SlideShare a Scribd company logo
2
Most read
9
Most read
11
Most read
Business Communication Class Presentation
School of Electronics
Kalinga Institute of Industrial Technology
TOPIC:ETHICAL HACKING
Prepared By : Yash Shukla Guided By-Dr. Sahel Md.
Delabul Hossain Roll No.-1707083
Assistant Professor
STRUCTURE OF PRESENTATION
❖ Introduction
❖ Ethical Hacker but not criminal hackers.
❖ Types of Hackers
❖ →Black Hat
❖ →White Hat
❖ →Grey Hat
❖ Skill of a Hacker
❖ Advantages & Disadvantages
❖ Conclusion
❖ References
❖ Queries if any?
1
INTRODUCTION
❏ Ethical hacking also known as penetration testing or
white-hat hacking, involves the same tools, tricks, and
techniques that hackers use, but with one major
difference that Ethical hacking is legal.
❏ Independent computer security Professionals breaking
into the computer systems. Neither damage the target
systems nor steal information. Evaluate target systems
security and report back to owners about the
vulnerabilities found.
2
ETHICAL HACKERS BUT NOT
CRIMINAL HACKERS!!
❖ A person who enjoys learning details of a programming
language or system .
❖ A person who enjoys actually doing the programming
rather than just theorizing about it .
❖ A person capable of appreciating someone else's
hacking.
❖ A person who picks up programming quickly .
❖ A person who is an expert at a particular programming
language or system and computer networking skills.
3
TYPES OF HACKERS
❖Black Hat Hacker
❖ White Hat Hacker
❖Gray Hat Hacker
4
BLACK-HAT HACKER
A black hat hacker or cracker are individuals with
extraordinary computing skills, resorting to
malicious or destructive activities. That is black
hat hackers use their knowledge and skill for their
own personal gains probably by hurting others.
5
WHITE-HAT HACKER
White hat hackers are those individuals
professing hacker skills and using them for
defensive purposes. This means that the white
hat hackers use their knowledge and skill for the
good of others and for the common good.
6
GREY-HAT HACKERS
These are individuals who work both offensively
and defensively at various times. We cannot
predict their behavior. Sometimes they use their
skills for the common good while in some other
times he uses them for their personal gains
7
REQUIRED SKILLS OF AN ETHICAL
HACKER❖ Linux: knowledge of Linux/Unix;
❖ Routers: knowledge of routers,protocols, and
access control lists
❖ Technical & Security Knowledge
❖ Operating System Knowledge
❖ Network Knowledge
❖ Computer Expert
❖ Patience!!
8
ADVANTAGES &
DISADVANTAGES‘’To catch a thief you have to think like a thief”
1) Helps in closing the open holes in the system
network
2)Provides security to banking and financial
establishments
3) Prevents website defacements .
4)An evolving technique
4)All depends upon the trustworthiness of the ethical
9
CONCLUSION
In the preceding sections we saw the methodology of
hacking, why should we aware of hacking and some
tools which a hacker may use.
Now we can see what can we do
against hacking or to protect ourselves from hacking.
The first thing we should do is to keep ourselves
updated about those software’s we and using for
official and reliable sources. Educate the employees
and the users against black hat hacking.
10
REFERENCES
● www.simplelearn.net
● www.cehtecnology.com
● www.grras.com
11
Queries if any??
12
THANK YOU
13

More Related Content

PPTX
Presentation on Ethical Hacking ppt
PPTX
Ethical hacking Presentation
PPT
Ethical Hacking Powerpoint
PPTX
Ethical Hacking
PPTX
Ethical hacking
PPTX
ppt Artificial intelligence .pptx
PPTX
Ethical Hacking
PPT
Ethical hacking
Presentation on Ethical Hacking ppt
Ethical hacking Presentation
Ethical Hacking Powerpoint
Ethical Hacking
Ethical hacking
ppt Artificial intelligence .pptx
Ethical Hacking
Ethical hacking

What's hot (20)

PPT
Ethical Hacking
PPTX
Ethical Hacking
PPTX
Ethical hacking
PPTX
Ethical hacking
PPT
Ethical hacking a licence to hack
PPTX
Ethical hacking
ODP
Ethical hacking ppt
PDF
Ethical Hacking Tools
PPT
Ethical hacking presentation
PPSX
Information Security and Ethical Hacking
PPTX
Ethical hacking presentation
PPTX
Ethical hacking a research paper
PPTX
Introduction ethical hacking
PPTX
Ethical hacking : Its methodologies and tools
PPT
Ethical hacking
PPTX
Inetsecurity.in Ethical Hacking presentation
PPTX
Ethical hacking/ Penetration Testing
PPTX
Ethical hacking
PPTX
Ethical Hacking
Ethical Hacking
Ethical Hacking
Ethical hacking
Ethical hacking
Ethical hacking a licence to hack
Ethical hacking
Ethical hacking ppt
Ethical Hacking Tools
Ethical hacking presentation
Information Security and Ethical Hacking
Ethical hacking presentation
Ethical hacking a research paper
Introduction ethical hacking
Ethical hacking : Its methodologies and tools
Ethical hacking
Inetsecurity.in Ethical Hacking presentation
Ethical hacking/ Penetration Testing
Ethical hacking
Ethical Hacking

Similar to ETHICAL HACKING PRESENTATION (20)

