View
697
Download
6
Category
Tags:
Preview:
DESCRIPTION
it's just a presentation on ethical hacking..(Y)
Citation preview
ETHICAL HACKING
PRESENTED BY :- NAGENDRA KUMAR
ROLL NO :- 11EBKIT205
CONTENT
Overview of Hacking Hacking VS Cracking Why do hackers hack? Qualities of Hackers Types of Hacker Ethical Hacking – Process Advantages and Disadvantages How can protect the system? What should do after hacked?
OVERVIEW OF HACKING
It is Legal
Permission is obtained from the target
Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner
Also Called – Attack & Penetration Testing.
HACKING VS CRACKING
Hacker The person who hack .
Cracker System destroyer.
HACKING WITH MALICIOUS INTENTION IS CRACKING
The basic difference is hackers do not do anything disastrous.
Cracking yield more devastating results. Cracking is crime. Cyber crime are the results of cracking ,not hacking
WHY DO PEOPLE HACK??
To make security stronger ( Ethical Hacking )
Just for fun
Show off
Hack other systems secretly & Steal important information
WHAT ARE THE VARIOUS QUALITIES A HACKER
SHOULD POSSES
Good coder
well knowledgeable person both hard ware as well as soft ware
Should have knowledge on security system
Trusted person
TYPES OF HACKER
BLACK HAT HACK
ER
WHITE HAT HACK
ER
GRAYHAT
HACKER
HACKING - PROCESS
Foot Printing
Scanning
Gaining Access
Maintaining Access
FOOT PRINTING
Who is Lookup
NS lookup
IP Lookup
SCANNING
Port scanning
Network scanning
Finger Printing
Fire walking
SCANNING
GAINING ACCESS
Password Attacks
Social Engineering
Viruses
MAINTAINING ACCESS
Os Back-Doors
Trojans
Clearing tracks
ADVANTAGES & DISADVANTAGES
Advantages Provides security to banking and financial
establishments Prevents website defacements An evolving technique To catch a thief you have to think like a thiefDisadvantages All depends upon the trustworthiness of the
ethical hacker Hiring professionals is expensive.
HOW CAN WE PROTECT THE SYSTEM?
Patch security hole often
Encrypt important data
Remove unused program
Setup log-host
Backup the system often
Setup firewall
WHAT SHOULD DO AFTER HACKED?
Shutdown the system
Separate the system from network
Restore the system with the backup Or reinstall all programs
HACKING GROWTH RATE
It is clear from the graph it is increasing day by day.
THANK YOU
Recommended