SlideShare a Scribd company logo
Submitted To SUBMITTED BY
MR DINESH VERMA VISHESH SINGHAL
ASST PROFESSOR MCA -2nd YEAR
MCA DEPT 15713
PIET PIET
Contents
 Security
 Hacking
 Types of Hackers
 Ethical Hacking
 Mechanism of Ethical Hacking
 Benefits
 Disaffects
 Demand in Industry
 Domain of Ethical Hacking
 Conclusion
 Bibliography
WHAT IS SECURITY
 Security is the degree of resistance to,
or protection from harm. It is the state of
being free from danger or threat.
 It is done mainly for external forces
 For Example :
In government building the metal
detector and x-rays machine are used
for protection from external threats.
HACKING
 Hacking is unauthorized intrusion into a
computer or a network.
 The person engaged in hacking
activities is generally referred to as a
hacker.
Types OF Hackers
 There are several types of hacker in our
industry in which some are malicious
and some are good. These are
categorized in 3 main types.
1. White Hat Hacker
2. Black Hat Hacker
3. Grey Hat Hacker
WHITE HAT
 You can call Angel of Internet to white hat
hackers.
 Also known as ethical hackers, White Hat hackers
are the good guys of the hacker world.
 An organization can hire these consultants to do
tests and implement best practices that make
them less vulnerable to malicious hacking
attempts in the future.
BLACK HAT
 Leave the “can” but you should call them devil
of internet.
 Also known as crackers. They find banks or
other companies with weak security and steal
money or credit card information.
 Black hat hackers can inflict major damage on
both individual computer users and large
organizations by stealing personal financial
information, compromising the security of
major systems, or shutting down or altering the
function of websites and networks.
GRAY HAT HACKER
 These are combination of both Black
and white hat hackers. But like black hat
they don’t misuse of their hacking skill.
 They just hack vulnerable things to tell
their owner and to make them
understand how it can be hacked.
Ethical Hacking
 An ethical hacking is the term which a
computer and networking expert
systematically attempts to penetrate a
computer system or network on behalf
of its owners for the purpose of finding
security vulnerabilities that a
malicious hacker could potentially
exploit.
Mechanism Of Ethical Hacking
SCANNING
RECONNAISSANCE
MAINTAINING ACCESS
GANNING ACCESS
COVERING TRACK
RECONNAISSANCE
 It is also called FOOT PRINTING
 It is done on both business and
technical side
 In business side, we try to find the
employee details , location ,physical
address.
 In technical side, we cover Search
Engine Hacking, Network Mapping.
SCANNING
 It is the detailed study of system which
is going to be hacked.
 Scanning is the process of connecting to
TCP and UDP ports for the purpose of
finding what services and applications
are open on the target device.
 In this we study about the networking
topology, IP of system and app running
on target system.
GAINING ACCESS
 Gaining access is the most important phase of
an attack in terms of potential damage,
although attackers don’t always have to gain
access to the system to cause damage. For
instance, denial-of-service attacks can either
exhaust resources or stop services from
running on the target system.
 Stopping a service can be carried out by
killing processes, using a logic/time bomb, or
even reconfiguring and crashing the system.
Resources can be exhausted locally by filling
up outgoing communication links.
MAINTAINING ACCESS
 Once an attacker gains access to the
target system, the attacker can choose
to use both the system and its resources
and further use the system as a launch
pad to scan and exploit other systems,
or he can keep a low profile and
continue exploiting the system.
 Both these actions can damage the
organization.
COVERING TRACK
 An attacker needs to destroy evidence
of his presence and activities for several
reasons like being able to maintain
access and evade detection.
 Erasing evidence of a compromise is a
requirement for any attacker who wants
to remain obscure and evade trace
back.
Benefits of Ethical Hacking
 Fighting against terrorism and national
security breaches
 Having a computer system that prevents
malicious hackers from gaining access
 Having adequate preventative measures
in place to prevent security breaches
Disaffects of Ethical
Hacking
 The ethical hacker using the knowledge
they gain to do malicious hacking activities
 Allowing the company’s financial and
banking details to be seen
 The possibility that the ethical hacker will
send and/or place malicious code, viruses,
malware and other destructive and harmful
things on a computer system
 Massive security breach
Demand in Industry
 The threat hackers pose to businesses is finally
being taken seriously as more e-commerce and
mobile app-based service providers are taking
concrete steps to address the loopholes in their
networks.
 As for the ethical hacking workforce, companies will
start integrating it as an essential department of their
businesses. Cyber security will become a facet that
no company would be able to overlook. People will
start demanding more personalized services.
 Considering the above statement we find that the
future of ETHICAL HACKING is bright.
Domain of Ethical Hacking
 The key areas where this technology is
used are
1. National Security
2. Free Lancer
3. IT Companies
National Security
 It is the main concern of every country to
protect there national assets (person,
treasure, R&D).
 So here Ethical Hackers are required
the most
FREE LANCER
 These are the person who did not work
for a particular organization, rather they
work as an individual and who so ever
call them they work for them (freely).
 There main aim is to just get Name and
Fame
IT COMPANIES
 IT companies make different software
for big organization.
 For example
 SBI Website is made by TCS
 So here TCS will hire the EH to find the
Loopholes in there website.
Conclusion
 The word "hacker" carries weight
 Ethical Hacking is the term which has a
shining career in the near future.
 It is my hope that the hackers of the
future will move beyond their limitations
and become hacktivists. They need to
work with non-technologically based and
technology-borrowing social movements
in the struggle for global justice.
Bibliography
• www.slideshare.net/SuryanshSrivastava/ethical-
hacking-25963766
• https://www.scribd.com/doc/46100556/Ethical-
Hacking-Ppt
• https://samsclass.info/123/ppt/ch01.ppt
Ethical hacking
Ethical hacking
Ethical hacking

