SlideShare a Scribd company logo
WELCOMEWELCOME
ETHICAL HACKINGETHICAL HACKING
NAME
CLASS
What is Hacking ???What is Hacking ???
 Hacking is unauthorized use of computer andHacking is unauthorized use of computer and
network resources. (The term "hacker"network resources. (The term "hacker"
originally meant a very gifted programmer. Inoriginally meant a very gifted programmer. In
recent years though, with easier access torecent years though, with easier access to
multiple systems, it now has negativemultiple systems, it now has negative
implications.)implications.)
TypeType ofof HackersHackers
 Black-Hat Hacker-Black-Hat Hacker- A black hat hacker orA black hat hacker or
crackers are individuals with extraordinarycrackers are individuals with extraordinary
computer skillscomputer skills
 White-Hat Hacker-White-Hat Hacker- White hat hackers areWhite hat hackers are
those individuals professing hacker skillsthose individuals professing hacker skills
and using them for defensive purposeand using them for defensive purpose
 Grey-Hat Hacker-Grey-Hat Hacker- These are individuals whoThese are individuals who
work both offensively and defensively atwork both offensively and defensively at
various timesvarious times
Figure of General HackingFigure of General Hacking
What is Ethical Hacking ??What is Ethical Hacking ??
 Ethical hackingEthical hacking –– defined “methodologydefined “methodology
adopted by ethical hackers to discover theadopted by ethical hackers to discover the
harmed existing in information systems’harmed existing in information systems’
of operating environments.”of operating environments.”
 With the growth of the Internet, computerWith the growth of the Internet, computer
security has become a major concern forsecurity has become a major concern for
businesses and governments.businesses and governments.
 In their search for a way to approach theIn their search for a way to approach the
problem, organizations came to realize thatproblem, organizations came to realize that
one of the best ways to evaluate theone of the best ways to evaluate the
unwanted threat to their interests would be tounwanted threat to their interests would be to
have independent computer securityhave independent computer security
professionals attempt to break into theirprofessionals attempt to break into their
computer systems.computer systems.
Who are Ethical Hackers?Who are Ethical Hackers?
 ““One of the best ways to evaluate the intruder threat is toOne of the best ways to evaluate the intruder threat is to
have an independent computer security professionalshave an independent computer security professionals
attempt to break their computer systems”attempt to break their computer systems”
 Successful ethical hackers possess a variety of skills.Successful ethical hackers possess a variety of skills.
First and foremost, they must be completely trustworthy.First and foremost, they must be completely trustworthy.
 Ethical hackers typically have very strong programmingEthical hackers typically have very strong programming
and computer networking skills.and computer networking skills.
 They are also adept at installing and maintainingThey are also adept at installing and maintaining
systems that use the more popular operating systemssystems that use the more popular operating systems
(e.g., Linux or Windows 2000) used on target systems.(e.g., Linux or Windows 2000) used on target systems.
 These base skills are detailed knowledge of theThese base skills are detailed knowledge of the
hardware and software provided by the more popularhardware and software provided by the more popular
computer and networking hardware vendors.computer and networking hardware vendors.
What do Ethical Hackers do?What do Ethical Hackers do?
 An ethical hacker’s evaluation of a system’s securityAn ethical hacker’s evaluation of a system’s security
seeks answers to these basic questions:seeks answers to these basic questions:
 What can an intruder see on the target systems?What can an intruder see on the target systems?
 What can an intruder do with that information?What can an intruder do with that information?
 Does anyone at the target notice the intruder’s atDoes anyone at the target notice the intruder’s at
