16

Ethical hacking

Embed Size (px)

Citation preview

HackingAuthorized or unauthorized attempts to bypass the security mechanisms of an information system or network.

Who is a “HACKER” ?

A person who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers.

Types of Hackers

The good guys who identify the security weakness of the system or network and inform the owner about them.

◦A black hat hacker is the villain or bad guy, who crash into victim’s security to steal information and destroy the victims security network.

◦ A grey hat hacker, in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackers.

1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3

th1s wh3|\| 1 h4ck3d 1n

I did not hack this page, it was like

this when I hacked in.

To make security stronger ( Ethical Hacking ).

Just for fun.

Hack other systems secretly.

Steal important information.

Destroy enemy’s computer network.

ETHICAL HACKING

This is a positive approach of hacking.

In this type of hacking company’s own

software engineers Hack into its server and

crack its password.

If the password is cracked one time nobody

can crack it again so the server is kept

secured.

World’s famous hackers

• Stephen Wozniac

• Tsutomu Shimomura

World’s famous hackers

• Kevin Mitnick

• Kevin Poulsen

Cybercrime in World

Did you know ?Social networking sites like

‘FACEBOOK’,’GMAIL’,’YAHOO”

comprised of 60% of direct or

indirect hacking incidents.

The average age group of hackers

are aged between 14-24 yrs. …

Preventive

measures Install a strong anti-virus software.

Always run a anti-virus check before

you download a program or a file from

the internet.

Avoid disclosing personal details like

phone number, credit card details to

strangers.

PRESENTED BY

DHRUMIL KHATRI.

VIRAL CHHATBAR.

RISHIT CHAUHAN.

NAKUL KANAR.

MIRAJ THACKER.

Thank You