More Related Content

What's hot (20)

Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Nitesh Dubey
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
shraddha_b
 
Cyber security
Cyber securityCyber security
Cyber security
Samsil Arefin
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Aditya Vikram Singhania
 
What is Hacking? AND Types of Hackers
What is Hacking? AND Types of HackersWhat is Hacking? AND Types of Hackers
What is Hacking? AND Types of Hackers
infosavvy
 
Cyber security
Cyber securityCyber security
Cyber security
vishakha bhagwat
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
elmuhammadmuhammad
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
Siemplify
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Tharindu Kalubowila
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
AmbikaMalgatti
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute force
vishalgohel12195
 
OWASP Top 10 - 2017
OWASP Top 10 - 2017OWASP Top 10 - 2017
OWASP Top 10 - 2017
HackerOne
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
Rohan Bharadwaj
 
Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Edureka!
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Nitheesh Adithyan
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Sayantan Sur
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
Tejesh Dhaypule
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
RAMESHBABU311293
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Savigya Singh
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Nitesh Dubey
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
shraddha_b
 
What is Hacking? AND Types of Hackers
What is Hacking? AND Types of HackersWhat is Hacking? AND Types of Hackers
What is Hacking? AND Types of Hackers
infosavvy
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
elmuhammadmuhammad
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
Siemplify
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
AmbikaMalgatti
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute force
vishalgohel12195
 
OWASP Top 10 - 2017
OWASP Top 10 - 2017OWASP Top 10 - 2017
OWASP Top 10 - 2017
HackerOne
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
Rohan Bharadwaj
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Edureka!
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
RAMESHBABU311293
 

Similar to Ethical hacking (20)

Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
samprada123
 
61370436 main-case-study
61370436 main-case-study61370436 main-case-study
61370436 main-case-study
homeworkping4
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Mohammad Affan
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Anumadil1
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptx
johnnymaaza
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
Dharmesh Makwana
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
MaheshDhope1
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
Yogesh Chauhan
 
IRJET- Impact of Ethical Hacking on Business and Governments
IRJET-  	  Impact of Ethical Hacking on Business and GovernmentsIRJET-  	  Impact of Ethical Hacking on Business and Governments
IRJET- Impact of Ethical Hacking on Business and Governments
IRJET Journal
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
Hacking
HackingHacking
Hacking
ritik shukla
 
