0% found this document useful (0 votes)
15 views

Presentation 1

Uploaded by

ggi2022.2195
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Presentation 1

Uploaded by

ggi2022.2195
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Ethicial

Hacking
BY AKRITEE KUMARI
CSE DATA SCIENCE
1.Introduction

2.Ethical
9.Conclusion
Hacking

3.Who are
8.Disadvantages
Hackers

Content
4.Why do
7.Advantages
hackers hack?

6.Why do we
5.Type of
need Ethical
Hackers
Hacking
Introduction


Ethical Hacking also known as
penetration testing or white-hat hacking,
involves the same tools, tricks, and
techniques that hackers use, but with one
major difference that ethical hacking is
legal.
Ethical Hacking

.Independent .Evaluate target


computer security .Neither damage systems security and
Professionals the target systems n report back to owner
breaking into the or steal information. s about the
computer systems. bugs found.
A person who enjoys learning
details of a programming
language or system.

A person who enjoys


actually doing the programming
rather than just theorizing about
it.

Who are A person capable of appreciating


someone else's hacking.

Hackers?
A person who picks up
programming quickly.

A person who is an expert


at particular programming
language or system.
Just of fun.

Show off.

Why do Hack other system secretly.

Hackers Notify many people their thought.

Hack? Steal important information.

Destroy enemy's computer network


during the war.
Type of Hackers

 Black – Hat Hacker


 White –Hat Hacker
 Grey – Hat Hacker
Black – Hat Hacker

A black hat hackers or That is black


crackers are individuals hat hackers use their
with extraordinary knowledge and skill for
computing skills, their own personal
resorting to malicious or gains probably
destructive activities. by hurting others.
White –Hat Hacker

 White hat hackers are those individuals


professing hacker skills and using them for
defensive purposes.

 This means that the white hat hackers


use their knowledge and skill for the
good of others and for the common good.
Grey –Hat Hacker

 These are individuals who work


both offensively and defensively
at various times.
 We cannot predict their behavior.
 Sometimes they use their
skills for the common good
while in some other times he uses
them for their personal gains.
Why do
we need
Ethical
Hacking?
 To catch a thief you have to think like a thief.
Advantages  Helps in closing the open holes in the
system network.
 Provides security to banking and
financial establishments.
 Prevents website defacements.
 An evolving technique.
 All depends upon the trustworthiness of the
Disadvantages ethical hacker
 Hiring professionals is expensive.
 In the preceding sections we saw the
methodology of hacking, why should we
aware of hacking and some tools which a
hacker may use.
 Now we can see what can we do
against hacking or to protect ourselves from
Conclusion 
hacking.
The first thing we should do is
to keep ourselves updated about those
software's we and using for official and
reliable sources.
 Educate the employees and the users against
black hat hacking.

You might also like