SlideShare a Scribd company logo
CONTENT
 Introduction

 Who Is An Hacker

 Types Of Hackers

 Roll Of Hackers
 Ethical Hacking Tools

   Conclusion
INTRODUCTION
 The term “hack” was first used by US university
staff in mid-1960s .
Ethical hackers: Employed by companies to
perform Legal attempt to break into a company’s
network to find its weakest link. Ethical hackers are
typically have very strong programming and
computer networking skill.
Who Is an Hacker?
Hackers: are actually computer enthusiasts who
know a lot about computers and computer networks
and use this knowledge with a criminal intent.
   Hacking, Is the act of gaining access
    without legal authorization to a computer
    or computer network or network
    resources.
   Ethical hacking: Is the use of hacking
    knowledge to attempt to enter a
    network to find its loopholes and back
    doors.
TYPE OF HACKERS

Black-Hat Hackers: They engage in their
activities with bad intention and
perform illegal activities such as
defacing websites and destroying data.
They make changes in the loop and
as some time they delete it
for fun only. They are bad guys. They
are also called crackers.
White-Hat Hackers: Use their skills &
 knowledge for good purpose .They helps in
 finding the loop holes in the security of a
system/network/server. They are generally
called ethical hackers or penetration testers.
They are good guys.

Grey-Hat Hackers: Do not categorize their work
as good or bad. its comes in between
white and black hat, they also not have
authorization to bypass the security
mechanism of a system/server/network,
but they do it.
Roll of Hacker
 Ethical hackers are motivated by different reasons, but
their purpose is usually the same as that of crackers:

Find out the frequent weaknesses in the security of target
systems.

 Hackers: Access computer system or network without
authorization Breaks the law; can go to prison.

Ethical hacker, Performs most of the same activities but
with owner’s permission
Ethical hacking tools:

Ethical hackers utilize and have developed variety of tools
intrude into different kinds of systems and to evaluate the
security levels. The nature of these tools differs widely.
Sam spade:
Sam spade is a simple tool which provides information
about a particular host. This tool is very much helpful in
finding the addresses, phone number etc.
Conclusion
One of the main aim of these research is to make
others understand that, there are so many tools
through which a hacker can get into a system. Its
various perspectives.

Student
  A student should understand that no software is
made with zero Vulnerability. So while they are
studying they should study the various possibilities
and should study how to prevent that because they
are the professionals of tomorrow
Hackers ethics presentation

More Related Content

What's hot

Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hackingtangytangling
 
Introduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinIntroduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam hussein
Eslam Hussein
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
Ajith Reddy
 
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
Intellipaat
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
SHERALI445
 
Hacking
HackingHacking
Hacking
Sitwat Rao
 
Hacking 1
Hacking 1Hacking 1
Hacking 1
sonal bisla
 
White hat and black hat hackers
White hat and black hat hackersWhite hat and black hat hackers
White hat and black hat hackers
Bilal Ahmed
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Praneeth Reddy
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
hamza javed
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
Sweta Kumari Barnwal
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime case
Online
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
Waseem Rauf
 
Hacking And EthicalHacking By Satish
Hacking And EthicalHacking By SatishHacking And EthicalHacking By Satish
Hacking And EthicalHacking By Satish
Nugala Sathesh Chowdary
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
justyogesh
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by RudyUdieh Moody
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
Michael Asres
 

What's hot (19)

Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
 
Introduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinIntroduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam hussein
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
 
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking
HackingHacking
Hacking
 
Hacking 1
Hacking 1Hacking 1
Hacking 1
 
White hat and black hat hackers
White hat and black hat hackersWhite hat and black hat hackers
White hat and black hat hackers
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime case
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
Hacking And EthicalHacking By Satish
Hacking And EthicalHacking By SatishHacking And EthicalHacking By Satish
Hacking And EthicalHacking By Satish
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by Rudy
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 

Similar to Hackers ethics presentation

Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
Akashy Kale
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Akshay Kale
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
Gautam708801
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
penetration Tester
 
Intro
IntroIntro
Intro
Kalkey
 
Hacking
HackingHacking
Hacking
Paidi Dinesh
 
Hacking
HackingHacking
Hacking
pranav patade
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
vishakha bhagwat
 
Ethical Hacking (basics)
Ethical Hacking (basics)Ethical Hacking (basics)
Ethical Hacking (basics)
DeepHaria4
 
hacker-180906055756.pptx
hacker-180906055756.pptxhacker-180906055756.pptx
hacker-180906055756.pptx
Alefya1
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Sourabh Goyal
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
Mukund Kumar Bharti
 
Final ethical hacking
Final ethical hackingFinal ethical hacking
Final ethical hacking
VinayakShivapuje
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
HarishBabuKaveri
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Nitheesh Adithyan
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
Aman Gupta
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
arohan6
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
arohan6
 

Similar to Hackers ethics presentation (20)

Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Intro
IntroIntro
Intro
 
Hackers
HackersHackers
Hackers
 
hacking
hackinghacking
hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking (basics)
Ethical Hacking (basics)Ethical Hacking (basics)
Ethical Hacking (basics)
 
hacker-180906055756.pptx
hacker-180906055756.pptxhacker-180906055756.pptx
hacker-180906055756.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
Final ethical hacking
Final ethical hackingFinal ethical hacking
Final ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Hackers ethics presentation

  • 1.
  • 2.
  • 3. CONTENT  Introduction  Who Is An Hacker  Types Of Hackers  Roll Of Hackers  Ethical Hacking Tools  Conclusion
  • 4. INTRODUCTION  The term “hack” was first used by US university staff in mid-1960s . Ethical hackers: Employed by companies to perform Legal attempt to break into a company’s network to find its weakest link. Ethical hackers are typically have very strong programming and computer networking skill. Who Is an Hacker? Hackers: are actually computer enthusiasts who know a lot about computers and computer networks and use this knowledge with a criminal intent.
  • 5. Hacking, Is the act of gaining access without legal authorization to a computer or computer network or network resources.  Ethical hacking: Is the use of hacking knowledge to attempt to enter a network to find its loopholes and back doors.
  • 6. TYPE OF HACKERS Black-Hat Hackers: They engage in their activities with bad intention and perform illegal activities such as defacing websites and destroying data. They make changes in the loop and as some time they delete it for fun only. They are bad guys. They are also called crackers.
  • 7. White-Hat Hackers: Use their skills & knowledge for good purpose .They helps in finding the loop holes in the security of a system/network/server. They are generally called ethical hackers or penetration testers. They are good guys. Grey-Hat Hackers: Do not categorize their work as good or bad. its comes in between white and black hat, they also not have authorization to bypass the security mechanism of a system/server/network, but they do it.
  • 8. Roll of Hacker  Ethical hackers are motivated by different reasons, but their purpose is usually the same as that of crackers: Find out the frequent weaknesses in the security of target systems.  Hackers: Access computer system or network without authorization Breaks the law; can go to prison. Ethical hacker, Performs most of the same activities but with owner’s permission
  • 9. Ethical hacking tools: Ethical hackers utilize and have developed variety of tools intrude into different kinds of systems and to evaluate the security levels. The nature of these tools differs widely. Sam spade: Sam spade is a simple tool which provides information about a particular host. This tool is very much helpful in finding the addresses, phone number etc.
  • 10. Conclusion One of the main aim of these research is to make others understand that, there are so many tools through which a hacker can get into a system. Its various perspectives. Student A student should understand that no software is made with zero Vulnerability. So while they are studying they should study the various possibilities and should study how to prevent that because they are the professionals of tomorrow