tempts or successes?tempts or successes?
 What are you trying to protect?What are you trying to protect?
 What are you trying to protect against?What are you trying to protect against?
 How much time, effort, and money are you willing toHow much time, effort, and money are you willing to
expend to obtain adequate protection?expend to obtain adequate protection?
Required Skills of an EthicalRequired Skills of an Ethical
HackerHacker
 Routers:Routers: knowledge of routers, routing protocols, andknowledge of routers, routing protocols, and
access control listsaccess control lists
 Microsoft:Microsoft: skills in operation, configuration andskills in operation, configuration and
management.management.
 Linux:Linux: knowledge of Linux/Unix; security setting,knowledge of Linux/Unix; security setting,
configuration, and services.configuration, and services.
 Firewalls:Firewalls: configurations, and operation of intrusionconfigurations, and operation of intrusion
detection systems.detection systems.
 Mainframes : knowledge of mainframes .Mainframes : knowledge of mainframes .
 Network Protocols:Network Protocols: TCP/IP; how they function and canTCP/IP; how they function and can
be manipulated.be manipulated.
 Project Management:Project Management: knowledge of leading, planning,knowledge of leading, planning,
organizing, and controlling a penetration testing team.organizing, and controlling a penetration testing team.
WORKINGWORKING
In hacking there are five steps. The actual hackingIn hacking there are five steps. The actual hacking
will be a circular one. When the five stepswill be a circular one. When the five steps
completed he start reconnaissance in that stagecompleted he start reconnaissance in that stage
and the preceding stages to get in to the nextand the preceding stages to get in to the next
level. The five steps arelevel. The five steps are
ReconnaissanceReconnaissance
Scanning & EnumerationScanning & Enumeration
Gaining accessGaining access
Maintaining accessMaintaining access
Clearing tracksClearing tracks
Future Scope of Ethical HackingFuture Scope of Ethical Hacking
 As it an evolving branch the scope of enhancement inAs it an evolving branch the scope of enhancement in
technology is immense. No ethical hacker can ensuretechnology is immense. No ethical hacker can ensure
the system security by using the same techniquethe system security by using the same technique
repeatedly. He would have to improve, develop andrepeatedly. He would have to improve, develop and
explore new avenues repeatedly.explore new avenues repeatedly.
 More enhanced software's should be used for optimumMore enhanced software's should be used for optimum
protection. Tools used, need to be updated regularly andprotection. Tools used, need to be updated regularly and
more efficient ones need to be developedmore efficient ones need to be developed
Advantage of Ethical HackingAdvantage of Ethical Hacking
 Helping in closing the open holes in the system networkHelping in closing the open holes in the system network
 Provides security to banking and financialProvides security to banking and financial
establishmentsestablishments
 Prevent website defacementsPrevent website defacements
 Fight against terrorism and national security breachesFight against terrorism and national security breaches
 Having a computer system that prevents maliciousHaving a computer system that prevents malicious
hackers from gaining accesshackers from gaining access
Disadvantage of EthicalDisadvantage of Ethical
HackingHacking
 All depends upon the trustworthiness of the ethicalAll depends upon the trustworthiness of the ethical
hackerhacker
 Hiring professionals is expensiveHiring professionals is expensive
 The ethical hacker using the knowledge they gain to doThe ethical hacker using the knowledge they gain to do
malicious hacking activitiesmalicious hacking activities
 Allowing the company’s financial and banking details toAllowing the company’s financial and banking details to
be seenbe seen
 Massive securitMassive security breachy breach
Any Questions???Any Questions???
OrOr
suggestions???suggestions???
Ethical hacking presentation

