Unit 1-EH Notes Final
Unit 1-EH Notes Final
Hacking
Introduction to
Ethical Hacking
1
Introduction to Ethical Hacking
Agenda
BLACK HAT
1. Steal/Leak Information
2. Disrupt Services
3. Money
4. Driven by Purpose – (Hacktivism, Idealism,
Political Motives)
5. For Fun
24
25
26
27
Classification of cyber
●
crime
Cybercrime against individual
● Cybercrime against property
● Cybercrime against organization
● Cybercrime against society
ID theft
● What PII includes,
○ Full name
○ SSN
○ Telephone number and mobile number
○ Driver license number
○ Credit card number
○ Digital identity
○ Birthday
○ Birthplace
○ Face and fingerprints
● Potential PII includes, first and last name ,age , country, state, city of
residence, gender, name of school/college, job position, grades,
salary, criminal record
57
Virus
A computer virus is a type of computer
program that, when executed, replicates
itself by modifying other computer
programs and inserting its own code.
When this replication succeeds, the
affected areas are then said to be
"infected" with a computer virus.
70
Cybercrime against society
Forgery
75
What do you mean by Code of
Ethics
Like Army , Police, Doctor & Lawyer , Ethical Hacker also have
to follow some code of ethics.
I Know Everything
Prof.Reeta Singh , Ethical
Hacking Notes
Code of Ethics for Ethical Hackers
(An Example)
83
Prevention of cyber crime
Action