ETHICAL
HACKIN
G CHANDAN R K
18CS3K1042
BSC CSME
CONTENT
Introduction
Need for Security
Types of Hackers
Ethical Hacking
Required Skills of an Ethical Hacking
Advantages
Disadvantages
Conclusion
INTRODUCTION
• Ethical hacking also known as penetration testing or white-hat
8hacking, involves the same tools, tricks, and techniques that hackers
use, but with one major difference that Ethical hacking is legal. Ethical
hacking is performed with the target’s permission. The intent of ethical
hacking is to discover vulnerabilities from a hacker’s viewpoint so
systems can be better secured. Its part of an overall information risk
management program that allows for ongoing security improvements.
NEED FOR SECURITY
● Lose of confidential data
● Damage or destruction of data
● Damage or destruction of computer system
● Loss of reputation of a company
TYPES OF HACKERS
● Black-Hat Hacker: A black hat hackers use their knowledge and skill for their
own personal gains probably by hurting others.
● White-Hat Hacker: White hat hackers use their knowledge and skill for the
good of others and for the common good.
● Grey-Hat Hackers: These are individuals who work both offensively and
defensively at various times. We cannot predict their behaviour. Sometimes they
use their skills for the common good while in some other times he uses them for
their personal gains.
ETHICAL HACKING
• Ethical hacking defined as “a methodology adopted by ethical
hackers to discover the vulnerabilities existing in information
systems’ operating environments.”
• With the growth of the Internet, computer security has become a
major concern for businesses and governments.
REQUIRED SKILLS OF AN ETHICAL HACKER
• Microsoft
• Linux
• Firewalls
• Routers
• Mainframes
• Network Protocols
• Project Management
ADVANTAGES
“To catch a thief you have to think like a thief”
Helps in closing the open holes in the system network
Provides security to banking and financial establishments
Prevents website defacements
An evolving technique
DISADVANTAGES
All depends upon the trustworthiness of the ethical hacker
Hiring professionals is expensive.
CONCLUSION
• One of the main aims of the seminar is to make others understand that there
are so many tools through which a hacker can get in to a system. Let’s check
its various needs from various perspectives.
• Educate the employees and the users against black hat hacking.
• The first thing we should do is to keep ourselves updated about those
softwares we and using for official and reliable sources.