SlideShare a Scribd company logo
ETHICAL HACKING
CONTENTS
 Introduction
 Types Of Hackers
 Hacking Process
 Certifications
 Hacking Language
 Security Types
 System Security
 Keyloggers,Anti-keyloggers
 Tips For Securing System Data And System
 Advantages Of Ethical Hacking
 Disadvantages Of Ethical Hacking
 Conclusion
INTRODUCTION
 Ethical hacking is also known as penetration
testing, instruction testing or red teaming
 It is Legal
 Permission is obtained from the target
 Part of an overall security program
 Identify vulnerabilities visible from Internet at
particular point of time
Hacker
Cracker
TYPES OF HACKERS
 White Hat Hacker
 Good guys
 Don’t use their skill for illegal purpose
 Black Hat Hacker
 Bad guys
 Use their skill maliciously for personal gain
 Grey Hat Hacker
 It is a combination of White hat n Black Hat
Hackers
 Goal of grey hat hackers is to provide national
security
HACKING PROCESS
Foot printing
Scanning
Enumeration
Attack and Gaining
Access
Escalating Privilege,
Covering Tracks and
Creating Backdoors
CERTIFICATIONS
 The International Council of E-Commerce Consultants
(EC-Council) provides a professional certification for
Certified Ethical Hackers (CEH). A certified ethical
hacker is an ethical hacker who has obtained the
certification provided by the EC-Council.
1. Legality
2. Footprint
3. Scanning
4. Enumeration
5. System Hacking
6. Trojans & Backdoors
7. Sniffers
8. Denial of Service
9. Social Engineering
10. Session Hacking
HACKERS LANGUAGE
Example:
Hacking is good
H4ck|||g 1$ 900d
SECURITY TYPES
 Broadly we can divide security in three divisions
1.System security
2.Data Security
3.Network Security
 System security is least consider nowadays also
when we have maximum number of hackers and
crackers.
SYSTEM SECURITY
 System security means securing a system from
unauthorized access by the person who can
physically access it.
 System security is further divided into two divisions
1. System accessible Security
2. Data accessible Security
SYSTEM ACCESSIBLE SECURITY
 System accessible security means restricting
someone to access the system completely, it can
be referred as OS level security.
Eg:
Provide user password in the system
DATA ACCESSIBLE SECURITY
 When we give permission to a user to access only
certain files and folders in a system then it is
consider as the Data Accessible Security.
 We can achieve data accessible security by many
ways.
 Some of the ways are:-
1) Encrypting Hard disk
2) Hiding Folders
3) By locking folders
KEYLOGGERS, ANTI-KEYLOGGERS
 Keyloggers are a software or hardware which
records the screenshots or keystrokes without the
knowledge of user.
 Types of keyloggers:
1.SOFTWARE KEYLOGGERS
2.HARDWARE KEYLOGGERS
 Hardware key loggers can be detected by carefully
observing the port but to prevent system from
software keyloggers, we need to install anti
keyloggers.
KON BOOT
TIPS FOR SECURING SYSTEM DATA AND
SYSTEM
 Install and Use Anti-Virus, firewalls & Anti key logger Programs
 While installing OS like Windows XP give admin password.
 Use Care When Reading Email with Attachments and following links.
 Install and Use a Firewall Program
 Make Backups of Important Files and Folders
 Change passwords
 Use Care When Downloading and Installing Programs
 Install and Use a Hardware Firewall
 Install and Use a File Encryption Program and Access Controls
 Safeguard your Data
 Real-World Warnings keep you safe online.
ADVANTAGES OF ETHICAL HACKING
 Provides security to banking and financial
establishments
 Prevents website defacements
 An evolving technique
 To catch a thief you have to think like a thief
DISADVANTAGES OF ETHICAL HACKING
 All depends upon the trustworthiness of the ethical
hacker
 Hiring professionals is expensive.
REFERENCES
 Ethical Hacking –Wikipedia
 Ethics in ethical hacking-Idimadakala nagaraju
 Need of ethical hacking in online world-Vivek
shrivastava,monika pangaria
 History and impact of ethical hacking-History of
computing final paper
 Ethical hacking : A technique to enhance
Information security-Gorpreet k.Juneja
 Ethical hacking techniques with penetration testing-
K.Bala chowdappa,S.Subba lakshmi,P.N.V.S.
Pavan kumar
 Ethical hacking in linux environment-Anirudhha P
tekada,pravin Gurjar,Pankaj
R.Inglr,DR.BB.Meshram
 System security in ethical hacking-Kumar utkarsh
 http://www.slideshare.com
CONCLUSION
 We should pay maximum attention towards our
system security and we can do the same by
remembering this line “Treat your password like you
treat your toothbrush. Never give it to anyone else
to use, and change it every few months & most
importantly use SYSKEY”
System Security in Ethical Hacking
System Security in Ethical Hacking

