0% found this document useful (0 votes)
124 views

Chandan R K 18CS3K1042 BSC Csme

This document provides an overview of ethical hacking. It discusses the need for security due to risks like data loss, damage, or destruction. It defines different types of hackers such as black-hat, white-hat, and grey-hat hackers. Ethical hacking involves using the same techniques as hackers but with permission to discover vulnerabilities. It requires skills in areas like operating systems, firewalls, and protocols. The advantages include improving security and preventing attacks, while disadvantages include costs and relying on trust in ethical hackers.

Uploaded by

Chandan R K
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
124 views

Chandan R K 18CS3K1042 BSC Csme

This document provides an overview of ethical hacking. It discusses the need for security due to risks like data loss, damage, or destruction. It defines different types of hackers such as black-hat, white-hat, and grey-hat hackers. Ethical hacking involves using the same techniques as hackers but with permission to discover vulnerabilities. It requires skills in areas like operating systems, firewalls, and protocols. The advantages include improving security and preventing attacks, while disadvantages include costs and relying on trust in ethical hackers.

Uploaded by

Chandan R K
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

ETHICAL

HACKIN
G CHANDAN R K
18CS3K1042
BSC CSME
CONTENT

 Introduction
 Need for Security
 Types of Hackers
 Ethical Hacking
 Required Skills of an Ethical Hacking
 Advantages
 Disadvantages
 Conclusion
INTRODUCTION

• Ethical hacking also known as penetration testing or white-hat


8hacking, involves the same tools, tricks, and techniques that hackers
use, but with one major difference that Ethical hacking is legal. Ethical
hacking is performed with the target’s permission. The intent of ethical
hacking is to discover vulnerabilities from a hacker’s viewpoint so
systems can be better secured. Its part of an overall information risk
management program that allows for ongoing security improvements.
NEED FOR SECURITY

● Lose of confidential data

● Damage or destruction of data

● Damage or destruction of computer system

● Loss of reputation of a company


TYPES OF HACKERS
● Black-Hat Hacker: A black hat hackers use their knowledge and skill for their
own personal gains probably by hurting others.

● White-Hat Hacker: White hat hackers use their knowledge and skill for the
good of others and for the common good.

● Grey-Hat Hackers: These are individuals who work both offensively and
defensively at various times. We cannot predict their behaviour. Sometimes they
use their skills for the common good while in some other times he uses them for
their personal gains.
ETHICAL HACKING
• Ethical hacking defined as “a methodology adopted by ethical
hackers to discover the vulnerabilities existing in information
systems’ operating environments.”

• With the growth of the Internet, computer security has become a


major concern for businesses and governments.
REQUIRED SKILLS OF AN ETHICAL HACKER

• Microsoft
• Linux
• Firewalls
• Routers
• Mainframes
• Network Protocols
• Project Management
ADVANTAGES

 “To catch a thief you have to think like a thief”

 Helps in closing the open holes in the system network

 Provides security to banking and financial establishments

 Prevents website defacements

 An evolving technique
DISADVANTAGES

 All depends upon the trustworthiness of the ethical hacker

 Hiring professionals is expensive.


CONCLUSION
• One of the main aims of the seminar is to make others understand that there
are so many tools through which a hacker can get in to a system. Let’s check
its various needs from various perspectives.

• Educate the employees and the users against black hat hacking.

• The first thing we should do is to keep ourselves updated about those


softwares we and using for official and reliable sources.

You might also like