SlideShare a Scribd company logo
Presented By : Ritik ShuklaPresentation On - Hacking
Shri Data Meghe Polytechnic
What Is Hacking
?
Hacking is identifying weakness in computer systems or networks to exploit
its weaknesses to gain access.
Example of Hacking: Using password cracking algorithm to gain access to a
system
Computers have become mandatory to run a successful businesses. It is
not enough to have isolated computers systems; they need to be networked
to facilitate communication with external businesses. This exposes them to
the outside world and hacking.
Hacking means using computers to commit fraudulent acts such as fraud,
privacy invasion, stealing corporate/personal data, etc. Cyber crimes cost
many organizations millions of dollars every year. Businesses need to
protect themselves against such attacks.
Who is a Hacker?
& Types of Hackers
A Hacker is a person who finds and exploits the
weakness in computer systems and/or networks to gain
access.
Hackers are usually skilled computer programmers with
knowledge of computer security.
Hackers are classified according to the intent of their
actions.
The following list classifies hackers according to their intent.
Ethical Hacker (White hat): A hacker who
gains access to systems with a view to fix the
identified weaknesses. They may also
perform penetration Testing and
vulnerability assessments.
Cracker (Black hat): A hacker who gains
unauthorized access to computer systems
for personal gain. The intent is usually to
steal corporate data, violate privacy rights,
transfer funds from bank accounts etc.
Grey hat: A hacker who is in between ethical
and black hat hackers. He/she breaks into
computer systems without authority with a
view to identify weaknesses and reveal them
to the system owner.
Script kiddies: A non-skilled person
who gains access to computer systems
using already made tools.
Hacktivist: A hacker who use hacking to
send social, religious, and political, etc.
messages. This is usually done by hijacking
websites and leaving the message on the
hijacked website.
What is Ethical Hacking ?
•Ethical Hacking is identifying weakness in computer systems and/or computer
networks and coming with countermeasures that protect the weaknesses.
•
•Ethical hackers must abide by the following rules.
•Get written permission from the owner of the computer system and/or
computer network before hacking.
•Protect the privacy of the organization been hacked.
•Transparently report all the identified weaknesses in the computer system to
the organization.
•Inform hardware and software vendors of the identified weaknesses.
Why Ethical Hacking?
Information is one of the most valuable assets of an organization.
Keeping information secure can protect an organization’s image and
save an organization a lot of money.
Hacking can lead to loss of business for organizations that deal in
finance such as PayPal. Ethical hacking puts them a step ahead of the
cyber criminals who would otherwise lead to loss of business.
Legality of Ethical Hacking
Ethical Hacking is legal if the hacker abides by the rules stipulated in
the above section on the definition of ethical hacking.
The International Council of E-Commerce Consultants (EC-Council)
provides a certification program that tests individual’s skills. Those who
pass the examination are awarded with certificates. The certificates are
supposed to be renewed after some time.
How to become a hacker
Computer basics
Books
Online news
Participate in forums
Build a computer
Pick up a programming language –
Ex:- Perl,Php,Html,Python & C.
Learn alternative operating system –
Ex:- Kali Linux , Ubuntu , Etc.
Learn more on networking-
Ex:-IP address, OSI, port,
protocol, router, and subnet
mask
Try Out These Websites To Learn Hacking.
www.eccouncil.org
www.cybrary.com
www.evilzone.org
www.hacking-tutorial.com
www.breakthesecurity.com
www.hackaday.com
www.Nullbyte.com
Behind every successful Coder there an even more
successful De-coder to understand that code.
THANK YOU

More Related Content

PPTX
Ethical hacking & cyber security
PPTX
Fundamental of ethical hacking
PPTX
Hackers ethics presentation
PPTX
Computer hacking
PDF
Cyber Insurance Types of Attacks
PPT
E business security
PPT
Eamonn O Raghallaigh The Major Security Issues In E Commerce
PPTX
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
Ethical hacking & cyber security
Fundamental of ethical hacking
Hackers ethics presentation
Computer hacking
Cyber Insurance Types of Attacks
E business security
Eamonn O Raghallaigh The Major Security Issues In E Commerce
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...

What's hot (19)

PPT
Hackers
PPT
PDF
White hat and black hat hackers
PPTX
Privacy and Security Issues in E-Commerce
PDF
E-Commerce Security: A Primer
PPTX
Ecommerce security
PPTX
Target data breach presentation
PPTX
Hacking
PPSX
Insider threats and countermeasures
PDF
Detecting-Preventing-Insider-Threat
PDF
11. wireless-penetration-testing-training-cyber51
PPT
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
PDF
5 Signs you have an Insider Threat
PDF
E Commerce security
PPTX
Insider Threat Summit - The Future of Insider Threat Detection
PPT
Cybercrime
PDF
The Accidental Insider Threat
PDF
20. CYBER51-1PAGE-FLYER-FEB15
Hackers
White hat and black hat hackers
Privacy and Security Issues in E-Commerce
E-Commerce Security: A Primer
Ecommerce security
Target data breach presentation
Hacking
Insider threats and countermeasures
Detecting-Preventing-Insider-Threat
11. wireless-penetration-testing-training-cyber51
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
5 Signs you have an Insider Threat
E Commerce security
Insider Threat Summit - The Future of Insider Threat Detection
Cybercrime
The Accidental Insider Threat
20. CYBER51-1PAGE-FLYER-FEB15

Similar to What Is Hacking (20)

