X

Download Hands-On Ethical Hacking PowerPoint Presentation


Login   OR  Register
X

Share page



  Preview

               
Home / Computers & Web / Computers & Web Presentations / Hands-On Ethical Hacking PowerPoint Presentation

Hands-On Ethical Hacking PowerPoint Presentation

worldwideweb By : worldwideweb

On : Aug 07, 2014

In : Computers & Web

Embed :
613
views

2
downloads
Login / Signup - with account for


  • → Make favorite
  • → Flag as inappropriate
  • → Download Presentation
  • → Share Presentation
  • Slide 1 - ppt slide no 1 content not found
  • Slide 2 - By- ASLAM KHAN (1221013) SHALAKA WAGH (1221014) TULIKA HARSULKAR (1221016) BHAKTI MAHADIK (1221017) AKSHAY PATIL(1221019) ASMITA MORE (1221020) { S.E COMPUTER RNGINEERING K.JSOMAIYA COLLEGE OF ENGINEERING }
  • Slide 3 - HIGHLIGHTS What is hacking? Is hacking a crime? Hacking Vs Cracking Types of hackers Case study Security Flashback
  • Slide 4 - What is Ethical Hacking?? Ethical Hacking is testing the resources for a good cause and for the betterment of technology. Technically Ethical Hacking means penetration testing which is focused on Securing and Protecting IT Systems.
  • Slide 5 - Is hacking a crime?? NO NO NO.. NOT AT ALL……. Hacking is NOT a CRIME
  • Slide 6 - Hacker is a word that has two meanings: Traditionally, a Hacker is someone who likes to play with Software or Electronic Systems. Recently, Hacker has taken on a new meaning — someone who maliciously breaks into systems for personal gain. Technically, these criminals & are known as Crackers. H4ck3r
  • Slide 7 - H4CKING VS CR4CKING HACKING WITH MALICIOUS INTENTION IS CRACKING The basic difference is hackers do not do anything disastrous. Cracking yield more devastating results. Cracking is crime. Cyber crime are the results of cracking ,not hacking
  • Slide 8 - Why Ethical H4cking!? It is Legal Permission is obtained from the target Part of an overall security program Identify vulnerabilities visible from Internet at particular point of time Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner
  • Slide 9 - Types of H4cker$ Distinction on the basis of knowladge CODERS ADMINS SCRIPT KIDDIES Distinction on the basis of LEGALITY WHITE HATS GREY HATS BLACK HATS
  • Slide 10 - COD3RS= Have full knowladge. They know what exactly they are doing Well aware about the different codes Have complete idea what is going beyond coding. H4ck3r at work
  • Slide 11 - ADMINS Knows what they are doing. They don’t have idea that what exactly going beyond codes. Result oriented persons They are not so harmful.
  • Slide 12 - SCRIPT KIDDIES Script kiddies or packet monkeys Young in-experienced hackers Copy codes and techniques from knowledgeable hackers . Don’t know what’s going beyond the coding. Use techniques for fun purpose. Sometimes could be very dangerous for the system,
  • Slide 13 - WHITE HATS These are good hackers . Have genuine license to hack. Have registered police records Evolves themselves in good works Generally owned by companies for security designing Have high pay scales. Generally these are coders
  • Slide 14 - BLACK HATS very dangerous persons. Always have motive to earn huge profit. Highly paid persons. Evolves themselves mostly in criminal activities. These could be coders, admins as well as script kiddies
  • Slide 15 - GREY HATS Also known as red hats. Perform both tasks fair as well as unfair. Generally these are admins. Have little high pay than white hats. Generally not so dangerous, but sometimes could be.
  • Slide 16 - Case Study H4cking prone areas
  • Slide 17 - Case Study(contd..) It is clear from the graph it is increasing day by day. H4cking growth rate
  • Slide 18 - Security & Counter Measures Use of anti-viruses. Proper logout after use of mail id. Manual opening browser don't open spam. Password protected admin account.
  • Slide 19 - Anti viruses
  • Slide 20 - H4ck3r$ Famous hackers all over D world Nahshon Even-Chaim (born May 1971), was the first major computer hacker Stewert Nelson from America followed Nehshon in 1972 Ankit Phadia from India is also a well known name in hackers history Abdur zahir from Pakistan has also a good name in this world
  • Slide 21 - Flashback HACKING IS USING AN AUTHORISE THING IN A UN AUTHORISED MANNER HACKIING IS ILLEGAL BUT NOT A CRIME. TYPES OF HACKERS. VIRUSES ,WORMS & TROJANS. ADMIN PASSWORD HACKING
  • Slide 22 - Dat’s all folks
  • Slide 23 - REFERENCES KYRION DIGITAL SECURITIES WIKIPEDIA GOOGLE BING.COM BLOGSPOT.COM
  • Slide 24 - THANK U..
Dieting Free PowerPoint Template

Dieting

Views : 391

Virtual Identity Free PowerPoint Template

Virtual Identity

Views : 426

DNA Free PowerPoint Template

DNA

Views : 463

Obesity Free PowerPoint Template

Obesity

Views : 745

Credit Debit Card Free PowerPoint Template

Credit Debit Card

Views : 412

Easter Eggs Free PowerPoint Template

Easter Eggs

Views : 618

Question Free PowerPoint Template

Question

Views : 510

Smoking Free PowerPoint Template

Smoking

Views : 450

Statistics and Graph Free PowerPoint Template

Statistics and Graph

Views : 645

Social Media Words Free PowerPoint Template

Social Media Words

Views : 408

Email Symbol Free PowerPoint Template

Email Symbol

Views : 456

Success Achievement Free PowerPoint Template

Success Achievement

Views : 460

Whilte Tulip Free PowerPoint Template

Whilte Tulip

Views : 490

Lab Equipment Free PowerPoint Template

Lab Equipment

Views : 451

Health Tips Free PowerPoint Template

Health Tips

Views : 1025

Back to School Free PowerPoint Template

Back to School

Views : 493

Coffee Free PowerPoint Template

Coffee

Views : 818

Guitar Free PowerPoint Template

Guitar

Views : 884

Yoga Free PowerPoint Template

Yoga

Views : 2341

Yoga Meditation Free PowerPoint Template

Yoga Meditation

Views : 741

Description : Available Hands-On Ethical Hacking powerpoint presentation for free download which is uploaded by steve an active user in belonging ppt presentation Computers & Web category.

Tags : ethical hacking | network security | hacking | online hacking | web hacking | online crime | bullying | hands on hacking

Shortcode : Get Shareable link