SlideShare a Scribd company logo
1 of 17
A PRESENTATION ON
ETHICAL
HACKING
CONTENTS TO FOCUS:-
• HACKING
• ETHICAL HACKING
• TYPES OF HACKERS
• WHO ARE ETHICAL HACKERS?
• HACKERS V/s CRACKERS
• INTRUDERS
• ADVANTAGES OF ETHICAL HACKING
• WHAT SHOULD BE DONE IF THE SYSTEM IS
HACKED?
• SECURING OUR WIRELESS NETWORKS
HACKING
 Also known as Attack or Penetration
Testing.
 Hackers are those who access
computer networks, legally or otherwise.
ETHICAL HACKING
Ethical hacking involves getting
authorized access to resources in order
to test if that resource is vulnerable
against attacks.
TYPES OF HACKERS
There are two types of hackers:-
 White hat hacker
 Black hat hacker
 White hat hacker:-
These are considered as good
guys. They do not use their skills for illegal
purposes.They usually become computer
security experts and they help to protect from
the black hat hackers.
 Black hat hacker:-
These are the bad
guys. They usually use their skills
for their personal gains. They are
the people that hack banks
accounts, steal credit cards and
deface websites.
WHO ARE ETHICAL
HACKERS? To test a security system, ethical hackers use the
same methods as their less principled counterparts,
but report problems instead of taking advantage of
them.
Ethical hacker is a computer and network expert
who attacks a security system on behalf of its
owners, seeking vulnerabilities that a
malicious hacker could exploit.
 An ethical hacker is usually employed by an
organization who trusts him or her to attempt to
penetrate networks and/or computer systems, using
the same methods as a hacker for the purpose of
finding and fixing computer security vulnerabilities.
HACKERS V/s
CRACKERS A hacker is a person who is proficient with
computers and/or programming to an elite level
where they know all of the in's and out's of a system.
There is no illegality involved with being a hacker.
 A cracker is a hacker who uses their proficiency for
personal gains outside of the law. EX: stealing data,
changing bank accounts, distributing viruses etc.
INTRUDERS
An Intruder is a person who enters into the
restricted area of a network and breaks it’s
security. An Intruder is a person that acts as a
third party between two communicating
networks. An Intruder is a person with negative
intensions that can steal,harm or even destroy
our confidential data.
ADVANTAGES OF ETHICAL
HACKINGEthical hacking will reveal the flaws of what is
being hacked (software, a website, a network,
etc.) without actually causing any damage. An
ethical hacker will find the flaw and report it to
the owner so that it can be fixed as soon as
possible.
DISADVANTAGES OF ETHICAL
HACKING
Disadvantages would lead towards
people who hack with malicious
intent. They can be prosecuted and
have their computer taken away.
WHAT SHOULD BE DONE IF THE
SYSTEM IS HACKED?
Call your bank and/or credit
agencies.
Scan and update your computer.
Update and boost your passwords.
SECURING OUR WIRELESS
NETWORKS Use strong data encryption protocols.
 Change default passwords and usernames.
 Limit access to your access point.
 Do not connect to open wi-fi networks.
 Enable firewall to each computer and
router.
 Assign static IP address to devices.
THANK YOU
ANY SUGGESSIONS OR
QUERIES?

More Related Content

What's hot

Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
talhaabid
 
Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyay
Chandra Prakash
 

What's hot (20)

Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Top 10 most famous hackers of all time
Top 10 most famous hackers of all timeTop 10 most famous hackers of all time
Top 10 most famous hackers of all time
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical Hacking
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
 
Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyay
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking Tutorial in Telugu
Hacking Tutorial in TeluguHacking Tutorial in Telugu
Hacking Tutorial in Telugu
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 

Viewers also liked (9)

Arjun it
Arjun  itArjun  it
Arjun it
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 

Similar to Ethical hacking

Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
prosunghosh7
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
Gautam708801
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
teriwoja
 

Similar to Ethical hacking (20)

Intro
IntroIntro
Intro
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Hacking
HackingHacking
Hacking
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Hacking Technology
Hacking Technology Hacking Technology
Hacking Technology
 
Hackers
HackersHackers
Hackers
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Ethical Hacking (basics)
Ethical Hacking (basics)Ethical Hacking (basics)
Ethical Hacking (basics)
 
Hacking
HackingHacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
What Is Hacking
What Is HackingWhat Is Hacking
What Is Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
All About Hacking..!!
All About Hacking..!!All About Hacking..!!
All About Hacking..!!
 
All About Hacking.!!
All About Hacking.!! All About Hacking.!!
All About Hacking.!!
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Ethical hacking

  • 2. CONTENTS TO FOCUS:- • HACKING • ETHICAL HACKING • TYPES OF HACKERS • WHO ARE ETHICAL HACKERS? • HACKERS V/s CRACKERS • INTRUDERS • ADVANTAGES OF ETHICAL HACKING • WHAT SHOULD BE DONE IF THE SYSTEM IS HACKED? • SECURING OUR WIRELESS NETWORKS
  • 3. HACKING  Also known as Attack or Penetration Testing.  Hackers are those who access computer networks, legally or otherwise.
  • 4. ETHICAL HACKING Ethical hacking involves getting authorized access to resources in order to test if that resource is vulnerable against attacks.
  • 5. TYPES OF HACKERS There are two types of hackers:-  White hat hacker  Black hat hacker  White hat hacker:- These are considered as good guys. They do not use their skills for illegal purposes.They usually become computer security experts and they help to protect from the black hat hackers.
  • 6.  Black hat hacker:- These are the bad guys. They usually use their skills for their personal gains. They are the people that hack banks accounts, steal credit cards and deface websites.
  • 7. WHO ARE ETHICAL HACKERS? To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them. Ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit.  An ethical hacker is usually employed by an organization who trusts him or her to attempt to penetrate networks and/or computer systems, using the same methods as a hacker for the purpose of finding and fixing computer security vulnerabilities.
  • 8. HACKERS V/s CRACKERS A hacker is a person who is proficient with computers and/or programming to an elite level where they know all of the in's and out's of a system. There is no illegality involved with being a hacker.  A cracker is a hacker who uses their proficiency for personal gains outside of the law. EX: stealing data, changing bank accounts, distributing viruses etc.
  • 9.
  • 10.
  • 11. INTRUDERS An Intruder is a person who enters into the restricted area of a network and breaks it’s security. An Intruder is a person that acts as a third party between two communicating networks. An Intruder is a person with negative intensions that can steal,harm or even destroy our confidential data.
  • 12. ADVANTAGES OF ETHICAL HACKINGEthical hacking will reveal the flaws of what is being hacked (software, a website, a network, etc.) without actually causing any damage. An ethical hacker will find the flaw and report it to the owner so that it can be fixed as soon as possible.
  • 13. DISADVANTAGES OF ETHICAL HACKING Disadvantages would lead towards people who hack with malicious intent. They can be prosecuted and have their computer taken away.
  • 14. WHAT SHOULD BE DONE IF THE SYSTEM IS HACKED? Call your bank and/or credit agencies. Scan and update your computer. Update and boost your passwords.
  • 15. SECURING OUR WIRELESS NETWORKS Use strong data encryption protocols.  Change default passwords and usernames.  Limit access to your access point.  Do not connect to open wi-fi networks.  Enable firewall to each computer and router.  Assign static IP address to devices.