SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
NASIR ARAFAT
 In computer networking, hacking is any technical
effort to manipulate the normal behaviour of network
connections and connected systems
 Hacker s any person engaged in hacking
 White hat hacking: These hackings are done for good
purposes by computer security experts to protect the
system from any threat
 Black hat hacking: These hackings are done for wrong
purposes for personal gain like hacking of defense
websites, or hacking a bank system
 Grey hat hacking: It is the combination of white hat
and black hat hacking.
The goal of grey hat hackers is to provide national
security
 It is the process of hacking from the hackers
 Ethical hacking is testing the resources for a
good cause and for the betterment of
technology
 Technically ethical hacking means Penetration
Testing which is focused on securing and
protecting IT systems
 Ethical hacking is also called attack &
penetration testing
 Penetration testing is done to secure and
protect IT system
 It is the attack on a computer system with the
intention of finding security weakness
 It’s a legal way for securing a system
 Part of an overall security program
 Ethical hacker makes the system full proof
 The attacks are done in non-destructive
manner
 Formulating Plan: Approval for ethical
hacking is essential because no one can point
to hackers of his work
 Executing Plan: Requirement of pre planning
of hackers test that they are performing
 Evaluation Result: Evaluating the result &
correlating the specific vulnerabilities
discovered is a skill that’s get better with the
experience
 Using Encryption to encrypt important data
 Set up Firewalls to prevent unauthorized or
unwanted communications between
computer networks or hosts
 Use of Steganography for hiding an
information in a medium, such as a digital
picture or audio files
 To make security stronger (Ethical Hacking)
 Hack other system secretly
 Steal important information
 Destroy enemy’s computer network during
the war
 Hack to notify many people their thought
 Ethical hacking is legal way to secure your
system
 Main way to that giving your system in hands
of ethical hackers so that he can make your
system full proof
 Ethical hackers attacks in non-destructive
manners
Ethical Hacking

Contenu connexe

Tendances

Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityShafaan Khaliq Bhatti
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Ethical Hacker
Ethical HackerEthical Hacker
Ethical Hackerkeriann70
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lectureZara Nawaz
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical HackingRohan Raj
 
06. security concept
06. security concept06. security concept
06. security conceptMuhammad Ahad
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hackingWaseem Rauf
 
CNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewCNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewSam Bowne
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cftoamma
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1limsh
 
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedThreat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedFalgun Rathod
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentationhamzakareem2
 
Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of ComputerFaizan Janjua
 
Wireless Intrusion Techniques
Wireless Intrusion TechniquesWireless Intrusion Techniques
Wireless Intrusion TechniquesCadis1
 

Tendances (20)

Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Network Security Topic 1 intro
Network Security Topic 1 introNetwork Security Topic 1 intro
Network Security Topic 1 intro
 
Ethical Hacker
Ethical HackerEthical Hacker
Ethical Hacker
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Computer security
Computer securityComputer security
Computer security
 
Lesson 2 - IDPS
Lesson 2 - IDPSLesson 2 - IDPS
Lesson 2 - IDPS
 
06. security concept
06. security concept06. security concept
06. security concept
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
CNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewCNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking Overview
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
 
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedThreat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of Computer
 
Wireless Intrusion Techniques
Wireless Intrusion TechniquesWireless Intrusion Techniques
Wireless Intrusion Techniques
 

En vedette

Nscglobal ENC agreement
Nscglobal   ENC agreementNscglobal   ENC agreement
Nscglobal ENC agreementSayed Mousa
 
Salesforce_Certified_Administrator
Salesforce_Certified_AdministratorSalesforce_Certified_Administrator
Salesforce_Certified_AdministratorParamesh marina
 
Design parameters to obtain al2 o3 nanofluid to enhance heat transfer
Design parameters to obtain al2 o3 nanofluid to enhance heat transferDesign parameters to obtain al2 o3 nanofluid to enhance heat transfer
Design parameters to obtain al2 o3 nanofluid to enhance heat transfereSAT Journals
 
Nossa Amizade é um Conto de Fadas
Nossa Amizade é um Conto de FadasNossa Amizade é um Conto de Fadas
Nossa Amizade é um Conto de Fadaselenirmeirelles
 
Abc’s of Canada
Abc’s of Canada  Abc’s of Canada
Abc’s of Canada IESO
 
Sports in Canada
Sports in CanadaSports in Canada
Sports in CanadaIESO
 
Pastore Maria_Coaching Ripple Effect
Pastore Maria_Coaching Ripple EffectPastore Maria_Coaching Ripple Effect
Pastore Maria_Coaching Ripple EffectMaria Pastore
 
