The document discusses a presentation on ethical hacking by Amol Deshmukh, Dhiraj Bahakar, and Amol Dambale. It defines ethical hacking as legal hacking done with permission to identify vulnerabilities from the internet in a non-destructive manner. Ethical hacking is needed because hackers compromise computers to steal or damage information, while ethical hackers have the same skills but find vulnerabilities to improve security. The ethical hacking process involves formulating a plan, executing tests, and evaluating results to uncover vulnerabilities and strengthen the system.
WHAT IS ETHICALHACKING?
It is Legal
Permission is obtained from the target
Part of an overall security program
Identify vulnerabilities visible from Internet
at particular point of time
Ethical hackers possesses same skills,
mindset and tools of a hacker but the
attacks are done in a non-destructive
manner
4.
WHY ETHICAL HACKINGIS
NEEDED?
Hacker is a person who maliciously breaks
into systems for personal gain.
Technically, these criminals are crackers .
Crackers break into systems with
malicious intent.
Hackers try to compromise computers.
They modify, delete, and steal critical
information, often making their people
miserable .
ETHICAL HACKING PROCESS
Formulatingplan
Executing plan
Evaluating result
Ethical hacking process
formulating plan
evaluating results
executing plan
7.
FORMULATING PLAN
Approval forethical hacking is essential.
Make what you’re doing known and visible
— at least to the decision makers.
Because no one can point to your work.
8.
EXECUTING PLAN
There isa requirement of preplanning of
your test that you are performing.
Ethical hacking can take persistence. Time
and patience are important. Be careful
when you’re performing your ethical
hacking tests.
9.
EVALUATING RESULT
Assess yourresults to see what you
uncovered, assuming that the
vulnerabilities haven’t been made obvious
before now. This is where knowledge
counts. Evaluating the results and
correlating the specific vulnerabilities
discovered is a skill that gets better with
experience.
10.
CONCLUSION
Ethical hackingis legal way to securing your
system. main way to that giving your system in
hands of ethical hacker so that he can make
your system full proof . it is a part of overall
security program . system administrator should
always try to find loop holes in to the system and
make preventive majors. Ethical hackers
possesses same skills, mindset and tools of a
hacker but the attacks are done in a nondestructive manner.