16
ETHICAL HACKING

Ethical hacking ppt

Embed Size (px)

DESCRIPTION

A presentation on ethical hacking that covers some basic concepts on it and help audience understand it. But before presenting don't forget to reharse.

Citation preview

Page 1: Ethical hacking ppt

ETHICAL HACKING

Page 2: Ethical hacking ppt

HACKINGUnlike most computer crime / misuse areas which are clear cut in terms of actions and legalities , computer hacking is more difficult to define.There is no exact definition of hacking. Hacking means finding out weaknesses in an established system and exploiting them. Computer hacking always involves some degree of infringement on the privacy of others or damage to computer-based property such as files, web pages or software

Page 3: Ethical hacking ppt

WHO IS A HACKER?On hearing the word “HACKER” most of the peoples are scared. Most of them think of hacker as a computer vandals. But hackers are not computer criminals.Traditionally, hackers were computer geeks who know almost everything about computers both hardware and software and are widely respected for there knowledge.

Page 4: Ethical hacking ppt

People who break into someone’s system are called “CRACKERS”.

People who code and release viruses are not necessarily hackers, they are “VIRIiCODERS”.

Page 5: Ethical hacking ppt

TYPES OF HACKERS

• BLACK HAT HACKERS

• WHITE HAT HACKERS

• GRAY HAT HACKERS

Page 6: Ethical hacking ppt

THREE TOP SIGNS SHOWING THAT A PERSON IS NOT A REAL HACKER

He uses weird handles like avenger, skull, kewl etc.

He boasts about how much he knows, a sure sign of a person who lacks real knowledge.

He flames newbie's of people who ask questions, instead of helping them learn.

Page 7: Ethical hacking ppt

CYBER CRIMEWe can categorize Cyber crimes in two ways

The Computer as a Target :-using a computer to attack other computers e.g. Hacking, Virus/Worm attacks, DOS attack etc.The computer as a weapon :-using a computer to commit real world crimes.e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.

Page 8: Ethical hacking ppt

IT ACT 2000• In May 2000, both the houses of the Indian

Parliament passed the Information Technology Bill. The Bill received the assent of the President in August 2000 and came to be known as the Information Technology Act, 2000. Cyber laws are contained in the IT Act, 2000.

• This Act aims to provide the legal infrastructure for e-commerce in India. And the cyber laws have a major impact for e-businesses and the new economy in India. So, it is important to understand what are the various perspectives of the IT Act, 2000 and what it offers.

Page 9: Ethical hacking ppt

WHAT CAN BE HACKED?WINDOWSMOBILENETWORKWEBPASSWORDS

Page 10: Ethical hacking ppt

HACKING WINDOWS• Simple step just open the computer then

look for a round lithium round battery it will probably look like a silver coin. Remove the battery and after 30 seconds or so put it back. Some computers may also require you to reset the jumper, so look for a 3-pin jumper and reset it. If you move the jumper to pins two and three and leave it there for over five seconds, it will reset the CMOS.

Page 11: Ethical hacking ppt

CAREER IN ETHICAL HACKING

• In the past few years the demand of ethical hackers is increased in the industry. Undoubtly it is a highly paid job.

• You can become a “CERTIFIED ETHICAL HACKER”(CEH) or a “PENETRATION TESTER”

Page 12: Ethical hacking ppt

Some terms related to Hacking

• INTERNET WORMS Worms are often used to

infect large no. of broadband connected computers with remote control software.It works differently then a virus.It won’t attach to different programs but it will produce precise copies of itself

Page 13: Ethical hacking ppt

• ROOTKITS A rootkit is often a collection of

programs which are hidden deep into your computer system. They enable administrator level access to a computer or network. For installing a rootkit first of all a programmer has to gain user level access in a system

Page 14: Ethical hacking ppt

• ZOMBIES A zombie computer or a “DRONE” is

a computer that has been secretly compromised by hacking tools which allow third party to control the computer and its resources remotely.

Page 15: Ethical hacking ppt

• SPAM Used to be a junk or bulk email sent by

the spammer to various recipients aimed at advertising, scamming and sending viruses.

Page 16: Ethical hacking ppt

THANK YOU