Principios de química y estructura ena1 - ejercicio 09 fórmula empírica de...
Principios de química y estructura    ena1 - ejercicio 09 fórmula empírica de...Principios de química y estructura    ena1 - ejercicio 09 fórmula empírica de...
Principios de química y estructura ena1 - ejercicio 09 fórmula empírica de...Triplenlace Química
 
Simulado de Língua Portuguesa 9º ano
Simulado de Língua Portuguesa 9º anoSimulado de Língua Portuguesa 9º ano
Simulado de Língua Portuguesa 9º anoMarcia Oliveira
 

En vedette (20)

salud ocupacional
salud ocupacionalsalud ocupacional
salud ocupacional
 
Nscglobal ENC agreement
Nscglobal   ENC agreementNscglobal   ENC agreement
Nscglobal ENC agreement
 
Salesforce_Certified_Administrator
Salesforce_Certified_AdministratorSalesforce_Certified_Administrator
Salesforce_Certified_Administrator
 
Design parameters to obtain al2 o3 nanofluid to enhance heat transfer
Design parameters to obtain al2 o3 nanofluid to enhance heat transferDesign parameters to obtain al2 o3 nanofluid to enhance heat transfer
Design parameters to obtain al2 o3 nanofluid to enhance heat transfer
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
2013 хцү 02
2013 хцү 022013 хцү 02
2013 хцү 02
 
Nossa Amizade é um Conto de Fadas
Nossa Amizade é um Conto de FadasNossa Amizade é um Conto de Fadas
Nossa Amizade é um Conto de Fadas
 
Abc’s of Canada
Abc’s of Canada  Abc’s of Canada
Abc’s of Canada
 
Sports in Canada
Sports in CanadaSports in Canada
Sports in Canada
 
Trabajo exel
Trabajo exelTrabajo exel
Trabajo exel
 
Storia_del_Canada
Storia_del_CanadaStoria_del_Canada
Storia_del_Canada
 
Pastore Maria_Coaching Ripple Effect
Pastore Maria_Coaching Ripple EffectPastore Maria_Coaching Ripple Effect
Pastore Maria_Coaching Ripple Effect
 
Material calculo-integral-2
Material calculo-integral-2Material calculo-integral-2
Material calculo-integral-2
 
Kolač
KolačKolač
Kolač
 
Atp, cromosomas
Atp, cromosomasAtp, cromosomas
Atp, cromosomas
 
Etica y-liderazgo-empresarial
Etica y-liderazgo-empresarialEtica y-liderazgo-empresarial
Etica y-liderazgo-empresarial
 
Principios de química y estructura ena1 - ejercicio 09 fórmula empírica de...
Principios de química y estructura    ena1 - ejercicio 09 fórmula empírica de...Principios de química y estructura    ena1 - ejercicio 09 fórmula empírica de...
Principios de química y estructura ena1 - ejercicio 09 fórmula empírica de...
 
Simulado de Língua Portuguesa 9º ano
Simulado de Língua Portuguesa 9º anoSimulado de Língua Portuguesa 9º ano
Simulado de Língua Portuguesa 9º ano
 
Band Folio.Book 1 - Fagote
Band Folio.Book 1 - FagoteBand Folio.Book 1 - Fagote
Band Folio.Book 1 - Fagote
 
Band Folio.Book 1 - Sax Tenor
Band Folio.Book 1 - Sax TenorBand Folio.Book 1 - Sax Tenor
Band Folio.Book 1 - Sax Tenor
 

Similaire à Ethical Hacking

Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraVaishnaviKhandelwal6
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical HackingMasih Karimi
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptShravan Sanidhya
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPTashish kumar
 
An Introduction to Ethical Hacking
An Introduction to Ethical HackingAn Introduction to Ethical Hacking
An Introduction to Ethical HackingVinny Vessel
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipurcyber cure
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to HackingRishabha Garg
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxJanani S
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking reportAkhilesh Patel
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxMaheshDhope1
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guidePankaj Dubey
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber securityankit gandharkar
 
Information security
Information securityInformation security
Information securityVarshil Patel
 

Similaire à Ethical Hacking (20)

Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical Hacking
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
An Introduction to Ethical Hacking
An Introduction to Ethical HackingAn Introduction to Ethical Hacking
An Introduction to Ethical Hacking
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptx
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
 
Information security
Information securityInformation security
Information security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Dernier

Scenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenariosScenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenariosErol GIRAUDY
 
