Hi this is Maulik Kotak.about Ethical Hacking and information Security all the introduction with full description its easy to learning from any one i am not a Hacker but learning Hacking as Security Purpose and Share this Knowledge.
4. HACKING
Hacking is unauthorized use of computer and
network resources.
According to Computer Crime Research Center: “It is
act of gaining access without legal authorization to
computer or computer network.”
5. Hacker
0 Someone who tries to break into computer systems
for any illegal purpose.
0 Someone who maliciously breaks into systems for
personal gain. These are criminals.
6. TYPES OF HACKERS
Black hat hacker.
White hat hacker.
Gray hat hacker.
7. Black Hat
0 They use their knowledge and skill set for illegal
0 activities, destructive intents.
0 E.g.-to gain money (online robbery), to take revenge.
0 Disgruntled
0 Employees is the best example of Black Hats.
Attackers
0 (Black Hat Hackers) are not at all concerned with
security
0 professionals (WhiteHathackers). Actually these
hackers Are Bad Guys!!!
8. White Hat
0 They use their knowledge and skill set for
0 good, constructive intents. They find out new security
0 loopholes and their solutions.
0 E.g.-Cyber Security Peoples (FBI , NYPD, US-Homeland
Security Breach)
9. Gray Hat
0 Individuals who works both offensively and
0 defensively at various times
0 E.g.-Third Party Security Testing in IT sectors
10.
11. 0 To Make a Security Stronger.
0 Just For Fun.
0 Show Off
0 Hack Other System Secretly and steal Important
information.
12. 0 Good coder.
0 Well Knowledge about hardware and Software.
0 Should have knowledge on security System.
13. What is ethical hacking ?
0 Ethical hacking ,also known as penetration testing or
white-hat hacking involves the same tools, tricks, and
techniques that hackers use, i.e., by duplicating the
intent and actions of malicious hackers.
0 Ethical hacking is performed with the target’s
permission.
14. Who are Ethical Hackers?
An Ethical Hacker, also known as a white hat hacker, or
simply a white hat, is a security professional who applies their
hacking skills for defensive purposes on behalf of the owners
of information systems.
They are completely trustworthy.
They have strong programming and computer networking v
skills.Continuous updating of their knowledge on computer
and network security is required.
They should know the techniques of the criminals, what their
activities would be, how to detected them and how to stop
them.
15. Ethical Hacker Strategies
An Ethical Hacker, also known as a whitehat hacker, or
simply a whitehat, is a security professional who applies
their hacking skills for defensive purposes on behalf of
the owners of information systems.
They are completely trustworthy.
They have strong programming and computer
networking skills.
They should have more patience.
Continuous updating of their knowledge on computer
and network security is required.
They should know the techniques of the criminals, what
their activities would be, how to detected them and how
to stop them.
22. It is clear from the graph it is increasing day
by day.
23. ADVANTAGES
These are good hackers.
Have genuine license to hack.
Generally owned by companies for
security designing.
Provides security to banking and financial
establishments.
24. Conclusions
Always security professionals are one step behind
the hackers and crackers.
Plan for the unplanned attacks.
The role of ethical hacking in security is to provide
customers with awareness of how they could be
attacked and why they are targeted.
25. !! For Regarding any question contact me !!
http://www.maulikkotak.webnode.com
http://www.facebook.com/maulikkotakstar
http://www.twitter.com/maulikkotakstar