SlideShare a Scribd company logo
NASIR ARAFAT
 In computer networking, hacking is any technical
effort to manipulate the normal behaviour of network
connections and connected systems
 Hacker s any person engaged in hacking
 White hat hacking: These hackings are done for good
purposes by computer security experts to protect the
system from any threat
 Black hat hacking: These hackings are done for wrong
purposes for personal gain like hacking of defense
websites, or hacking a bank system
 Grey hat hacking: It is the combination of white hat
and black hat hacking.
The goal of grey hat hackers is to provide national
security
 It is the process of hacking from the hackers
 Ethical hacking is testing the resources for a
good cause and for the betterment of
technology
 Technically ethical hacking means Penetration
Testing which is focused on securing and
protecting IT systems
 Ethical hacking is also called attack &
penetration testing
 Penetration testing is done to secure and
protect IT system
 It is the attack on a computer system with the
intention of finding security weakness
 It’s a legal way for securing a system
 Part of an overall security program
 Ethical hacker makes the system full proof
 The attacks are done in non-destructive
manner
 Formulating Plan: Approval for ethical
hacking is essential because no one can point
to hackers of his work
 Executing Plan: Requirement of pre planning
of hackers test that they are performing
 Evaluation Result: Evaluating the result &
correlating the specific vulnerabilities
discovered is a skill that’s get better with the
experience
 Using Encryption to encrypt important data
 Set up Firewalls to prevent unauthorized or
unwanted communications between
computer networks or hosts
 Use of Steganography for hiding an
information in a medium, such as a digital
picture or audio files
 To make security stronger (Ethical Hacking)
 Hack other system secretly
 Steal important information
 Destroy enemy’s computer network during
the war
 Hack to notify many people their thought
 Ethical hacking is legal way to secure your
system
 Main way to that giving your system in hands
of ethical hackers so that he can make your
system full proof
 Ethical hackers attacks in non-destructive
manners
Ethical Hacking

More Related Content

PDF
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
PDF
CNIT 123: Ch 1 Ethical Hacking Overview
PPTX
Ethical hacking
PPTX
What is network security and Types
PPT
Lesson 3- Remote Access
PPTX
Security
PDF
Cs8792 cns - unit v
PPTX
CS8792 - Cryptography and Network Security
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
CNIT 123: Ch 1 Ethical Hacking Overview
Ethical hacking
What is network security and Types
Lesson 3- Remote Access
Security
Cs8792 cns - unit v
CS8792 - Cryptography and Network Security

What's hot (20)

PPTX
Chapter 1: Overview of Network Security
PPTX
Chapter 1
PPT
Introduction To Computer Security
ODP
Network Security Topic 1 intro
PPTX
Ethical Hacker
PPTX
Information security ist lecture
PPT
Ethical Hacking
PPTX
Computer security
PPT
PPTX
06. security concept
PPTX
Introduction to Network Security
PPTX
Fundamental of ethical hacking
PDF
CNIT 123 Ch 1: Ethical Hacking Overview
PPTX
Presentation1 new (1) (1)cf
PDF
BAIT1103 Chapter 1
PDF
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
PPTX
Ethical Hacking
PPT
Network security presentation
PPTX
Basic Security Concepts of Computer
PPTX
Wireless Intrusion Techniques
Chapter 1: Overview of Network Security
Chapter 1
Introduction To Computer Security
Network Security Topic 1 intro
Ethical Hacker
Information security ist lecture
Ethical Hacking
Computer security
06. security concept
Introduction to Network Security
Fundamental of ethical hacking
CNIT 123 Ch 1: Ethical Hacking Overview
Presentation1 new (1) (1)cf
BAIT1103 Chapter 1
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Ethical Hacking
Network security presentation
Basic Security Concepts of Computer
Wireless Intrusion Techniques

Viewers also liked (20)

DOCX
salud ocupacional
PDF
Nscglobal ENC agreement
PDF
Salesforce_Certified_Administrator
PDF
Design parameters to obtain al2 o3 nanofluid to enhance heat transfer
DOCX
Lecture 3
PPT
PPTX
Nossa Amizade é um Conto de Fadas
PPT
Abc’s of Canada
ODP
Sports in Canada
DOCX
Trabajo exel
PDF
Pastore Maria_Coaching Ripple Effect
PPTX
Material calculo-integral-2
PPTX
Kolač
PDF
Atp, cromosomas
DOCX
Etica y-liderazgo-empresarial
DOCX
Simulado de Língua Portuguesa 9º ano
PDF
Band Folio.Book 1 - Fagote
PDF
Band Folio.Book 1 - Sax Tenor
PPTX
Heart and Lungs PowerPoint Review Game Quiz, Circulatory System, Cardiovascul...
salud ocupacional
Nscglobal ENC agreement
Salesforce_Certified_Administrator
Design parameters to obtain al2 o3 nanofluid to enhance heat transfer
Lecture 3
Nossa Amizade é um Conto de Fadas
Abc’s of Canada
Sports in Canada
Trabajo exel
Pastore Maria_Coaching Ripple Effect
Material calculo-integral-2
Kolač
Atp, cromosomas
Etica y-liderazgo-empresarial
Simulado de Língua Portuguesa 9º ano
Band Folio.Book 1 - Fagote
Band Folio.Book 1 - Sax Tenor
Heart and Lungs PowerPoint Review Game Quiz, Circulatory System, Cardiovascul...