More Related Content

PPTX
Ethical hacking
ODP
Ethical hacking ppt
PPTX
Introduction To Hacking
PPTX
Ethical hacking Presentation
PPTX
Introduction to Ethical Hacking (Basics)
PPT
Ethical Hacking
PPTX
Secure Shell - a Presentation on Ethical Hacking
PPTX
Ethical hacking ppt
Ethical hacking
Ethical hacking ppt
Introduction To Hacking
Ethical hacking Presentation
Introduction to Ethical Hacking (Basics)
Ethical Hacking
Secure Shell - a Presentation on Ethical Hacking
Ethical hacking ppt

What's hot (20)

PPTX
Inetsecurity.in Ethical Hacking presentation
DOCX
Ethical Hacking
PPT
TYPES OF HACKING
PPT
Introduction To Ethical Hacking
PPTX
Cse ethical hacking ppt
PPTX
Ethical Hacking
PPT
Ethical Hacking and Network Security
PPTX
Introduction to ethical hacking
PPTX
Ethical hacking course
PPTX
hacking presentation slide
PPTX
Ethical hacking
PPT
Ethical hacking a licence to hack
PPTX
Ethical Hacking PPT (CEH)
PPT
Basic of Ethical Hacking and Penetration Testing - 1st Module
PPTX
Ethical hacking
PDF
Ethical Hacking Tools
PPTX
PPTX
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PPTX
Ethical Hacking & Network Security
Inetsecurity.in Ethical Hacking presentation
Ethical Hacking
TYPES OF HACKING
Introduction To Ethical Hacking
Cse ethical hacking ppt
Ethical Hacking
Ethical Hacking and Network Security
Introduction to ethical hacking
Ethical hacking course
hacking presentation slide
Ethical hacking
Ethical hacking a licence to hack
Ethical Hacking PPT (CEH)
Basic of Ethical Hacking and Penetration Testing - 1st Module
Ethical hacking
Ethical Hacking Tools
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Ethical Hacking & Network Security

Viewers also liked (10)

PPTX
PPTX
Cyber security and ethical hacking 7
PPT
It security &_ethical_hacking
PPT
Module 8 System Hacking
PPT
Hacking And Its Prevention
PPTX
Computer Hacking - An Introduction
PPTX
Introduction To Ethical Hacking
PPTX
ethical hacking in the modern times
PPTX
Ethical hacking presentation
PPTX
Hacking ppt
Cyber security and ethical hacking 7
It security &_ethical_hacking
Module 8 System Hacking
Hacking And Its Prevention
Computer Hacking - An Introduction
Introduction To Ethical Hacking
ethical hacking in the modern times
Ethical hacking presentation
Hacking ppt

Similar to System Security in Ethical Hacking (20)

PPTX
ethical hacking
PPTX
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
DOCX
Ethical Hacking (CEH) - Industrial Training Report
PPTX
Ethical hacking : Its methodologies and tools
PPTX
Ethical Hacking and Network Defence 1.pptx
RTF
Hacking and its types
PPT
Ethi mini - ethical hacking
DOCX
61370436 main-case-study
PPTX
Ethical Hacking.pptx
PPTX
Ethical hacking
PPTX
Ethical hacking
PPTX
Cse ethical hacking ppt
PPTX
Ethical Hacking.pptx
PPTX
Ethical hacking BY Thariq ibnu Ubaidhullah
PPTX
Ethical hacking
PPTX
Ethical Hacking.pptx Hacker Presentation
DOCX
ethical hacking report
PPT
Ethical hacking
PDF
UNIT - I in Engineering Subjects Ethical Hacking Subject
PPT
Ethical hacking
ethical hacking
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical Hacking (CEH) - Industrial Training Report
Ethical hacking : Its methodologies and tools
Ethical Hacking and Network Defence 1.pptx
Hacking and its types
Ethi mini - ethical hacking
61370436 main-case-study
Ethical Hacking.pptx
Ethical hacking
Ethical hacking
Cse ethical hacking ppt
Ethical Hacking.pptx
Ethical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking
Ethical Hacking.pptx Hacker Presentation
ethical hacking report
Ethical hacking
UNIT - I in Engineering Subjects Ethical Hacking Subject
Ethical hacking