20140402 - Smart house demo kit
20140402 - Smart house demo kit20140402 - Smart house demo kit
20140402 - Smart house demo kitJamie (Taka) Wang
 
Keep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES LiveKeep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES LiveIES VE
 
The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)IES VE
 
Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...DianaGray10
 
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024Alkin Tezuysal
 
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechWebinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechProduct School
 
3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud DataEric D. Schabell
 
Automation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsAutomation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsDianaGray10
 
2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdfThe Good Food Institute
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc
 
IT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingIT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingMAGNIntelligence
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarThousandEyes
 
From the origin to the future of Open Source model and business
From the origin to the future of  Open Source model and businessFrom the origin to the future of  Open Source model and business
From the origin to the future of Open Source model and businessFrancesco Corti
 
Graphene Quantum Dots-Based Composites for Biomedical Applications
Graphene Quantum Dots-Based Composites for  Biomedical ApplicationsGraphene Quantum Dots-Based Composites for  Biomedical Applications
Graphene Quantum Dots-Based Composites for Biomedical Applicationsnooralam814309
 
Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.IPLOOK Networks
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptxHansamali Gamage
 
LF Energy Webinar - Unveiling OpenEEMeter 4.0
LF Energy Webinar - Unveiling OpenEEMeter 4.0LF Energy Webinar - Unveiling OpenEEMeter 4.0
LF Energy Webinar - Unveiling OpenEEMeter 4.0DanBrown980551
 

Dernier (20)

Scenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenariosScenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenarios
 
20140402 - Smart house demo kit
20140402 - Smart house demo kit20140402 - Smart house demo kit
20140402 - Smart house demo kit
 
Keep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES LiveKeep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES Live
 
The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)
 
Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...
 
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
 
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechWebinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
 
3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data
 
Automation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsAutomation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projects
 
2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
IT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingIT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced Computing
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? Webinar
 
From the origin to the future of Open Source model and business
From the origin to the future of  Open Source model and businessFrom the origin to the future of  Open Source model and business
From the origin to the future of Open Source model and business
 
SheDev 2024
SheDev 2024SheDev 2024
SheDev 2024
 
Graphene Quantum Dots-Based Composites for Biomedical Applications
Graphene Quantum Dots-Based Composites for  Biomedical ApplicationsGraphene Quantum Dots-Based Composites for  Biomedical Applications
Graphene Quantum Dots-Based Composites for Biomedical Applications
 
Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx
 
LF Energy Webinar - Unveiling OpenEEMeter 4.0
LF Energy Webinar - Unveiling OpenEEMeter 4.0LF Energy Webinar - Unveiling OpenEEMeter 4.0
LF Energy Webinar - Unveiling OpenEEMeter 4.0
 

Ethical Hacking

  • 2.  In computer networking, hacking is any technical effort to manipulate the normal behaviour of network connections and connected systems  Hacker s any person engaged in hacking
  • 3.  White hat hacking: These hackings are done for good purposes by computer security experts to protect the system from any threat  Black hat hacking: These hackings are done for wrong purposes for personal gain like hacking of defense websites, or hacking a bank system  Grey hat hacking: It is the combination of white hat and black hat hacking. The goal of grey hat hackers is to provide national security
  • 4.  It is the process of hacking from the hackers  Ethical hacking is testing the resources for a good cause and for the betterment of technology  Technically ethical hacking means Penetration Testing which is focused on securing and protecting IT systems
  • 5.  Ethical hacking is also called attack & penetration testing  Penetration testing is done to secure and protect IT system  It is the attack on a computer system with the intention of finding security weakness
  • 6.  It’s a legal way for securing a system  Part of an overall security program  Ethical hacker makes the system full proof  The attacks are done in non-destructive manner
  • 7.  Formulating Plan: Approval for ethical hacking is essential because no one can point to hackers of his work  Executing Plan: Requirement of pre planning of hackers test that they are performing  Evaluation Result: Evaluating the result & correlating the specific vulnerabilities discovered is a skill that’s get better with the experience
  • 8.  Using Encryption to encrypt important data  Set up Firewalls to prevent unauthorized or unwanted communications between computer networks or hosts  Use of Steganography for hiding an information in a medium, such as a digital picture or audio files
  • 9.  To make security stronger (Ethical Hacking)  Hack other system secretly  Steal important information  Destroy enemy’s computer network during the war  Hack to notify many people their thought
  • 10.  Ethical hacking is legal way to secure your system  Main way to that giving your system in hands of ethical hackers so that he can make your system full proof  Ethical hackers attacks in non-destructive manners