What Is Hacking
What Is HackingWhat Is Hacking
What Is Hacking
ritik shukla
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
ashish kumar
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
Aman Gupta
 
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGA REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKING
Nathan Mathis
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
Nargis Parveen
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical Hacking
IRJET Journal
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
asharshaikh8
 
BASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGBASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKING
Drm Kapoor
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
cyber cure
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
samprada123
 
61370436 main-case-study
61370436 main-case-study61370436 main-case-study
61370436 main-case-study
homeworkping4
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Anumadil1
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptx
johnnymaaza
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
Dharmesh Makwana
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
MaheshDhope1
 
IRJET- Impact of Ethical Hacking on Business and Governments
IRJET-  	  Impact of Ethical Hacking on Business and GovernmentsIRJET-  	  Impact of Ethical Hacking on Business and Governments
IRJET- Impact of Ethical Hacking on Business and Governments
IRJET Journal
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
ashish kumar
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
Aman Gupta
 
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGA REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKING
Nathan Mathis
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
Nargis Parveen
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical Hacking
IRJET Journal
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
asharshaikh8
 
BASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGBASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKING
Drm Kapoor
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
cyber cure
 

More from Vishesh Singhal (6)

Sharing and setting in salesforce
Sharing and setting in salesforceSharing and setting in salesforce
Sharing and setting in salesforce
Vishesh Singhal
 
Profiles and permission sets
Profiles and permission setsProfiles and permission sets
Profiles and permission sets
Vishesh Singhal
 
Encryption field and named credentials
Encryption  field and named credentials Encryption  field and named credentials
Encryption field and named credentials
Vishesh Singhal
 
Google Lens
Google LensGoogle Lens
Google Lens
Vishesh Singhal
 
Project shield
Project shieldProject shield
Project shield
Vishesh Singhal
 
Li fi technology
Li fi technologyLi fi technology
Li fi technology
Vishesh Singhal
 

Recently uploaded (20)

Presentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem KayaPresentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem Kaya
MIPLM
 
To study Digestive system of insect.pptx
To study Digestive system of insect.pptxTo study Digestive system of insect.pptx
To study Digestive system of insect.pptx
Arshad Shaikh
 
Vitamins Chapter-7, Biochemistry and clinical pathology, D.Pharm 2nd year
Vitamins Chapter-7, Biochemistry and clinical pathology, D.Pharm 2nd yearVitamins Chapter-7, Biochemistry and clinical pathology, D.Pharm 2nd year
Vitamins Chapter-7, Biochemistry and clinical pathology, D.Pharm 2nd year
ARUN KUMAR
 
Diabetic neuropathy peripheral autonomic
Diabetic neuropathy peripheral autonomicDiabetic neuropathy peripheral autonomic
Diabetic neuropathy peripheral autonomic
Pankaj Patawari
 
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Library Association of Ireland
 
GDGLSPGCOER - Git and GitHub Workshop.pptx
GDGLSPGCOER - Git and GitHub Workshop.pptxGDGLSPGCOER - Git and GitHub Workshop.pptx
GDGLSPGCOER - Git and GitHub Workshop.pptx
azeenhodekar
 
Handling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptxHandling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptx
AuthorAIDNationalRes
 
Understanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s GuideUnderstanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s Guide
GS Virdi
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 4-26-2025.pptx
YSPH VMOC Special Report - Measles Outbreak  Southwest US 4-26-2025.pptxYSPH VMOC Special Report - Measles Outbreak  Southwest US 4-26-2025.pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 4-26-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
Open Access: Revamping Library Learning Resources.
Open Access: Revamping Library Learning Resources.Open Access: Revamping Library Learning Resources.
Open Access: Revamping Library Learning Resources.
Rishi Bankim Chandra Evening College, Naihati, North 24 Parganas, West Bengal, India
 
SPRING FESTIVITIES - UK AND USA -
SPRING FESTIVITIES - UK AND USA            -SPRING FESTIVITIES - UK AND USA            -
SPRING FESTIVITIES - UK AND USA -
Colégio Santa Teresinha
 
Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025
Mebane Rash
 
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 AccountingHow to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
Celine George
 
How to Subscribe Newsletter From Odoo 18 Website
How to Subscribe Newsletter From Odoo 18 WebsiteHow to Subscribe Newsletter From Odoo 18 Website
How to Subscribe Newsletter From Odoo 18 Website
Celine George
 
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Celine George
 
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Library Association of Ireland
 
High Performance Liquid Chromatography .pptx
High Performance Liquid Chromatography .pptxHigh Performance Liquid Chromatography .pptx
High Performance Liquid Chromatography .pptx
Ayush Srivastava
 
One Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learningOne Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learning
momer9505
 
Odoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo SlidesOdoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo Slides
Celine George
 
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
Celine George
 
Presentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem KayaPresentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem Kaya
MIPLM
 
To study Digestive system of insect.pptx
To study Digestive system of insect.pptxTo study Digestive system of insect.pptx
To study Digestive system of insect.pptx
Arshad Shaikh
 
Vitamins Chapter-7, Biochemistry and clinical pathology, D.Pharm 2nd year
Vitamins Chapter-7, Biochemistry and clinical pathology, D.Pharm 2nd yearVitamins Chapter-7, Biochemistry and clinical pathology, D.Pharm 2nd year
Vitamins Chapter-7, Biochemistry and clinical pathology, D.Pharm 2nd year
ARUN KUMAR
 
Diabetic neuropathy peripheral autonomic
Diabetic neuropathy peripheral autonomicDiabetic neuropathy peripheral autonomic
Diabetic neuropathy peripheral autonomic
Pankaj Patawari
 
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Library Association of Ireland
 
GDGLSPGCOER - Git and GitHub Workshop.pptx
GDGLSPGCOER - Git and GitHub Workshop.pptxGDGLSPGCOER - Git and GitHub Workshop.pptx
GDGLSPGCOER - Git and GitHub Workshop.pptx
azeenhodekar
 
Handling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptxHandling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptx
AuthorAIDNationalRes
 
Understanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s GuideUnderstanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s Guide
GS Virdi
 
Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025
Mebane Rash
 
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 AccountingHow to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
Celine George
 
How to Subscribe Newsletter From Odoo 18 Website
How to Subscribe Newsletter From Odoo 18 WebsiteHow to Subscribe Newsletter From Odoo 18 Website
How to Subscribe Newsletter From Odoo 18 Website
Celine George
 
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Celine George
 
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Library Association of Ireland
 
High Performance Liquid Chromatography .pptx
High Performance Liquid Chromatography .pptxHigh Performance Liquid Chromatography .pptx
High Performance Liquid Chromatography .pptx
Ayush Srivastava
 
One Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learningOne Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learning
momer9505
 
Odoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo SlidesOdoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo Slides
Celine George
 