PPTX
Hacking.pptx
PPT
Hacking and its terms
PPTX
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptx
PPTX
Hacking & Hackers
PPTX
Ethical hacking Chapter 1 - Overview.pptx
PPT
Brief Introduction of Hackers
PDF
UNIT - I in Engineering Subjects Ethical Hacking Subject
PPTX
Hacking Presentation v2 By Raffi
PPTX
ethical Hacking [007]
PDF
What-is-Hacking and why is it important what are it’s benefits
PPTX
Learn What Is Ethical Hacking & Who Is Ethical Hackers.pptx
PDF
IRJET- Study of Hacking and Ethical Hacking
PPT
Ethichack 2012
PPTX
Hacking ppt
PPTX
Hacking_and_Types_of_Hacking_Presentation.pptx
PPT
Ethical Hacking
PPTX
Ethical hacking
PPTX
building foundation for ethical hacking.ppt
PDF
Hacking_Presentation.pdf by Ayan Khan hack
PDF
Hacking_Presentation (1).pdf by Ayan Khan hack
Hacking.pptx
Hacking and its terms
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptx
Hacking & Hackers
Ethical hacking Chapter 1 - Overview.pptx
Brief Introduction of Hackers
UNIT - I in Engineering Subjects Ethical Hacking Subject
Hacking Presentation v2 By Raffi
ethical Hacking [007]
What-is-Hacking and why is it important what are it’s benefits
Learn What Is Ethical Hacking & Who Is Ethical Hackers.pptx
IRJET- Study of Hacking and Ethical Hacking
Ethichack 2012
Hacking ppt
Hacking_and_Types_of_Hacking_Presentation.pptx
Ethical Hacking
Ethical hacking
building foundation for ethical hacking.ppt
Hacking_Presentation.pdf by Ayan Khan hack
Hacking_Presentation (1).pdf by Ayan Khan hack

Recently uploaded (20)

PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Complications of Minimal Access Surgery at WLH
PDF
Insiders guide to clinical Medicine.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Lesson notes of climatology university.
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
master seminar digital applications in india
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
TR - Agricultural Crops Production NC III.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
VCE English Exam - Section C Student Revision Booklet
Sports Quiz easy sports quiz sports quiz
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Microbial disease of the cardiovascular and lymphatic systems
PPH.pptx obstetrics and gynecology in nursing
human mycosis Human fungal infections are called human mycosis..pptx
Complications of Minimal Access Surgery at WLH
Insiders guide to clinical Medicine.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Lesson notes of climatology university.
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Renaissance Architecture: A Journey from Faith to Humanism
master seminar digital applications in india

What Is Hacking

  • 1. Presented By : Ritik ShuklaPresentation On - Hacking Shri Data Meghe Polytechnic
  • 2. What Is Hacking ? Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access. Example of Hacking: Using password cracking algorithm to gain access to a system Computers have become mandatory to run a successful businesses. It is not enough to have isolated computers systems; they need to be networked to facilitate communication with external businesses. This exposes them to the outside world and hacking. Hacking means using computers to commit fraudulent acts such as fraud, privacy invasion, stealing corporate/personal data, etc. Cyber crimes cost many organizations millions of dollars every year. Businesses need to protect themselves against such attacks.
  • 3. Who is a Hacker? & Types of Hackers A Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security. Hackers are classified according to the intent of their actions.
  • 4. The following list classifies hackers according to their intent. Ethical Hacker (White hat): A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration Testing and vulnerability assessments. Cracker (Black hat): A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc.
  • 5. Grey hat: A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner. Script kiddies: A non-skilled person who gains access to computer systems using already made tools. Hacktivist: A hacker who use hacking to send social, religious, and political, etc. messages. This is usually done by hijacking websites and leaving the message on the hijacked website.
  • 6. What is Ethical Hacking ? •Ethical Hacking is identifying weakness in computer systems and/or computer networks and coming with countermeasures that protect the weaknesses. • •Ethical hackers must abide by the following rules. •Get written permission from the owner of the computer system and/or computer network before hacking. •Protect the privacy of the organization been hacked. •Transparently report all the identified weaknesses in the computer system to the organization. •Inform hardware and software vendors of the identified weaknesses.
  • 7. Why Ethical Hacking? Information is one of the most valuable assets of an organization. Keeping information secure can protect an organization’s image and save an organization a lot of money. Hacking can lead to loss of business for organizations that deal in finance such as PayPal. Ethical hacking puts them a step ahead of the cyber criminals who would otherwise lead to loss of business. Legality of Ethical Hacking Ethical Hacking is legal if the hacker abides by the rules stipulated in the above section on the definition of ethical hacking. The International Council of E-Commerce Consultants (EC-Council) provides a certification program that tests individual’s skills. Those who pass the examination are awarded with certificates. The certificates are supposed to be renewed after some time.
  • 8. How to become a hacker Computer basics Books Online news Participate in forums Build a computer Pick up a programming language – Ex:- Perl,Php,Html,Python & C. Learn alternative operating system – Ex:- Kali Linux , Ubuntu , Etc. Learn more on networking- Ex:-IP address, OSI, port, protocol, router, and subnet mask
  • 9. Try Out These Websites To Learn Hacking. www.eccouncil.org www.cybrary.com www.evilzone.org www.hacking-tutorial.com www.breakthesecurity.com www.hackaday.com www.Nullbyte.com
  • 10. Behind every successful Coder there an even more successful De-coder to understand that code. THANK YOU