0% found this document useful (0 votes)
136 views

Ethical Hacking Notes

This presentation discusses ethical hacking. It begins by defining ethical hacking as locating weaknesses in computer systems with the system owner's permission. It then discusses the types of hackers, including black hat hackers who exploit systems illegally, grey hat hackers who may or may not highlight flaws, and white hat ethical hackers who work within legal bounds to improve security. The uses of ethical hacking are also presented, such as finding vulnerabilities, demonstrating criminal methods, and helping prepare for attacks. Finally, the presentation notes that ethical hackers require diverse technical skills as well as expertise in operating systems, networks, and security principles.

Uploaded by

Ayesha Mukhtar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
136 views

Ethical Hacking Notes

This presentation discusses ethical hacking. It begins by defining ethical hacking as locating weaknesses in computer systems with the system owner's permission. It then discusses the types of hackers, including black hat hackers who exploit systems illegally, grey hat hackers who may or may not highlight flaws, and white hat ethical hackers who work within legal bounds to improve security. The uses of ethical hacking are also presented, such as finding vulnerabilities, demonstrating criminal methods, and helping prepare for attacks. Finally, the presentation notes that ethical hackers require diverse technical skills as well as expertise in operating systems, networks, and security principles.

Uploaded by

Ayesha Mukhtar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

(Click) [for next slide]

1
It is said that, Most hackers are….
(Click) [for next slide]

2
Young, because young people tend to be…..
(Click) [for next slide]

3
adaptable. And As long as you remain adaptable,
(Click) [for next slide]

4
you can always be a good hacker.
(Click) [for next slide]

5
Ethical Hacking
Presented by; Noor ul Ain

(Click) Hello everyone, I’m Noor ul Ain,


(Click) and the topic I will present today is Ethical Hacking.
(Click) [for next slide]

6
Contents
• Introduction

• Types of Hackers

• Uses of Ethical Hacking

• Skills for Ethical Hacking

(Click) So, lets have a look over the contents of this presentation.
(Click) First of all, there is introduction to the topic, of course,
(Click) Then we will see what are the types of hackers.
(Click) Then we will discuss the uses of ethical hacking.
(Click) And in the end we shall see what skills are required to become an ethical hacker.
(Click) [for next slide]

7
Introduction
• The
An ethical
act of locating
hacker weaknesses
is a security andprofessional
vulnerabilities
who
of
computer
applies their
andhacking
information
skills, systems by hacking the
• system.
For defensive purposes.
•• But with the
On behalf of permission
the owners of of the owner ofsystems.
information that system.

(Click) So, first, let us see what ethical hacking is.


(Click) Ethical hacking refers to the act of locating weaknesses and vulnerabilities of
computer and information systems by hacking the system,
(Click) but with the permission of the owner of that system.
(Click) Hence, An ethical hacker is a security professional who applies their hacking skills
(Click) for defensive purposes
(Click) on behalf of the owners of information systems.
(Click) [for next slide]

8
Types of Hackers

White
Black
Grey Hat
Hat
HatHackers
Hackers
Hackers
• Cyberbe
May
Hack <criminals
Good
Law
• Illegal
But
With don’t
= Legal
highlight
permission of security
owner flaws
• Exploitsecurity
Prioritize
Notify security
own perception
flaws
flaws
• Hack
Right
No for
/ Wrong
fun gain
personal > Law
• Good guys

(Click) Now, lets see what are the types of hackers


(Click) First type is called Black Hat Hackers
(Click) they are considered cyber criminals,
(Click) they do not care if something is legal or not.
(Click) They abuse security flaws
(Click) for personal or political gain or just for fun.
(Click) The next type are called Grey Hat Hackers
(Click) They may be good,
(Click) but might not highlight security flaws in your system.
(Click) They prioritize their own perception
(Click) of right vs. wrong despite what law says.
(Click) And finally the hackers under today’s discussion are White Hat Hackers,
(Click) these kind of hackers use their hacking skills under rules and regulations of law
(Click) and with permission of systems owner
(Click) to notify them about security flaws.
(Click) In short, these are the good guys.
(Click) [for next slide]

9
Uses of Ethical Hacking
• Finding vulnerabilities

• Demonstrating methods used by cybercriminals

• Helping prepare for a cyberattack

(Click) Now that we know who are ethical hackers, lets see what ethical hacking can be
used for,

(Click) Finding vulnerabilities: Ethical hackers help companies determine which of their
IT security measures are effective, which need to be updated and which contain
vulnerabilities that can be exploited.

(Click) Demonstrating methods used by cybercriminals: ethical hackers use their skills to
show how the black hats can hack an organization’s system, to improve knowledge about
hacking.

(Click) Helping prepare for a cyberattack: Security professionals who work with ethical
hackers are better able to prepare for future attacks because they can better react
to the constantly changing nature of online threats.

(Click) [for next slide]

10
Skills for Ethical Hacking

(Click) The last thing we will discuss today is Skills required for ethical hacking

(Click) An ethical hacker is required to possess a vast arrangement of computer


skills.
But one person cannot be an expert is every field, so teams are created to provide
an organization with a team possessing the complete skill set required of an ethical
hacker. it is essential for any ethical hacker to have expertise in operating systems, as well
as network hardware platforms. It is also fundamental that an ethical hacker posses a solid
foundation of the principles of information security.

(Click) [for next slide]

11
That’s it for today’s presentation.
Thank u so much for your attention.

12

You might also like