KEMBAR78
presentation on ethical hacking | PPTX
WELCOME
TO

TECHNO PAPER
PRESENTATION
ETHICAL HACKING
BY
AMOL DESHMUKH
DHIRAJ BAHAKAR
AMOL DAMBALE
WHAT IS ETHICAL HACKING?
It is Legal
Permission is obtained from the target
Part of an overall security program
Identify vulnerabilities visible from Internet
at particular point of time
Ethical hackers possesses same skills,
mindset and tools of a hacker but the
attacks are done in a non-destructive
manner
WHY ETHICAL HACKING IS
NEEDED?
Hacker is a person who maliciously breaks
into systems for personal gain.
Technically, these criminals are crackers .
Crackers break into systems with
malicious intent.
 Hackers try to compromise computers.
They modify, delete, and steal critical
information, often making their people
miserable .
Working principle of ethical
hacker :

“TO CATCH A THIEF ,
THINK LIKE A THIEF…….”
ETHICAL HACKING PROCESS
Formulating plan
Executing plan
Evaluating result

Ethical hacking process

formulating plan
evaluating results
executing plan
FORMULATING PLAN
Approval for ethical hacking is essential.
Make what you’re doing known and visible
— at least to the decision makers.

Because no one can point to your work.
EXECUTING PLAN
There is a requirement of preplanning of
your test that you are performing.
Ethical hacking can take persistence. Time
and patience are important. Be careful
when you’re performing your ethical
hacking tests.
EVALUATING RESULT
Assess your results to see what you
uncovered, assuming that the
vulnerabilities haven’t been made obvious
before now. This is where knowledge
counts. Evaluating the results and
correlating the specific vulnerabilities
discovered is a skill that gets better with
experience.
CONCLUSION
 Ethical hacking is legal way to securing your
system. main way to that giving your system in
hands of ethical hacker so that he can make
your system full proof . it is a part of overall
security program . system administrator should
always try to find loop holes in to the system and
make preventive majors. Ethical hackers
possesses same skills, mindset and tools of a
hacker but the attacks are done in a nondestructive manner.
 presentation on ethical hacking

presentation on ethical hacking

  • 1.
  • 2.
  • 3.
    WHAT IS ETHICALHACKING? It is Legal Permission is obtained from the target Part of an overall security program Identify vulnerabilities visible from Internet at particular point of time Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner
  • 4.
    WHY ETHICAL HACKINGIS NEEDED? Hacker is a person who maliciously breaks into systems for personal gain. Technically, these criminals are crackers . Crackers break into systems with malicious intent.  Hackers try to compromise computers. They modify, delete, and steal critical information, often making their people miserable .
  • 5.
    Working principle ofethical hacker : “TO CATCH A THIEF , THINK LIKE A THIEF…….”
  • 6.
    ETHICAL HACKING PROCESS Formulatingplan Executing plan Evaluating result Ethical hacking process formulating plan evaluating results executing plan
  • 7.
    FORMULATING PLAN Approval forethical hacking is essential. Make what you’re doing known and visible — at least to the decision makers. Because no one can point to your work.
  • 8.
    EXECUTING PLAN There isa requirement of preplanning of your test that you are performing. Ethical hacking can take persistence. Time and patience are important. Be careful when you’re performing your ethical hacking tests.
  • 9.
    EVALUATING RESULT Assess yourresults to see what you uncovered, assuming that the vulnerabilities haven’t been made obvious before now. This is where knowledge counts. Evaluating the results and correlating the specific vulnerabilities discovered is a skill that gets better with experience.
  • 10.
    CONCLUSION  Ethical hackingis legal way to securing your system. main way to that giving your system in hands of ethical hacker so that he can make your system full proof . it is a part of overall security program . system administrator should always try to find loop holes in to the system and make preventive majors. Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a nondestructive manner.