Ethical Hacking
Who is a hacker..?? 
Hacker is a person who 
bypass the system’s 
access control by taking 
advantage of security 
weakness left in the 
system.
Types of Hacker..
White Hat Hackers :- They refers to ethical 
hacker or computer security experts, who 
specializes in penetration testing to ensure 
the security of organization information 
system. 
Eg:- Cyber Security Experts
Black Hat Hacker :- They are also known as a 
“Cracker” is someone who uses his skills with a 
criminal intent. 
They are bad guys, who break the security and 
steals the data and Destroy the security network. 
Eg:- 
cracking bank account in order to make transfer 
to their own accounts 
 stealing information to be sold in black market 
for money
Grey Hat Hacker :- They falls somewhere 
between white hat and black hat hacker. A grey 
hat does not work for their own personal profit. 
He may uses his skills for legal or illegal acts, 
but not for personal profit. 
They use their skills in order to prove 
themselves, but never do it in order to make 
money out of it. The moment they cross that 
boundary, they become black hat hacker.
Why do people hack..?? 
 Hacking For Fun 
 Hacking To Steal 
 Hacking To 
Disrupt 
 To make Security 
stronger
Types of Hacking 
There are many types of hacking. 
Most 
common are:- 
 Password Hacking 
 Software Hacking
Password Hacking 
There are two ways to crack a password :- 
1. Dictionary attack:- In that hackers use predefine 
passwords which are easily available in the dictionary. 
Like- I love you , india , burger , admin , password etc. 
It is unsuccessful. 
2. Brute Force:- In that case hackers try out all the 
combination of all keyboards letters. It has greater 
success but it takes long time. It is 100% successful.
Software Hacking 
In this case, hackers change the demo 
version into full version by decode 
the source code. 
This process is also known as “Reverse 
Engineering”.
How to Get Rid of Attackers ? 
One way is 
Do not purchase a Computer 
If you already have purchased a Computer 
Do not apply for a Internet Connection 
And If you have a Computer with Internet Connection: 
Shut Down your Computer immediately 
and Never Turn it ON
Protection from Attackers ? 
 Learn Ethical 
Hacking yourself 
 Hire an Ethical 
Hacker to Protect 
you and your 
resources
Prevention from Attackers 
The only Protection against everything is to Unplug 
your Computer Systems and lock them away so No 
one can touch them - Not even you. 
As Famous Chinese Saying is: To Catch a Thief, 
Think like a Thief.
System Protection 
1. Use anti-virus software and firewalls - keep them up to date 
2. Keep your operating system up to date with critical security 
updates and patches 
3. Don't open emails or attachments from unknown sources 
4. Use hard-to-guess passwords. Don’t use words found in a 
dictionary. Remember that password cracking tools exist 
5. Don't share access to your computers with strangers 
6. Disconnect from the Internet when not in use 
7. Reevaluate your security on a regular basis
Presented By:- 
Divyank Gupta 
For more detail 
visit this link:- 
www.learnown.blogsp 
ot.in

Information Security and Ethical Hacking

  • 1.
  • 3.
    Who is ahacker..?? Hacker is a person who bypass the system’s access control by taking advantage of security weakness left in the system.
  • 4.
  • 5.
    White Hat Hackers:- They refers to ethical hacker or computer security experts, who specializes in penetration testing to ensure the security of organization information system. Eg:- Cyber Security Experts
  • 6.
    Black Hat Hacker:- They are also known as a “Cracker” is someone who uses his skills with a criminal intent. They are bad guys, who break the security and steals the data and Destroy the security network. Eg:- cracking bank account in order to make transfer to their own accounts  stealing information to be sold in black market for money
  • 7.
    Grey Hat Hacker:- They falls somewhere between white hat and black hat hacker. A grey hat does not work for their own personal profit. He may uses his skills for legal or illegal acts, but not for personal profit. They use their skills in order to prove themselves, but never do it in order to make money out of it. The moment they cross that boundary, they become black hat hacker.
  • 8.
    Why do peoplehack..??  Hacking For Fun  Hacking To Steal  Hacking To Disrupt  To make Security stronger
  • 9.
    Types of Hacking There are many types of hacking. Most common are:-  Password Hacking  Software Hacking
  • 10.
    Password Hacking Thereare two ways to crack a password :- 1. Dictionary attack:- In that hackers use predefine passwords which are easily available in the dictionary. Like- I love you , india , burger , admin , password etc. It is unsuccessful. 2. Brute Force:- In that case hackers try out all the combination of all keyboards letters. It has greater success but it takes long time. It is 100% successful.
  • 11.
    Software Hacking Inthis case, hackers change the demo version into full version by decode the source code. This process is also known as “Reverse Engineering”.
  • 12.
    How to GetRid of Attackers ? One way is Do not purchase a Computer If you already have purchased a Computer Do not apply for a Internet Connection And If you have a Computer with Internet Connection: Shut Down your Computer immediately and Never Turn it ON
  • 13.
    Protection from Attackers?  Learn Ethical Hacking yourself  Hire an Ethical Hacker to Protect you and your resources
  • 14.
    Prevention from Attackers The only Protection against everything is to Unplug your Computer Systems and lock them away so No one can touch them - Not even you. As Famous Chinese Saying is: To Catch a Thief, Think like a Thief.
  • 15.
    System Protection 1.Use anti-virus software and firewalls - keep them up to date 2. Keep your operating system up to date with critical security updates and patches 3. Don't open emails or attachments from unknown sources 4. Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist 5. Don't share access to your computers with strangers 6. Disconnect from the Internet when not in use 7. Reevaluate your security on a regular basis
  • 16.
    Presented By:- DivyankGupta For more detail visit this link:- www.learnown.blogsp ot.in