SlideShare une entreprise Scribd logo
1  sur  18
ETHICAL
HACKING
what8is8ETHICS8?8888888888888
88888888



          Ethics?
        Moral Responsibility to
         do the correct thing
what8is8ETHICS8?8888888888888
88888888




         “ETOS”
what8is8ETHICS8?8888888888888
88888888


       Meta Ethics
       Normative Ethics

       Applied Ethics
what8is8ETHICS8?8888888888888
88888888


          Why Ethics ?
   Make good people & make good actions
   Social Consideration
   Ethical Consideration
ETHICAL8HACKING888888888888888
88888888

     Art and science of determining
           the vulnerabilities of
    your information infrastructure to
            Better defend them
ETHICAL8HACKING888888888888888
88888888


       Performed by high skilled
               ETHICAL
        Security Professionals
ETHICAL8HACKING888888888888888
88888888
         Types of Ethical Hacking


                      White Box Testing
                    You have full knowledge
                        of the network
ETHICAL8HACKING888888888888888
88888888
            Types of Ethical Hacking


      Black Box Testing
    You have full knowledge
        of the network
Code8of8ethics88888888888888
888888888

 Original Hacker Ethics              Found in Steven
                                     Levy's 1984 book
                                     Hackers:
   Hands On Imperative              Heroes of the
                                     Computer
   Information Wants to Be Free     Revolution

   Mistrust Authority
   No Bogus Criteria
   You can create truth and beauty on a computer
Code8of8ethics88888888888888
888888888

 New Hacker Ethics
 Above all else, do no harm   Found in the
                               article “Is there a
 Protect Privacy              Hacker Ethic for
                               90s Hackers?
 Waste not, want not          written by Steven
                               Mizrach
 Exceed Limitations
Advantages8of8ethical8hacking8
88888888


      To take preventive measures
             against hackers
Advantages8of8ethical8hacking8
88888888


       To fight against terrorism
Advantages8of8ethical8hacking8
88888888


   A system that helps prevent entry by
             hackers to create
DISAdvantages8of8ethical8hacki
ng888888


  The ethical hacker using the knowledge
      they gain to do malicious hacking
                   activities
DISAdvantages8of8ethical8hacki
ng888888


   Allowing the company's financial and
         banking details to be seen
DISAdvantages8of8ethical8hacki
ng888888

 The possibility that the ethical hacker will send
               and/or place malicious
   code, viruses, malware and other destructive
     and harmful things on a computer system
REFERENCES8of8ethical8hacking8
88888888
    Steven Mizrach , Is there a Hacker Ethic for 90s Hackers , 2011

    Steven Levy's,Heroes of the Computer Revolution,1984

    BBC Organization , Ethics Guide , 2012 . [Online]. Available: BBC ,
     http://www.bbc.co.uk/ethics/introduction/ [2012/03/25]

    Geeknizer, Hacking as a Service, 2012. [Online]. Available: Security & Future,
     http://geeknizer.com/hacking-as-a-service-haas-the-security-future-beyond-saas/,
     [2012/03/25]

     H4xOrin' T3h World , What is hacking and cracking, 2011 Nov.[Online].Available :MaxOrin
     The World, http://kingofdkingz99.blogspot.com/2011/08/hacking-cracking-hacking-is-activity-
     of.html [2012/03/25]

Contenu connexe

Similaire à Ethical Hacking

A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdf
uzair
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
talhaabid
 

Similaire à Ethical Hacking (20)

E thical hacking
E thical hackingE thical hacking
E thical hacking
 
How To Become an Ethical Hacker?
How To Become an Ethical Hacker?How To Become an Ethical Hacker?
How To Become an Ethical Hacker?
 
hackers
hackershackers
hackers
 
Exploring-the-World-of-Ethical-Hacking.pptx
Exploring-the-World-of-Ethical-Hacking.pptxExploring-the-World-of-Ethical-Hacking.pptx
Exploring-the-World-of-Ethical-Hacking.pptx
 
ETHICAL HACKING BY HRITIK JAGE
ETHICAL HACKING BY HRITIK JAGEETHICAL HACKING BY HRITIK JAGE
ETHICAL HACKING BY HRITIK JAGE
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Career in Ethical Hacking
Career in Ethical Hacking Career in Ethical Hacking
Career in Ethical Hacking
 
ehical hacking.pptx
ehical hacking.pptxehical hacking.pptx
ehical hacking.pptx
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Why Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdfWhy Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdf
 
Ethical-Hacking.pdf
Ethical-Hacking.pdfEthical-Hacking.pdf
Ethical-Hacking.pdf
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdf
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
 
DEFCON17 - Fail Panel
DEFCON17 - Fail PanelDEFCON17 - Fail Panel
DEFCON17 - Fail Panel
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
A Deep Introduction to Ethical Hacking
A Deep Introduction to Ethical HackingA Deep Introduction to Ethical Hacking
A Deep Introduction to Ethical Hacking
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
 
How To Start a Career in Ethical Hacking- GICSEH.pptx
How To Start a Career in Ethical Hacking- GICSEH.pptxHow To Start a Career in Ethical Hacking- GICSEH.pptx
How To Start a Career in Ethical Hacking- GICSEH.pptx
 

Plus de Anuja Herath (8)

Food Ordering App Concept
Food Ordering App ConceptFood Ordering App Concept
Food Ordering App Concept
 
Success 1st issue
Success   1st issueSuccess   1st issue
Success 1st issue
 
SIS Mid Review Report - 2012
SIS Mid Review Report - 2012SIS Mid Review Report - 2012
SIS Mid Review Report - 2012
 
First interview
First interviewFirst interview
First interview
 
CSS Cheatsheet
CSS CheatsheetCSS Cheatsheet
CSS Cheatsheet
 
Future Phones - Nokia N8
Future Phones - Nokia N8Future Phones - Nokia N8
Future Phones - Nokia N8
 
Search engine optimization
Search engine optimizationSearch engine optimization
Search engine optimization
 
Mobile Bill Management System - Project Proposal
Mobile Bill Management System - Project ProposalMobile Bill Management System - Project Proposal
Mobile Bill Management System - Project Proposal
 

Dernier

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Dernier (20)

Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 

Ethical Hacking