Recently uploaded (20)

PDF
Daisia Frank: Strategy-Driven Real Estate with Heart.pdf
PDF
Prostaglandin E2.pdf orthoodontics op kharbanda
PPTX
Your Guide to a Winning Interview Aug 2025.
PPTX
Principles of Inheritance and variation class 12.pptx
PPTX
The Stock at arrangement the stock and product.pptx
PPTX
microtomy kkk. presenting to cryst in gl
PPTX
Overview Planner of Soft Skills in a single ppt
PPTX
OnePlus 13R – ⚡ All-Rounder King Performance: Snapdragon 8 Gen 3 – same as iQ...
PPTX
ESD MODULE-5hdbdhbdbdbdbbdbdbbdndbdbdbdbbdbd
PDF
Why Today’s Brands Need ORM & SEO Specialists More Than Ever.pdf
PPTX
cse couse aefrfrqewrbqwrgbqgvq2w3vqbvq23rbgw3rnw345
PPTX
退学买新西兰毕业证(WelTec毕业证书)惠灵顿理工学院毕业证国外证书制作
PPTX
Job-opportunities lecture about it skills
PDF
Biography of Mohammad Anamul Haque Nayan
PDF
esg-supply-chain-webinar-nov2018hkhkkh.pdf
PDF
Entrepreneurship PowerPoint for students
PDF
Blue-Modern-Elegant-Presentation (1).pdf
PPTX
DPT-MAY24.pptx for review and ucploading
PDF
MCQ Practice CBT OL Official Language 1.pptx.pdf
PPTX
PMP (Project Management Professional) course prepares individuals
Daisia Frank: Strategy-Driven Real Estate with Heart.pdf
Prostaglandin E2.pdf orthoodontics op kharbanda
Your Guide to a Winning Interview Aug 2025.
Principles of Inheritance and variation class 12.pptx
The Stock at arrangement the stock and product.pptx
microtomy kkk. presenting to cryst in gl
Overview Planner of Soft Skills in a single ppt
OnePlus 13R – ⚡ All-Rounder King Performance: Snapdragon 8 Gen 3 – same as iQ...
ESD MODULE-5hdbdhbdbdbdbbdbdbbdndbdbdbdbbdbd
Why Today’s Brands Need ORM & SEO Specialists More Than Ever.pdf
cse couse aefrfrqewrbqwrgbqgvq2w3vqbvq23rbgw3rnw345
退学买新西兰毕业证(WelTec毕业证书)惠灵顿理工学院毕业证国外证书制作
Job-opportunities lecture about it skills
Biography of Mohammad Anamul Haque Nayan
esg-supply-chain-webinar-nov2018hkhkkh.pdf
Entrepreneurship PowerPoint for students
Blue-Modern-Elegant-Presentation (1).pdf
DPT-MAY24.pptx for review and ucploading
MCQ Practice CBT OL Official Language 1.pptx.pdf
PMP (Project Management Professional) course prepares individuals