More Related Content

What's hot

hacking
hackinghacking
hacking
mayank1293
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
AmbikaMalgatti
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
chrizjohn896
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
himanshujoshi238
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Monika Deswal
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
Sunny Sundeep
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Keith Brooks
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
ankit sarode
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Anumadil1
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
arohan6
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
Vishal Kumar
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
VipinYadav257
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Mohammad Shakirul islam
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Goutham Shetty
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Sanu Subham
 
Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking Presentation
AmanUllah115928
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 

What's hot (20)

hacking
hackinghacking
hacking
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking Presentation
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 

Viewers also liked

Hacking
HackingHacking
Hacking
Haider Akbar
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
ANKIT KUMAR
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Ravi Rajput
 
Mystery behind inflation
Mystery behind inflationMystery behind inflation
Mystery behind inflationKhem Singh
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
Ajay Serohi
 
Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012
Jeremiah Grossman
 
National cyber security policy 2013
National cyber security policy  2013National cyber security policy  2013
National cyber security policy 2013
M P Keshava
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
Aurobindo Nayak
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
DEEPIKA WALIA
 
Intel Compute stick presentation
Intel Compute stick presentationIntel Compute stick presentation
Intel Compute stick presentation
Georgekutty Francis
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
PECB
 
Best practices and Government role in Cyber Security
Best practices and Government role in Cyber Security Best practices and Government role in Cyber Security
Best practices and Government role in Cyber Security USAID CEED II Project Moldova
 
Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016
Jeremiah Grossman
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Shivam Sahu
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
sumit dimri
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Rohit Yadav
 
Google's project ara
Google's project araGoogle's project ara
Google's project ara
Siddhant Dhoundiyal
 
seminar presentation on Project ara
seminar presentation on Project araseminar presentation on Project ara
seminar presentation on Project ara
Georgekutty Francis
 

Viewers also liked (20)

Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking
HackingHacking
Hacking
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Mystery behind inflation
Mystery behind inflationMystery behind inflation
Mystery behind inflation
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012
 
National cyber security policy 2013
National cyber security policy  2013National cyber security policy  2013
National cyber security policy 2013
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Intel Compute stick presentation
Intel Compute stick presentationIntel Compute stick presentation
Intel Compute stick presentation
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
 
Best practices and Government role in Cyber Security
Best practices and Government role in Cyber Security Best practices and Government role in Cyber Security
Best practices and Government role in Cyber Security
 
Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Google's project ara
Google's project araGoogle's project ara
Google's project ara
 
seminar presentation on Project ara
seminar presentation on Project araseminar presentation on Project ara
seminar presentation on Project ara
 

Similar to Ethical hacking presentation

Ethi mini - ethical hacking
Ethi mini - ethical hackingEthi mini - ethical hacking
Ethi mini - ethical hackingBeing Uniq Sonu
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
AnshumaanTiwari2
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
shreya_omar
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
MaheshDhope1
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
Waseem Rauf
 
Hacking
HackingHacking
Hacking
Paidi Dinesh
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
cyber cure
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
Shravan Sanidhya
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Nitheesh Adithyan
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
VaishnaviKhandelwal6
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
ashish kumar
 
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
Subhoneel Datta
 
EthicalHacking_AakashTakale
EthicalHacking_AakashTakaleEthicalHacking_AakashTakale
EthicalHacking_AakashTakaleAakash Takale
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
ambemPrashanthi
 
Lesson plan ethical hacking
Lesson plan  ethical hackingLesson plan  ethical hacking
Lesson plan ethical hacking
Nigam Dave
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Divyadharshini S U
 

Similar to Ethical hacking presentation (20)

Ethi mini - ethical hacking
Ethi mini - ethical hackingEthi mini - ethical hacking
Ethi mini - ethical hacking
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Hacking
HackingHacking
Hacking
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Ethichack 2012
Ethichack 2012Ethichack 2012
Ethichack 2012
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
 
EthicalHacking_AakashTakale
EthicalHacking_AakashTakaleEthicalHacking_AakashTakale
EthicalHacking_AakashTakale
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Lesson plan ethical hacking
Lesson plan  ethical hackingLesson plan  ethical hacking
Lesson plan ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

More from Georgekutty Francis

Simple self introduction in interview
Simple self introduction in interview Simple self introduction in interview
Simple self introduction in interview
Georgekutty Francis
 
Cyber bidding gateway report on ASP .net
Cyber bidding gateway report on ASP .netCyber bidding gateway report on ASP .net
Cyber bidding gateway report on ASP .net
Georgekutty Francis
 
Cyber bidding gateway abstract in ASP .net
Cyber bidding gateway abstract in ASP .netCyber bidding gateway abstract in ASP .net
Cyber bidding gateway abstract in ASP .net
Georgekutty Francis
 
Raspberry pi on seminar documentation
Raspberry pi on seminar documentationRaspberry pi on seminar documentation
Raspberry pi on seminar documentation
Georgekutty Francis
 
Seminar Presentation on raspberry pi
Seminar Presentation on raspberry piSeminar Presentation on raspberry pi
Seminar Presentation on raspberry pi
Georgekutty Francis
 
Holographic seminar documentation
Holographic seminar documentationHolographic seminar documentation
Holographic seminar documentation
Georgekutty Francis
 
Intel Compute stick documentation
Intel Compute stick documentationIntel Compute stick documentation
Intel Compute stick documentation
Georgekutty Francis
 
