logging in or signing up ethical hacking jeshin Download Post to : URL : Related Presentations : Let's Connect Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Copy embed code: Embed: Flash iPad Dynamic Copy Does not support media & animations Automatically changes to Flash or non-Flash embed WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 2239 Category: Education License: All Rights Reserved Like it (1) Dislike it (0) Added: June 26, 2013 This Presentation is Public Favorites: 2 Presentation Description hackng,types of hackers,merits demerits Comments Posting comment... Premium member Presentation Transcript GROUP MEMBERS: GROUP MEMBERS Joseph Francis Sooraj Sumedan Jeshin Jose Elwin Varghese Joseph Chethalan Pranav HIGHLIGHTS : HIGHLIGHTS What is hacking? Is hacking a crime? Hacking Vs Cracking Types of hackers Case study Security Flashback PowerPoint Presentation: What is Ethical Hacking?? Ethical Hacking is testing the resources for a good cause and for the betterment of technology. Technically Ethical Hacking means penetration testing which is focused on Securing and Protecting IT Systems. Is hacking a crime?? : Is hacking a crime?? NO NO NO.. NOT AT ALL……. Hacking is NOT a CRIME PowerPoint Presentation: Hacker is a word that has two meanings: Traditionally, a Hacker is someone who likes to play with Software or Electronic Systems. Recently, Hacker has taken on a new meaning — someone who maliciously breaks into systems for personal gain. Technically, these criminals & are known as Crackers. H4ck3r H4CKING VS CR4CKING: H4CKING VS CR4CKING HACKING WITH MALICIOUS INTENTION IS CRACKING The basic difference is hackers do not do anything disastrous. Cracking yield more devastating results. Cracking is crime. Cyber crime are the results of cracking ,not hacking Why Ethical H4cking!?: Why Ethical H4cking!? It is Legal Permission is obtained from the target Part of an overall security program Identify vulnerabilities visible from Internet at particular point of time Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner Types of H4cker$: Types of H4cker$ Distinction on the basis of knowledge CODERS ADMINS SCRIPT KIDDIES Distinction on the basis of LEGALITY WHITE HATS GREY HATS BLACK HATS SCRIPT KIDDIES: SCRIPT KIDDIES Script kiddies or packet monkeys Young in-experienced hackers Copy codes and techniques from knowledgeable hackers . Don’t know what’s going beyond the coding. Use techniques for fun purpose. Sometimes could be very dangerous for the system, WHITE HATS: WHITE HATS These are good hackers . Have genuine license to hack. Have registered police records Evolves themselves in good works Generally owned by companies for security designing Have high pay scales. Generally these are coders BLACK HATS: BLACK HATS very dangerous persons. Always have motive to earn huge profit. Highly paid persons. Evolves themselves mostly in criminal activities. These could be coders , admins as well as script kiddies GREY HATS: GREY HATS Also known as red hats. Perform both tasks fair as well as unfair. Generally these are admins . Have little high pay than white hats. Generally not so dangerous, but sometimes could be. Case Study(contd..): Case Study(contd..) It is clear from the graph it is increasing day by day . H4cking growth Rate Security & Counter Measures: Security & Counter Measures Use of anti-viruses. Proper logout after use of mail id. Manual opening browser don't open spam. Password protected admin account. PowerPoint Presentation: Anti viruses H4ck3r$ : H4ck3r$ Famous hackers all over D world Nahshon Even-Chaim (born May 1971), was the first major computer hacker Stewert Nelson from America followed Nehshon in 1972 Ankit Phadia from India is also a well known name in hackers history Abdur zahir from Pakistan has also a good name in this world Flashback: Flashback HACKING IS USING AN AUTHORISE THING IN A UN AUTHORISED MANNER HACKIING IS ILLEGAL BUT NOT A CRIME. TYPES OF HACKERS. VIRUSES ,WORMS & TROJANS. ADMIN PASSWORD HACKING PowerPoint Presentation: REFERENCES WIKIPEDIA GOOGLE BING.COM BLOGSPOT.COM PowerPoint Presentation: THANK YOU ALL!! You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.