PRESENTED BY: DIVYADHARSHINI
BCA 5th SEM ‘A’ SEC
VVFGC,TUMKUR
Ethical Hacking
 What is Ethical hacking
 Who are Ethical hackers
 Famous hackers
 Hacker & Ethical hackers
 Types of hackers
 What does an Ethical Hackers do
 Skills of Ethical Hackers
 Advantages and disadvantages
 Future Enhancements
 Security &Counter Measures
 Interference
 Ethical Hackers but not Criminal Hackers.
 Completely trustworthy.
 Strong programming and computer networking skills.
 Learn about the system and trying to find its
weaknesses.
4
 Techniques of criminal hackers is Detection –
Prevention.
 Published research papers or released security
software.
 Ethical Hackers possesses same skills, mindset and
tools of a hacker but the attacks are done in a non-
destructive manner.
 E.G. Cyber Crime Investigators.
5
6
Kevinmitnick Jonathan James Gary McKinnon Kevin Poulsen
Hackers:
 Some one who maliciously breaks into system for
personal gain. Technically these criminals are known
as crackers.
 Access the computer system or network without
authorization.
 Breaks the law.
7
Ethical Hackers:
 Performs most of the same activities with its owner’s
permission.
 Employed by companies to perform penetration tests.
 Independent computer security professionals
breaking onto the computer systems legally.
8
9
 These are good & Ethical
hackers.
 They Don’t use their skill for
illegal purpose.
 Have genuine license to hack.
 Have registered police records.
 Generally, owned by companies
for security designing.
 Generally, these are coders, have
high pay scales
TYPES OF HACKERS
 Very dangerous persons, use
their skills for personal gain.
 Always have motive to earn huge
profit.
 Highly paid persons evolve
themselves mostly in criminal
activities.
 They hack banks, steal credit
cards, & deface websites.
 These could be coders as well as
admins.
10
 Also known as Red Hats.
 Combine of White Hat + Black
Hat hackers .
 Generally these are admins.
 Have little high pay than White
Hats.
 Generally not so dangerous, but
sometimes could be.
11
 An Ethical Hacker is a person doing ethical hacking
that he is a security personal who tries to penetrate in
to a network to find if there is a vulnerability in the
system. An ethical hacker will always have
permission to enter into the target network.
 If they succeed in penetrating into the system then he
will report to the company with a detailed report
about the particular vulnerability exploiting which he
got in to the system.
12
 Microsoft
 Linux
 Firewalls
 Routers
 Network protocols
 Project management
13
 Ethical hacking nowadays is a backbone of network
security. The major pros & cons of ethical hacking:
 Advantages:-
 Help in closing the open holes in the network.
 Provides security to banking and financial establishments.
 Prevents website defacements
 Disadvantages:-
 All depends upon trustworthy of Ethical Hacker.
 Hiring professionals is expensive.
14
• As it an evolving the branch of the scope of enhancement in
technology is immense. No ethical hacker can ensure the same
security by using the same technique repeatedly.
• He would have to improve develop & explore new avenues
repeatedly.
• More enhanced software's should be used for optimum
protection. Tools need to updated regularly &more efficient
ones need to be developed.
15
 Use of antivirus.
 Proper logout after use of email
id.
 Manual opening browser.
 Don’t open spam.
 Password protected admin
account.
16
 Keep your password protected and password should be
with characters, digits and special symbols. Do not
respond to fake on fishing email. When you are doing
any online transaction always keep watch on site
whether the protocol of site is https & whether there is
a lock symbol and evaluate the security levels.
17
18
19

More Related Content

PPTX
Ethical Hacking
PPTX
Ethical Hacking
PPTX
Ethical hacking
DOCX
Full seminar report on ethical hacking
PDF
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
PPTX
Ethical hacking introduction to ethical hacking
PPTX
Ethical hacking
Ethical Hacking
Ethical Hacking
Ethical hacking
Full seminar report on ethical hacking
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
Ethical hacking introduction to ethical hacking
Ethical hacking

What's hot (20)