PPTX
sourabh_sipPPT.pptx
PPTX
Ethical hacking
PPTX
ETHICAL HACKING dddddddddddddddfnandni.pptx
PPTX
ETHICAL HACKING dddddddddddddddfnandni.pptx
PPTX
dane Technical seminar Be in computer Engineeringppt.pptx
PPTX
VIVEK_JADHAV[1].pptx this ppt is based on ethical hacking
PPTX
this ppt is based on ethica l hacking _
PPT
Introduction To Ethical Hacking
PPTX
Etical hacking
PPTX
Ethical hacking
PPT
Ethical hacking
PPT
Ethical hacking
PPTX
Ethical Hacking
PPTX
ethical Hacking [007]
PPTX
CSSE-Ethical-Hacking-ppt.pptx
PPTX
A survey of ethical hacking process and security
PPTX
Introduction of Cyber Security
PPTX
Intro
PPTX
Ethical hacking
sourabh_sipPPT.pptx
Ethical hacking
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
dane Technical seminar Be in computer Engineeringppt.pptx
VIVEK_JADHAV[1].pptx this ppt is based on ethical hacking
this ppt is based on ethica l hacking _
Introduction To Ethical Hacking
Etical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical Hacking
ethical Hacking [007]
CSSE-Ethical-Hacking-ppt.pptx
A survey of ethical hacking process and security
Introduction of Cyber Security
Intro
Ethical hacking

Recently uploaded (20)

PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
additive manufacturing of ss316l using mig welding
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
bas. eng. economics group 4 presentation 1.pptx
DOCX
573137875-Attendance-Management-System-original
PPTX
web development for engineering and engineering
PPTX
Geodesy 1.pptx...............................................
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
OOP with Java - Java Introduction (Basics)
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PDF
Digital Logic Computer Design lecture notes
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
composite construction of structures.pdf
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
additive manufacturing of ss316l using mig welding
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Arduino robotics embedded978-1-4302-3184-4.pdf
Foundation to blockchain - A guide to Blockchain Tech
bas. eng. economics group 4 presentation 1.pptx
573137875-Attendance-Management-System-original
web development for engineering and engineering
Geodesy 1.pptx...............................................
UNIT 4 Total Quality Management .pptx
OOP with Java - Java Introduction (Basics)
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Internet of Things (IOT) - A guide to understanding
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Strings in CPP - Strings in C++ are sequences of characters used to store and...
Digital Logic Computer Design lecture notes
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
composite construction of structures.pdf
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT

ETHICAL HACKING PRESENTATION

  • 1. Business Communication Class Presentation School of Electronics Kalinga Institute of Industrial Technology TOPIC:ETHICAL HACKING Prepared By : Yash Shukla Guided By-Dr. Sahel Md. Delabul Hossain Roll No.-1707083 Assistant Professor
  • 2. STRUCTURE OF PRESENTATION ❖ Introduction ❖ Ethical Hacker but not criminal hackers. ❖ Types of Hackers ❖ →Black Hat ❖ →White Hat ❖ →Grey Hat ❖ Skill of a Hacker ❖ Advantages & Disadvantages ❖ Conclusion ❖ References ❖ Queries if any? 1
  • 3. INTRODUCTION ❏ Ethical hacking also known as penetration testing or white-hat hacking, involves the same tools, tricks, and techniques that hackers use, but with one major difference that Ethical hacking is legal. ❏ Independent computer security Professionals breaking into the computer systems. Neither damage the target systems nor steal information. Evaluate target systems security and report back to owners about the vulnerabilities found. 2
  • 4. ETHICAL HACKERS BUT NOT CRIMINAL HACKERS!! ❖ A person who enjoys learning details of a programming language or system . ❖ A person who enjoys actually doing the programming rather than just theorizing about it . ❖ A person capable of appreciating someone else's hacking. ❖ A person who picks up programming quickly . ❖ A person who is an expert at a particular programming language or system and computer networking skills. 3
  • 5. TYPES OF HACKERS ❖Black Hat Hacker ❖ White Hat Hacker ❖Gray Hat Hacker 4
  • 6. BLACK-HAT HACKER A black hat hacker or cracker are individuals with extraordinary computing skills, resorting to malicious or destructive activities. That is black hat hackers use their knowledge and skill for their own personal gains probably by hurting others. 5
  • 7. WHITE-HAT HACKER White hat hackers are those individuals professing hacker skills and using them for defensive purposes. This means that the white hat hackers use their knowledge and skill for the good of others and for the common good. 6
  • 8. GREY-HAT HACKERS These are individuals who work both offensively and defensively at various times. We cannot predict their behavior. Sometimes they use their skills for the common good while in some other times he uses them for their personal gains 7
  • 9. REQUIRED SKILLS OF AN ETHICAL HACKER❖ Linux: knowledge of Linux/Unix; ❖ Routers: knowledge of routers,protocols, and access control lists ❖ Technical & Security Knowledge ❖ Operating System Knowledge ❖ Network Knowledge ❖ Computer Expert ❖ Patience!! 8
  • 10. ADVANTAGES & DISADVANTAGES‘’To catch a thief you have to think like a thief” 1) Helps in closing the open holes in the system network 2)Provides security to banking and financial establishments 3) Prevents website defacements . 4)An evolving technique 4)All depends upon the trustworthiness of the ethical 9
  • 11. CONCLUSION In the preceding sections we saw the methodology of hacking, why should we aware of hacking and some tools which a hacker may use. Now we can see what can we do against hacking or to protect ourselves from hacking. The first thing we should do is to keep ourselves updated about those software’s we and using for official and reliable sources. Educate the employees and the users against black hat hacking. 10