Similar to Ethical Hacking (20)

PPTX
Ethical hacking ppt by shantanu arora
PDF
Hacking and Ethical Hacking
PPTX
Jaishreeethicalhackingppt-171011183223.pptx
PPTX
Presentation on Ethical Hacking ppt
PPTX
Cyber Security PPT
PDF
An Introduction to Ethical Hacking
PPTX
Summer training in jaipur
PPT
Introduction to Hacking
PPTX
Ethical Hacking and Network Defence 1.pptx
PPTX
Ethical Hacking.pptx
PPTX
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
PPTX
this ppt is based on ethica l hacking _
PDF
UNIT - I in Engineering Subjects Ethical Hacking Subject
DOCX
ethical hacking report
PPTX
Ethical-Hacking-ppt.pptx
PPTX
VIVEK_JADHAV[1].pptx this ppt is based on ethical hacking
DOCX
Ethical Hacking
PPTX
ethical hacking
PPTX
Hacking and Penetration Testing - a beginners guide
PPTX
CSE-Ethical-Hacking-ppt.pptx
Ethical hacking ppt by shantanu arora
Hacking and Ethical Hacking
Jaishreeethicalhackingppt-171011183223.pptx
Presentation on Ethical Hacking ppt
Cyber Security PPT
An Introduction to Ethical Hacking
Summer training in jaipur
Introduction to Hacking
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking.pptx
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
this ppt is based on ethica l hacking _
UNIT - I in Engineering Subjects Ethical Hacking Subject
ethical hacking report
Ethical-Hacking-ppt.pptx
VIVEK_JADHAV[1].pptx this ppt is based on ethical hacking
Ethical Hacking
ethical hacking
Hacking and Penetration Testing - a beginners guide
CSE-Ethical-Hacking-ppt.pptx

Recently uploaded (20)

PPTX
TLE Review Electricity (Electricity).pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
1. Introduction to Computer Programming.pptx
PDF
Hybrid model detection and classification of lung cancer
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Zenith AI: Advanced Artificial Intelligence
PPT
What is a Computer? Input Devices /output devices
PDF
Getting Started with Data Integration: FME Form 101
PDF
STKI Israel Market Study 2025 version august
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
OMC Textile Division Presentation 2021.pptx
TLE Review Electricity (Electricity).pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Module 1.ppt Iot fundamentals and Architecture
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
gpt5_lecture_notes_comprehensive_20250812015547.pdf
O2C Customer Invoices to Receipt V15A.pptx
1 - Historical Antecedents, Social Consideration.pdf
Developing a website for English-speaking practice to English as a foreign la...
A comparative study of natural language inference in Swahili using monolingua...
Programs and apps: productivity, graphics, security and other tools
A contest of sentiment analysis: k-nearest neighbor versus neural network
1. Introduction to Computer Programming.pptx
Hybrid model detection and classification of lung cancer
Getting started with AI Agents and Multi-Agent Systems
Zenith AI: Advanced Artificial Intelligence
What is a Computer? Input Devices /output devices
Getting Started with Data Integration: FME Form 101
STKI Israel Market Study 2025 version august
A novel scalable deep ensemble learning framework for big data classification...
OMC Textile Division Presentation 2021.pptx

Ethical Hacking

  • 2.  In computer networking, hacking is any technical effort to manipulate the normal behaviour of network connections and connected systems  Hacker s any person engaged in hacking
  • 3.  White hat hacking: These hackings are done for good purposes by computer security experts to protect the system from any threat  Black hat hacking: These hackings are done for wrong purposes for personal gain like hacking of defense websites, or hacking a bank system  Grey hat hacking: It is the combination of white hat and black hat hacking. The goal of grey hat hackers is to provide national security
  • 4.  It is the process of hacking from the hackers  Ethical hacking is testing the resources for a good cause and for the betterment of technology  Technically ethical hacking means Penetration Testing which is focused on securing and protecting IT systems
  • 5.  Ethical hacking is also called attack & penetration testing  Penetration testing is done to secure and protect IT system  It is the attack on a computer system with the intention of finding security weakness
  • 6.  It’s a legal way for securing a system  Part of an overall security program  Ethical hacker makes the system full proof  The attacks are done in non-destructive manner
  • 7.  Formulating Plan: Approval for ethical hacking is essential because no one can point to hackers of his work  Executing Plan: Requirement of pre planning of hackers test that they are performing  Evaluation Result: Evaluating the result & correlating the specific vulnerabilities discovered is a skill that’s get better with the experience
  • 8.  Using Encryption to encrypt important data  Set up Firewalls to prevent unauthorized or unwanted communications between computer networks or hosts  Use of Steganography for hiding an information in a medium, such as a digital picture or audio files
  • 9.  To make security stronger (Ethical Hacking)  Hack other system secretly  Steal important information  Destroy enemy’s computer network during the war  Hack to notify many people their thought
  • 10.  Ethical hacking is legal way to secure your system  Main way to that giving your system in hands of ethical hackers so that he can make your system full proof  Ethical hackers attacks in non-destructive manners