Ethical Hacking
Ethical Hacking
On
Ethical Hacking
Introduction
Ethical hacking also known as penetration testing or
white-hat hacking, involves the same tools, tricks, and
techniques that hackers use, but with one major difference
that Ethical hacking is legal.
Ethical hacking, is legally breaking into computers and
devices to test an organization's defenses.
Independent computer security Professionals breaking into the
computer systems.
Neither damage the target systems nor steal information.
Evaluate target systems security and report back to owners
about the vulnerabilities found.
Hackers
A person who enjoys learning details of a
programming language or system
A person who enjoys actually doing the
programming rather than just theorizing about it
A person capable of appreciating someone else's
hacking
A person who picks up programming quickly
A person who is an expert at a particular programming
language or system
Types of Hackers
Black hats
• Individuals with Extraordinary computing Skills,
resorting to malicious Or destructive activities. Also
known as ‘Crackers.’
White Hats
unethical activity.
6.Reporting –It is the last step of finishing the ethical
Social
Engineering
Automated
Organizational Attacks
Attacks
Restricted
Data
Accidental Breaches
in Security
Denial of
Viruses, Trojan Service (DoS)
Horses,
and Worms
Required Skills of an Ethical
Hacker….
Computer expert adept at Technical domains.
In-depth knowledge about Target platforms (such as
Hardware / software.
Knowledgeable about Security areas and related Issues
– though not
Necessarily a security Professional
Advantages
“To catch a thief you have to think like a thief”
This helps to fight against cyber terrorism and to fight against
national security breaches.
This helps to build a system that prevents any kinds of
penetration by hackers.
This offers security to banking and financial establishments.
Disadvantages
All depends upon the trustworthiness of the ethical hacker.
Hiring professionals is expensive.
Future Enhancements
As it an evolving branch the scope of enhancement in
technology is immense.