Autonomic computing seminar documentation
Autonomic computing seminar documentationAutonomic computing seminar documentation
Autonomic computing seminar documentation
Georgekutty Francis
 

More from Georgekutty Francis (9)

Simple self introduction in interview
Simple self introduction in interview Simple self introduction in interview
Simple self introduction in interview
 
Cyber bidding gateway report on ASP .net
Cyber bidding gateway report on ASP .netCyber bidding gateway report on ASP .net
Cyber bidding gateway report on ASP .net
 
Cyber bidding gateway abstract in ASP .net
Cyber bidding gateway abstract in ASP .netCyber bidding gateway abstract in ASP .net
Cyber bidding gateway abstract in ASP .net
 
Raspberry pi on seminar documentation
Raspberry pi on seminar documentationRaspberry pi on seminar documentation
Raspberry pi on seminar documentation
 
Seminar Presentation on raspberry pi
Seminar Presentation on raspberry piSeminar Presentation on raspberry pi
Seminar Presentation on raspberry pi
 
Project ara report 2
Project ara report 2Project ara report 2
Project ara report 2
 
Holographic seminar documentation
Holographic seminar documentationHolographic seminar documentation
Holographic seminar documentation
 
Intel Compute stick documentation
Intel Compute stick documentationIntel Compute stick documentation
Intel Compute stick documentation
 
Autonomic computing seminar documentation
Autonomic computing seminar documentationAutonomic computing seminar documentation
Autonomic computing seminar documentation
 

Recently uploaded

"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 

Recently uploaded (20)