PPTX
Ethical hacking
PPT
Ethical hacking
PDF
Ethical hacking
PPTX
Ethical Hacking
PPTX
ethical hacking
PPTX
Ethical Hacking
PPTX
Ethical hacking basics
PPTX
Ethical hacking
DOCX
Ethical hacking
PPTX
Ethical Hacking
PPTX
Ethical hacking
PPT
Ethical Hacking
PPT
Ethical hacking
DOCX
Ethical hacking
PPTX
Ethical hacking
PPTX
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
PPT
Ethical Hacking
PPTX
Ethical Hacking
PPTX
Ethical Hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical Hacking
ethical hacking
Ethical Hacking
Ethical hacking basics
Ethical hacking
Ethical hacking
Ethical Hacking
Ethical hacking
Ethical Hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking
Ethical Hacking
Ethical Hacking

Similar to Ethical Hacking (20)

PPTX
EthicalHacking_AakashTakale
PPTX
GETTING STARTED WITH THE ETHICAL HACKING.pptx
PPTX
this ppt is based on ethica l hacking _
PPTX
VIVEK_JADHAV[1].pptx this ppt is based on ethical hacking
PPTX
Ethical Hacking.pptx
PPTX
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
PDF
What is Ethical Hacking-defination, examples and techniques.pdf
PPT
Ethical hacking presentation
PPTX
Dr.J.Jegan - Ethical Hacking - 06.12.2024.pptx
PPT
Ethical hacking a licence to hack
PDF
Top 13 hacking software for beginners.pdf
DOCX
Unit 1 Introduction to Cyber Securiyt Attacks.docx
DOCX
Ethical Hacking
PPTX
Ethical hacking
PDF
Ethical hacking: Safeguarding your digital world.
PDF
A Beginner’s Guide to Ethical Hacking.pdf
PPTX
Introduction to Cyber Security
PPTX
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
PPTX
CSE-Ethical-Hacking-ppt.pptx
PDF
IRJET- Study of Hacking and Ethical Hacking
EthicalHacking_AakashTakale
GETTING STARTED WITH THE ETHICAL HACKING.pptx
this ppt is based on ethica l hacking _
VIVEK_JADHAV[1].pptx this ppt is based on ethical hacking
Ethical Hacking.pptx
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
What is Ethical Hacking-defination, examples and techniques.pdf
Ethical hacking presentation
Dr.J.Jegan - Ethical Hacking - 06.12.2024.pptx
Ethical hacking a licence to hack
Top 13 hacking software for beginners.pdf
Unit 1 Introduction to Cyber Securiyt Attacks.docx
Ethical Hacking
Ethical hacking
Ethical hacking: Safeguarding your digital world.
A Beginner’s Guide to Ethical Hacking.pdf
Introduction to Cyber Security
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
CSE-Ethical-Hacking-ppt.pptx
IRJET- Study of Hacking and Ethical Hacking

Recently uploaded (20)

PPTX
Internet Safety for Seniors presentation
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PPTX
The-Importance-of-School-Sanitation.pptx
PDF
Paper The World Game (s) Great Redesign.pdf
PPTX
ECO SAFE AI - SUSTAINABLE SAFE AND HOME HUB
PDF
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
PDF
KEY COB2 UNIT 1: The Business of businessĐH KInh tế TP.HCM
PDF
Virtual Guard Technology Provider_ Remote Security Service Solutions.pdf
PDF
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
PPSX
AI AppSec Threats and Defenses 20250822.ppsx
PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
PDF
Computer Networking, Internet, Casting in Network
PDF
The Evolution of Traditional to New Media .pdf
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PPTX
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
PPTX
MY PRESENTATION66666666666666666666.pptx
PPTX
在线订购名古屋艺术大学毕业证, buy NUA diploma学历认证失败怎么办
DOCX
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
PDF
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
PDF
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
Internet Safety for Seniors presentation
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
The-Importance-of-School-Sanitation.pptx
Paper The World Game (s) Great Redesign.pdf
ECO SAFE AI - SUSTAINABLE SAFE AND HOME HUB
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
KEY COB2 UNIT 1: The Business of businessĐH KInh tế TP.HCM
Virtual Guard Technology Provider_ Remote Security Service Solutions.pdf
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
AI AppSec Threats and Defenses 20250822.ppsx
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
Computer Networking, Internet, Casting in Network
The Evolution of Traditional to New Media .pdf
Alethe Consulting Corporate Profile and Solution Aproach
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
MY PRESENTATION66666666666666666666.pptx
在线订购名古屋艺术大学毕业证, buy NUA diploma学历认证失败怎么办
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa

