Ethical hacking

8,185 views

Published on

Published in: Technology
0 Comments
10 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
8,185
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
972
Comments
0
Likes
10
Embeds 0
No embeds

No notes for slide

Ethical hacking

  1. 1. CKING  Ethical hacking Presented by: D.Balu Sk.Baji
  2. 2. CONTENTS  Introduction.  History of Hacking.  Hacking.  Types of Hacking.  Ethical Hacking.  Skills to be needed.  True incidents.  Conclusion.
  3. 3. INTRODUCTION  One of the fastest growing areas in network security  The main reason for insecurity is Hacking  The intent of Ethical Hacking is To discover vulnerabilities from a hacker’s view point so system can be secured
  4. 4. HISTORY OF HACKING  In 1960s Universities facilities with huge mainframe computers like MIT’S artificial intelligence lab.  Phone tampering in 1970 by john Draper.  Computer fraud and credit card in 1980.  Griffith Air Force Base, computers at NASA in early 1990’s.  U.S. Department of Justice, U.S. Air Force, CIA, NASA ->in the late 1990’s
  5. 5.  Breaking into computers.  Gaining access.  Also known Black Hat.  Hobby/profession of working with computers. Hacking
  6. 6. TYPES OF HACKING  Website Hacking  Email Hacking  Network Hacking  Password Hacking  Online banking Hacking  Computer Hacking
  7. 7. ETHICAL HACKING  Creates a security from being Hacked.  Also known as White Hat.
  8. 8. SKILLS NEEDED Technical knowledge. Soft Skills/Social Engineering. Becoming a Certified Ethical Hacker (CEH).
  9. 9. TRUE INCIDENTS OF HACKING  JNTU website on november 7th 2010 -by students of Adnan Anjum.
  10. 10. TRUE INCIDENTS OF HACKING  JNTU-H website -by DARKRAIDER and CYB3R M4Fi4
  11. 11. CONCLUSION  Proper ethical hackers should be employed.  Do not expose your passwords to untrusted sites.  Close your internet while not in use.  Be safe and secure.

×