"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 

Ethical hacking presentation

  • 3. What is Hacking ???What is Hacking ???  Hacking is unauthorized use of computer andHacking is unauthorized use of computer and network resources. (The term "hacker"network resources. (The term "hacker" originally meant a very gifted programmer. Inoriginally meant a very gifted programmer. In recent years though, with easier access torecent years though, with easier access to multiple systems, it now has negativemultiple systems, it now has negative implications.)implications.)
  • 4. TypeType ofof HackersHackers  Black-Hat Hacker-Black-Hat Hacker- A black hat hacker orA black hat hacker or crackers are individuals with extraordinarycrackers are individuals with extraordinary computer skillscomputer skills  White-Hat Hacker-White-Hat Hacker- White hat hackers areWhite hat hackers are those individuals professing hacker skillsthose individuals professing hacker skills and using them for defensive purposeand using them for defensive purpose  Grey-Hat Hacker-Grey-Hat Hacker- These are individuals whoThese are individuals who work both offensively and defensively atwork both offensively and defensively at various timesvarious times
  • 5. Figure of General HackingFigure of General Hacking
  • 6. What is Ethical Hacking ??What is Ethical Hacking ??  Ethical hackingEthical hacking –– defined “methodologydefined “methodology adopted by ethical hackers to discover theadopted by ethical hackers to discover the harmed existing in information systems’harmed existing in information systems’ of operating environments.”of operating environments.”  With the growth of the Internet, computerWith the growth of the Internet, computer security has become a major concern forsecurity has become a major concern for businesses and governments.businesses and governments.  In their search for a way to approach theIn their search for a way to approach the problem, organizations came to realize thatproblem, organizations came to realize that one of the best ways to evaluate theone of the best ways to evaluate the unwanted threat to their interests would be tounwanted threat to their interests would be to have independent computer securityhave independent computer security professionals attempt to break into theirprofessionals attempt to break into their computer systems.computer systems.
  • 7. Who are Ethical Hackers?Who are Ethical Hackers?  ““One of the best ways to evaluate the intruder threat is toOne of the best ways to evaluate the intruder threat is to have an independent computer security professionalshave an independent computer security professionals attempt to break their computer systems”attempt to break their computer systems”  Successful ethical hackers possess a variety of skills.Successful ethical hackers possess a variety of skills. First and foremost, they must be completely trustworthy.First and foremost, they must be completely trustworthy.  Ethical hackers typically have very strong programmingEthical hackers typically have very strong programming and computer networking skills.and computer networking skills.  They are also adept at installing and maintainingThey are also adept at installing and maintaining systems that use the more popular operating systemssystems that use the more popular operating systems (e.g., Linux or Windows 2000) used on target systems.(e.g., Linux or Windows 2000) used on target systems.  These base skills are detailed knowledge of theThese base skills are detailed knowledge of the hardware and software provided by the more popularhardware and software provided by the more popular computer and networking hardware vendors.computer and networking hardware vendors.
  • 8. What do Ethical Hackers do?What do Ethical Hackers do?  An ethical hacker’s evaluation of a system’s securityAn ethical hacker’s evaluation of a system’s security seeks answers to these basic questions:seeks answers to these basic questions:  What can an intruder see on the target systems?What can an intruder see on the target systems?  What can an intruder do with that information?What can an intruder do with that information?  Does anyone at the target notice the intruder’s atDoes anyone at the target notice the intruder’s at tempts or successes?tempts or successes?  What are you trying to protect?What are you trying to protect?  What are you trying to protect against?What are you trying to protect against?  How much time, effort, and money are you willing toHow much time, effort, and money are you willing to expend to obtain adequate protection?expend to obtain adequate protection?
  • 9. Required Skills of an EthicalRequired Skills of an Ethical HackerHacker  Routers:Routers: knowledge of routers, routing protocols, andknowledge of routers, routing protocols, and access control listsaccess control lists  Microsoft:Microsoft: skills in operation, configuration andskills in operation, configuration and management.management.  Linux:Linux: knowledge of Linux/Unix; security setting,knowledge of Linux/Unix; security setting, configuration, and services.configuration, and services.  Firewalls:Firewalls: configurations, and operation of intrusionconfigurations, and operation of intrusion detection systems.detection systems.  Mainframes : knowledge of mainframes .Mainframes : knowledge of mainframes .  Network Protocols:Network Protocols: TCP/IP; how they function and canTCP/IP; how they function and can be manipulated.be manipulated.  Project Management:Project Management: knowledge of leading, planning,knowledge of leading, planning, organizing, and controlling a penetration testing team.organizing, and controlling a penetration testing team.
  • 10. WORKINGWORKING In hacking there are five steps. The actual hackingIn hacking there are five steps. The actual hacking will be a circular one. When the five stepswill be a circular one. When the five steps completed he start reconnaissance in that stagecompleted he start reconnaissance in that stage and the preceding stages to get in to the nextand the preceding stages to get in to the next level. The five steps arelevel. The five steps are ReconnaissanceReconnaissance Scanning & EnumerationScanning & Enumeration Gaining accessGaining access Maintaining accessMaintaining access Clearing tracksClearing tracks
  • 11. Future Scope of Ethical HackingFuture Scope of Ethical Hacking  As it an evolving branch the scope of enhancement inAs it an evolving branch the scope of enhancement in technology is immense. No ethical hacker can ensuretechnology is immense. No ethical hacker can ensure the system security by using the same techniquethe system security by using the same technique repeatedly. He would have to improve, develop andrepeatedly. He would have to improve, develop and explore new avenues repeatedly.explore new avenues repeatedly.  More enhanced software's should be used for optimumMore enhanced software's should be used for optimum protection. Tools used, need to be updated regularly andprotection. Tools used, need to be updated regularly and more efficient ones need to be developedmore efficient ones need to be developed
  • 12. Advantage of Ethical HackingAdvantage of Ethical Hacking  Helping in closing the open holes in the system networkHelping in closing the open holes in the system network  Provides security to banking and financialProvides security to banking and financial establishmentsestablishments  Prevent website defacementsPrevent website defacements  Fight against terrorism and national security breachesFight against terrorism and national security breaches  Having a computer system that prevents maliciousHaving a computer system that prevents malicious hackers from gaining accesshackers from gaining access
  • 13. Disadvantage of EthicalDisadvantage of Ethical HackingHacking  All depends upon the trustworthiness of the ethicalAll depends upon the trustworthiness of the ethical hackerhacker  Hiring professionals is expensiveHiring professionals is expensive  The ethical hacker using the knowledge they gain to doThe ethical hacker using the knowledge they gain to do malicious hacking activitiesmalicious hacking activities  Allowing the company’s financial and banking details toAllowing the company’s financial and banking details to be seenbe seen  Massive securitMassive security breachy breach