SlideShare une entreprise Scribd logo
1  sur  20
A presentation
by-
Shalu gupta
 Computer hacking is when
  someone modifies computer
  hardware or software in a
  way that alters the creator's
  original intention,
 There are two types of
  people in the world.

    good one & bad one
An ethical hacker is a
 computer and network
 expert who attacks a
 security system on
 behalf of its owners

An ethical hacker is
 sometimes called
 a white hat, a term that
 comes from old Western
 movies, where the "good
 guy" wore a white hat
 and the "bad guy" wore
 a black hat.
OTHER TYPES OF HACKER
 SCRIPT KIDDIES: Script kiddie is a pejorative term
  for a computer intruder with little or no skill; a
  person who simply follows directions or uses a
  cook-book approach .
 CRACKERS : Those who will enter your computer
  just for the fun of it, or to prove their technical skills.
 Gray-hat Hackers:
  These individuals typically follow the law but
  sometimes venture over to the darker side of
  blackhat hacking.
HISTORY OF HACKING
NEED OF ETHICAL HACKING
DRAWBACKS OF EHTICAL
HACKING
CERTIFIED ETHICAL HACKER
*Age-28
*Occupation-Author, computer security
   consultant, MTV host.
*he wrote Unofficial Guide to Ethical
   Hacking at the age of 15.
*Help in 9/11 attack to decode a
   messagae of al-qyaeda.
 *In 2008, the IMT Ghaziabad Centre for
   Distance Learning signed an MoU with
   Fadia to organise its one-year Post-
   Graduate Diploma in Cyber Security.[18]
 1# The secret of Hacking 1
  Edition.
 2# Social Engineering: The Art of
  Human Hacking.
 3# Dangerous Google - Searching
  For Secrets.
 4#Gray Hat Hacking The
  Ethical Hackers Handbook.
 5# Hardware Hacking Have Fun
  While Voiding Your Warranty
CAREERS IN NETWORK SECURITY
AND ETHICAL HACKING
I am ready to
fight for rules
against hackers
!!--FUTURE OF ETHICAL HACKING--!!
LET”S PROTECT YOUR EMAIL PASSWORD…..
Ethical hacking

Contenu connexe

En vedette

Converting your waste into wealth
Converting your waste into wealthConverting your waste into wealth
Converting your waste into wealthMalini Rajendran
 
Wealth out of waste final
Wealth out of waste finalWealth out of waste final
Wealth out of waste finalDFC2011
 
Turning waste to wealth
Turning waste to wealthTurning waste to wealth
Turning waste to wealthTheHut2013
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Securitysumit dimri
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKINGSHERALI445
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern timesjeshin jose
 
Waste is Wealth: depending on how it is managed and utilized.
Waste is Wealth: depending on how it is managed and utilized.Waste is Wealth: depending on how it is managed and utilized.
Waste is Wealth: depending on how it is managed and utilized.Dr. Joshua Zake
 

En vedette (17)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Converting your waste into wealth
Converting your waste into wealthConverting your waste into wealth
Converting your waste into wealth
 
Wealth out of waste final
Wealth out of waste finalWealth out of waste final
Wealth out of waste final
 
Turning waste to wealth
Turning waste to wealthTurning waste to wealth
Turning waste to wealth
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Reliance Jio
Reliance JioReliance Jio
Reliance Jio
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Hacking
HackingHacking
Hacking
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Reliance jio
Reliance jioReliance jio
Reliance jio
 
Ppt on Reliance jio
Ppt on Reliance jioPpt on Reliance jio
Ppt on Reliance jio
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Waste is Wealth: depending on how it is managed and utilized.
Waste is Wealth: depending on how it is managed and utilized.Waste is Wealth: depending on how it is managed and utilized.
Waste is Wealth: depending on how it is managed and utilized.
 

Dernier

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 

Dernier (20)

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 

Ethical hacking

  • 2.
  • 3.  Computer hacking is when someone modifies computer hardware or software in a way that alters the creator's original intention,  There are two types of people in the world. good one & bad one
  • 4. An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners An ethical hacker is sometimes called a white hat, a term that comes from old Western movies, where the "good guy" wore a white hat and the "bad guy" wore a black hat.
  • 5. OTHER TYPES OF HACKER  SCRIPT KIDDIES: Script kiddie is a pejorative term for a computer intruder with little or no skill; a person who simply follows directions or uses a cook-book approach .  CRACKERS : Those who will enter your computer just for the fun of it, or to prove their technical skills.  Gray-hat Hackers: These individuals typically follow the law but sometimes venture over to the darker side of blackhat hacking.
  • 6.
  • 8.
  • 9. NEED OF ETHICAL HACKING
  • 10.
  • 13. *Age-28 *Occupation-Author, computer security consultant, MTV host. *he wrote Unofficial Guide to Ethical Hacking at the age of 15. *Help in 9/11 attack to decode a messagae of al-qyaeda. *In 2008, the IMT Ghaziabad Centre for Distance Learning signed an MoU with Fadia to organise its one-year Post- Graduate Diploma in Cyber Security.[18]
  • 14.  1# The secret of Hacking 1 Edition.  2# Social Engineering: The Art of Human Hacking.  3# Dangerous Google - Searching For Secrets.  4#Gray Hat Hacking The Ethical Hackers Handbook.  5# Hardware Hacking Have Fun While Voiding Your Warranty
  • 15. CAREERS IN NETWORK SECURITY AND ETHICAL HACKING
  • 16.
  • 17. I am ready to fight for rules against hackers
  • 18. !!--FUTURE OF ETHICAL HACKING--!!
  • 19. LET”S PROTECT YOUR EMAIL PASSWORD…..