SlideShare une entreprise Scribd logo
1  sur  20
A presentation
by-
Shalu gupta
 Computer hacking is when
  someone modifies computer
  hardware or software in a
  way that alters the creator's
  original intention,
 There are two types of
  people in the world.

    good one & bad one
An ethical hacker is a
 computer and network
 expert who attacks a
 security system on
 behalf of its owners

An ethical hacker is
 sometimes called
 a white hat, a term that
 comes from old Western
 movies, where the "good
 guy" wore a white hat
 and the "bad guy" wore
 a black hat.
OTHER TYPES OF HACKER
 SCRIPT KIDDIES: Script kiddie is a pejorative term
  for a computer intruder with little or no skill; a
  person who simply follows directions or uses a
  cook-book approach .
 CRACKERS : Those who will enter your computer
  just for the fun of it, or to prove their technical skills.
 Gray-hat Hackers:
  These individuals typically follow the law but
  sometimes venture over to the darker side of
  blackhat hacking.
HISTORY OF HACKING
NEED OF ETHICAL HACKING
DRAWBACKS OF EHTICAL
HACKING
CERTIFIED ETHICAL HACKER
*Age-28
*Occupation-Author, computer security
   consultant, MTV host.
*he wrote Unofficial Guide to Ethical
   Hacking at the age of 15.
*Help in 9/11 attack to decode a
   messagae of al-qyaeda.
 *In 2008, the IMT Ghaziabad Centre for
   Distance Learning signed an MoU with
   Fadia to organise its one-year Post-
   Graduate Diploma in Cyber Security.[18]
 1# The secret of Hacking 1
  Edition.
 2# Social Engineering: The Art of
  Human Hacking.
 3# Dangerous Google - Searching
  For Secrets.
 4#Gray Hat Hacking The
  Ethical Hackers Handbook.
 5# Hardware Hacking Have Fun
  While Voiding Your Warranty
CAREERS IN NETWORK SECURITY
AND ETHICAL HACKING
I am ready to
fight for rules
against hackers
!!--FUTURE OF ETHICAL HACKING--!!
LET”S PROTECT YOUR EMAIL PASSWORD…..
Ethical hacking

Contenu connexe

En vedette

Converting your waste into wealth
Converting your waste into wealthConverting your waste into wealth
Converting your waste into wealth
Malini Rajendran
 
Wealth out of waste final
Wealth out of waste finalWealth out of waste final
Wealth out of waste final
DFC2011
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
Jayaseelan Vejayon
 

En vedette (17)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Converting your waste into wealth
Converting your waste into wealthConverting your waste into wealth
Converting your waste into wealth
 
Wealth out of waste final
Wealth out of waste finalWealth out of waste final
Wealth out of waste final
 
Turning waste to wealth
Turning waste to wealthTurning waste to wealth
Turning waste to wealth
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Reliance Jio
Reliance JioReliance Jio
Reliance Jio
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Hacking
HackingHacking
Hacking
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Reliance jio
Reliance jioReliance jio
Reliance jio
 
Ppt on Reliance jio
Ppt on Reliance jioPpt on Reliance jio
Ppt on Reliance jio
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Waste is Wealth: depending on how it is managed and utilized.
Waste is Wealth: depending on how it is managed and utilized.Waste is Wealth: depending on how it is managed and utilized.
Waste is Wealth: depending on how it is managed and utilized.
 

Dernier

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Dernier (20)

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 

Ethical hacking

  • 2.
  • 3.  Computer hacking is when someone modifies computer hardware or software in a way that alters the creator's original intention,  There are two types of people in the world. good one & bad one
  • 4. An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners An ethical hacker is sometimes called a white hat, a term that comes from old Western movies, where the "good guy" wore a white hat and the "bad guy" wore a black hat.
  • 5. OTHER TYPES OF HACKER  SCRIPT KIDDIES: Script kiddie is a pejorative term for a computer intruder with little or no skill; a person who simply follows directions or uses a cook-book approach .  CRACKERS : Those who will enter your computer just for the fun of it, or to prove their technical skills.  Gray-hat Hackers: These individuals typically follow the law but sometimes venture over to the darker side of blackhat hacking.
  • 6.
  • 8.
  • 9. NEED OF ETHICAL HACKING
  • 10.
  • 13. *Age-28 *Occupation-Author, computer security consultant, MTV host. *he wrote Unofficial Guide to Ethical Hacking at the age of 15. *Help in 9/11 attack to decode a messagae of al-qyaeda. *In 2008, the IMT Ghaziabad Centre for Distance Learning signed an MoU with Fadia to organise its one-year Post- Graduate Diploma in Cyber Security.[18]
  • 14.  1# The secret of Hacking 1 Edition.  2# Social Engineering: The Art of Human Hacking.  3# Dangerous Google - Searching For Secrets.  4#Gray Hat Hacking The Ethical Hackers Handbook.  5# Hardware Hacking Have Fun While Voiding Your Warranty
  • 15. CAREERS IN NETWORK SECURITY AND ETHICAL HACKING
  • 16.
  • 17. I am ready to fight for rules against hackers
  • 18. !!--FUTURE OF ETHICAL HACKING--!!
  • 19. LET”S PROTECT YOUR EMAIL PASSWORD…..