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
Celine George
 

Ethical hacking

  • 1. Submitted To SUBMITTED BY MR DINESH VERMA VISHESH SINGHAL ASST PROFESSOR MCA -2nd YEAR MCA DEPT 15713 PIET PIET
  • 2. Contents  Security  Hacking  Types of Hackers  Ethical Hacking  Mechanism of Ethical Hacking  Benefits  Disaffects  Demand in Industry  Domain of Ethical Hacking  Conclusion  Bibliography
  • 3. WHAT IS SECURITY  Security is the degree of resistance to, or protection from harm. It is the state of being free from danger or threat.  It is done mainly for external forces  For Example : In government building the metal detector and x-rays machine are used for protection from external threats.
  • 4. HACKING  Hacking is unauthorized intrusion into a computer or a network.  The person engaged in hacking activities is generally referred to as a hacker.
  • 5. Types OF Hackers  There are several types of hacker in our industry in which some are malicious and some are good. These are categorized in 3 main types. 1. White Hat Hacker 2. Black Hat Hacker 3. Grey Hat Hacker
  • 6. WHITE HAT  You can call Angel of Internet to white hat hackers.  Also known as ethical hackers, White Hat hackers are the good guys of the hacker world.  An organization can hire these consultants to do tests and implement best practices that make them less vulnerable to malicious hacking attempts in the future.
  • 7. BLACK HAT  Leave the “can” but you should call them devil of internet.  Also known as crackers. They find banks or other companies with weak security and steal money or credit card information.  Black hat hackers can inflict major damage on both individual computer users and large organizations by stealing personal financial information, compromising the security of major systems, or shutting down or altering the function of websites and networks.
  • 8. GRAY HAT HACKER  These are combination of both Black and white hat hackers. But like black hat they don’t misuse of their hacking skill.  They just hack vulnerable things to tell their owner and to make them understand how it can be hacked.
  • 9. Ethical Hacking  An ethical hacking is the term which a computer and networking expert systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit.
  • 10. Mechanism Of Ethical Hacking SCANNING RECONNAISSANCE MAINTAINING ACCESS GANNING ACCESS COVERING TRACK
  • 11. RECONNAISSANCE  It is also called FOOT PRINTING  It is done on both business and technical side  In business side, we try to find the employee details , location ,physical address.  In technical side, we cover Search Engine Hacking, Network Mapping.
  • 12. SCANNING  It is the detailed study of system which is going to be hacked.  Scanning is the process of connecting to TCP and UDP ports for the purpose of finding what services and applications are open on the target device.  In this we study about the networking topology, IP of system and app running on target system.
  • 13. GAINING ACCESS  Gaining access is the most important phase of an attack in terms of potential damage, although attackers don’t always have to gain access to the system to cause damage. For instance, denial-of-service attacks can either exhaust resources or stop services from running on the target system.  Stopping a service can be carried out by killing processes, using a logic/time bomb, or even reconfiguring and crashing the system. Resources can be exhausted locally by filling up outgoing communication links.
  • 14. MAINTAINING ACCESS  Once an attacker gains access to the target system, the attacker can choose to use both the system and its resources and further use the system as a launch pad to scan and exploit other systems, or he can keep a low profile and continue exploiting the system.  Both these actions can damage the organization.
  • 15. COVERING TRACK  An attacker needs to destroy evidence of his presence and activities for several reasons like being able to maintain access and evade detection.  Erasing evidence of a compromise is a requirement for any attacker who wants to remain obscure and evade trace back.
  • 16. Benefits of Ethical Hacking  Fighting against terrorism and national security breaches  Having a computer system that prevents malicious hackers from gaining access  Having adequate preventative measures in place to prevent security breaches
  • 17. Disaffects of Ethical Hacking  The ethical hacker using the knowledge they gain to do malicious hacking activities  Allowing the company’s financial and banking details to be seen  The possibility that the ethical hacker will send and/or place malicious code, viruses, malware and other destructive and harmful things on a computer system  Massive security breach
  • 18. Demand in Industry  The threat hackers pose to businesses is finally being taken seriously as more e-commerce and mobile app-based service providers are taking concrete steps to address the loopholes in their networks.  As for the ethical hacking workforce, companies will start integrating it as an essential department of their businesses. Cyber security will become a facet that no company would be able to overlook. People will start demanding more personalized services.  Considering the above statement we find that the future of ETHICAL HACKING is bright.
  • 19. Domain of Ethical Hacking  The key areas where this technology is used are 1. National Security 2. Free Lancer 3. IT Companies
  • 20. National Security  It is the main concern of every country to protect there national assets (person, treasure, R&D).  So here Ethical Hackers are required the most
  • 21. FREE LANCER  These are the person who did not work for a particular organization, rather they work as an individual and who so ever call them they work for them (freely).  There main aim is to just get Name and Fame
  • 22. IT COMPANIES  IT companies make different software for big organization.  For example  SBI Website is made by TCS  So here TCS will hire the EH to find the Loopholes in there website.
  • 23. Conclusion  The word "hacker" carries weight  Ethical Hacking is the term which has a shining career in the near future.  It is my hope that the hackers of the future will move beyond their limitations and become hacktivists. They need to work with non-technologically based and technology-borrowing social movements in the struggle for global justice.