System Security in Ethical Hacking

  • 2. CONTENTS  Introduction  Types Of Hackers  Hacking Process  Certifications  Hacking Language  Security Types  System Security  Keyloggers,Anti-keyloggers  Tips For Securing System Data And System  Advantages Of Ethical Hacking  Disadvantages Of Ethical Hacking  Conclusion
  • 3. INTRODUCTION  Ethical hacking is also known as penetration testing, instruction testing or red teaming  It is Legal  Permission is obtained from the target  Part of an overall security program  Identify vulnerabilities visible from Internet at particular point of time Hacker Cracker
  • 4. TYPES OF HACKERS  White Hat Hacker  Good guys  Don’t use their skill for illegal purpose  Black Hat Hacker  Bad guys  Use their skill maliciously for personal gain  Grey Hat Hacker  It is a combination of White hat n Black Hat Hackers  Goal of grey hat hackers is to provide national security
  • 5. HACKING PROCESS Foot printing Scanning Enumeration Attack and Gaining Access Escalating Privilege, Covering Tracks and Creating Backdoors
  • 6. CERTIFICATIONS  The International Council of E-Commerce Consultants (EC-Council) provides a professional certification for Certified Ethical Hackers (CEH). A certified ethical hacker is an ethical hacker who has obtained the certification provided by the EC-Council. 1. Legality 2. Footprint 3. Scanning 4. Enumeration 5. System Hacking 6. Trojans & Backdoors 7. Sniffers 8. Denial of Service 9. Social Engineering 10. Session Hacking
  • 7. HACKERS LANGUAGE Example: Hacking is good H4ck|||g 1$ 900d
  • 8. SECURITY TYPES  Broadly we can divide security in three divisions 1.System security 2.Data Security 3.Network Security  System security is least consider nowadays also when we have maximum number of hackers and crackers.
  • 9. SYSTEM SECURITY  System security means securing a system from unauthorized access by the person who can physically access it.  System security is further divided into two divisions 1. System accessible Security 2. Data accessible Security
  • 10. SYSTEM ACCESSIBLE SECURITY  System accessible security means restricting someone to access the system completely, it can be referred as OS level security. Eg: Provide user password in the system
  • 11. DATA ACCESSIBLE SECURITY  When we give permission to a user to access only certain files and folders in a system then it is consider as the Data Accessible Security.  We can achieve data accessible security by many ways.  Some of the ways are:- 1) Encrypting Hard disk 2) Hiding Folders 3) By locking folders
  • 12. KEYLOGGERS, ANTI-KEYLOGGERS  Keyloggers are a software or hardware which records the screenshots or keystrokes without the knowledge of user.  Types of keyloggers: 1.SOFTWARE KEYLOGGERS 2.HARDWARE KEYLOGGERS  Hardware key loggers can be detected by carefully observing the port but to prevent system from software keyloggers, we need to install anti keyloggers.
  • 14. TIPS FOR SECURING SYSTEM DATA AND SYSTEM  Install and Use Anti-Virus, firewalls & Anti key logger Programs  While installing OS like Windows XP give admin password.  Use Care When Reading Email with Attachments and following links.  Install and Use a Firewall Program  Make Backups of Important Files and Folders  Change passwords  Use Care When Downloading and Installing Programs  Install and Use a Hardware Firewall  Install and Use a File Encryption Program and Access Controls  Safeguard your Data  Real-World Warnings keep you safe online.
  • 15. ADVANTAGES OF ETHICAL HACKING  Provides security to banking and financial establishments  Prevents website defacements  An evolving technique  To catch a thief you have to think like a thief
  • 16. DISADVANTAGES OF ETHICAL HACKING  All depends upon the trustworthiness of the ethical hacker  Hiring professionals is expensive.
  • 17. REFERENCES  Ethical Hacking –Wikipedia  Ethics in ethical hacking-Idimadakala nagaraju  Need of ethical hacking in online world-Vivek shrivastava,monika pangaria  History and impact of ethical hacking-History of computing final paper
  • 18.  Ethical hacking : A technique to enhance Information security-Gorpreet k.Juneja  Ethical hacking techniques with penetration testing- K.Bala chowdappa,S.Subba lakshmi,P.N.V.S. Pavan kumar  Ethical hacking in linux environment-Anirudhha P tekada,pravin Gurjar,Pankaj R.Inglr,DR.BB.Meshram  System security in ethical hacking-Kumar utkarsh  http://www.slideshare.com
  • 19. CONCLUSION  We should pay maximum attention towards our system security and we can do the same by remembering this line “Treat your password like you treat your toothbrush. Never give it to anyone else to use, and change it every few months & most importantly use SYSKEY”