History Of Hacking
Types Of Hacking
Types Of Hacker
Consequences
Conclusion
Hacking is not the one which you people
think of……
It’s not the one which you play with other’s
computers,
Facebook account, Organizations,
Governments etc…)
Now a days this technology has become a
crime due to these aspects
Hacking
•Access computer system or network without
authorization
•Breaks the law
Ethical Hacking
•Performs most of the same activities but with
owner’s permission
•It is Legal
•Part of an overall security program
 The first hacker was appeared in
1960’s at the Massachusetts
Institute Of Technology(MIT)
 During the 1970’s, a different kind of
hacker appeared:
Phone Phreaker or Phone Hacker
 In the 1980’s, phreaks started to
migrate to computers, and the first
Bulletin Board System (BBS)
appeared
 During the 1990’s, when the use of
internet widespread around the
world, hackers multiplied
Phishing Method OR Fake Login
Hack. (Working)
Key logging (Working)
Brute Force Hack.. (Working)
Cookie Steal Hack. (Not Working)
White Hat Hacker
Good guys
Don’t use their skill for illegal
purpose
Computer security experts and help
to protect from Black Hats.
 Black Hat Hacker
Bad guys
Use their skill maliciously for
personal gain
Hack banks, steal credit cards
and deface websites
 Grey Hat Hacker
It is a combination of White hat n
Black Hat Hackers
Goal of grey hat hackers is to
provide national security
Ian Murphy Kevin Mitnick Johan Hesingus
Linus Trovald Mark Abene Robert Morris
Thousands of dollars in fines
Imprisonment
Seizure of your computer
Proper ethical hackers should
be employed
Do not expose your passwords to
untrusted sites
Practice using exact web address
Close your internet while not in
use
Hacking is of two types
Ethical hacking – a legal method
Consequences of illegal hacking
any
questions ???

More Related Content

What's hot

What's hot (18)

Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackers
 
Hacking
HackingHacking
Hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
National information security education & awareness program
National information security education & awareness programNational information security education & awareness program
National information security education & awareness program
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking 1
Hacking 1Hacking 1
Hacking 1
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Similar to Ethical hacking presentation

Similar to Ethical hacking presentation (20)

Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Final ppt
Final pptFinal ppt
Final ppt
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Evolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptxEvolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptx
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
Hackers
HackersHackers
Hackers
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 

Ethical hacking presentation

  • 2. Concept Of Hacking Difference Between Hacking & Ethical Hacking History Of Hacking Types Of Hacking Types Of Hacker Consequences Conclusion
  • 3. Hacking is not the one which you people think of…… It’s not the one which you play with other’s computers, Facebook account, Organizations, Governments etc…) Now a days this technology has become a crime due to these aspects
  • 4. Hacking •Access computer system or network without authorization •Breaks the law Ethical Hacking •Performs most of the same activities but with owner’s permission •It is Legal •Part of an overall security program
  • 5.  The first hacker was appeared in 1960’s at the Massachusetts Institute Of Technology(MIT)  During the 1970’s, a different kind of hacker appeared: Phone Phreaker or Phone Hacker
  • 6.  In the 1980’s, phreaks started to migrate to computers, and the first Bulletin Board System (BBS) appeared  During the 1990’s, when the use of internet widespread around the world, hackers multiplied
  • 7.
  • 8. Phishing Method OR Fake Login Hack. (Working) Key logging (Working) Brute Force Hack.. (Working) Cookie Steal Hack. (Not Working)
  • 9. White Hat Hacker Good guys Don’t use their skill for illegal purpose Computer security experts and help to protect from Black Hats.
  • 10.  Black Hat Hacker Bad guys Use their skill maliciously for personal gain Hack banks, steal credit cards and deface websites
  • 11.  Grey Hat Hacker It is a combination of White hat n Black Hat Hackers Goal of grey hat hackers is to provide national security
  • 12. Ian Murphy Kevin Mitnick Johan Hesingus Linus Trovald Mark Abene Robert Morris
  • 13. Thousands of dollars in fines Imprisonment Seizure of your computer
  • 14. Proper ethical hackers should be employed Do not expose your passwords to untrusted sites Practice using exact web address Close your internet while not in use
  • 15. Hacking is of two types Ethical hacking – a legal method Consequences of illegal hacking