Ethical Hacking

  • 1. PRESENTED BY: DIVYADHARSHINI BCA 5th SEM ‘A’ SEC VVFGC,TUMKUR
  • 3.  What is Ethical hacking  Who are Ethical hackers  Famous hackers  Hacker & Ethical hackers  Types of hackers  What does an Ethical Hackers do  Skills of Ethical Hackers  Advantages and disadvantages  Future Enhancements  Security &Counter Measures  Interference
  • 4.  Ethical Hackers but not Criminal Hackers.  Completely trustworthy.  Strong programming and computer networking skills.  Learn about the system and trying to find its weaknesses. 4
  • 5.  Techniques of criminal hackers is Detection – Prevention.  Published research papers or released security software.  Ethical Hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non- destructive manner.  E.G. Cyber Crime Investigators. 5
  • 6. 6 Kevinmitnick Jonathan James Gary McKinnon Kevin Poulsen
  • 7. Hackers:  Some one who maliciously breaks into system for personal gain. Technically these criminals are known as crackers.  Access the computer system or network without authorization.  Breaks the law. 7
  • 8. Ethical Hackers:  Performs most of the same activities with its owner’s permission.  Employed by companies to perform penetration tests.  Independent computer security professionals breaking onto the computer systems legally. 8
  • 9. 9  These are good & Ethical hackers.  They Don’t use their skill for illegal purpose.  Have genuine license to hack.  Have registered police records.  Generally, owned by companies for security designing.  Generally, these are coders, have high pay scales TYPES OF HACKERS
  • 10.  Very dangerous persons, use their skills for personal gain.  Always have motive to earn huge profit.  Highly paid persons evolve themselves mostly in criminal activities.  They hack banks, steal credit cards, & deface websites.  These could be coders as well as admins. 10
  • 11.  Also known as Red Hats.  Combine of White Hat + Black Hat hackers .  Generally these are admins.  Have little high pay than White Hats.  Generally not so dangerous, but sometimes could be. 11
  • 12.  An Ethical Hacker is a person doing ethical hacking that he is a security personal who tries to penetrate in to a network to find if there is a vulnerability in the system. An ethical hacker will always have permission to enter into the target network.  If they succeed in penetrating into the system then he will report to the company with a detailed report about the particular vulnerability exploiting which he got in to the system. 12
  • 13.  Microsoft  Linux  Firewalls  Routers  Network protocols  Project management 13
  • 14.  Ethical hacking nowadays is a backbone of network security. The major pros & cons of ethical hacking:  Advantages:-  Help in closing the open holes in the network.  Provides security to banking and financial establishments.  Prevents website defacements  Disadvantages:-  All depends upon trustworthy of Ethical Hacker.  Hiring professionals is expensive. 14
  • 15. • As it an evolving the branch of the scope of enhancement in technology is immense. No ethical hacker can ensure the same security by using the same technique repeatedly. • He would have to improve develop & explore new avenues repeatedly. • More enhanced software's should be used for optimum protection. Tools need to updated regularly &more efficient ones need to be developed. 15
  • 16.  Use of antivirus.  Proper logout after use of email id.  Manual opening browser.  Don’t open spam.  Password protected admin account. 16
  • 17.  Keep your password protected and password should be with characters, digits and special symbols. Do not respond to fake on fishing email. When you are doing any online transaction always keep watch on site whether the protocol of site is https & whether there is a lock symbol and evaluate the security levels. 17
  • 18. 18
  • 19. 19