SlideShare una empresa de Scribd logo
1 de 20
A presentation
by-
Shalu gupta
 Computer hacking is when
  someone modifies computer
  hardware or software in a
  way that alters the creator's
  original intention,
 There are two types of
  people in the world.

    good one & bad one
An ethical hacker is a
 computer and network
 expert who attacks a
 security system on
 behalf of its owners

An ethical hacker is
 sometimes called
 a white hat, a term that
 comes from old Western
 movies, where the "good
 guy" wore a white hat
 and the "bad guy" wore
 a black hat.
OTHER TYPES OF HACKER
 SCRIPT KIDDIES: Script kiddie is a pejorative term
  for a computer intruder with little or no skill; a
  person who simply follows directions or uses a
  cook-book approach .
 CRACKERS : Those who will enter your computer
  just for the fun of it, or to prove their technical skills.
 Gray-hat Hackers:
  These individuals typically follow the law but
  sometimes venture over to the darker side of
  blackhat hacking.
HISTORY OF HACKING
NEED OF ETHICAL HACKING
DRAWBACKS OF EHTICAL
HACKING
CERTIFIED ETHICAL HACKER
*Age-28
*Occupation-Author, computer security
   consultant, MTV host.
*he wrote Unofficial Guide to Ethical
   Hacking at the age of 15.
*Help in 9/11 attack to decode a
   messagae of al-qyaeda.
 *In 2008, the IMT Ghaziabad Centre for
   Distance Learning signed an MoU with
   Fadia to organise its one-year Post-
   Graduate Diploma in Cyber Security.[18]
 1# The secret of Hacking 1
  Edition.
 2# Social Engineering: The Art of
  Human Hacking.
 3# Dangerous Google - Searching
  For Secrets.
 4#Gray Hat Hacking The
  Ethical Hackers Handbook.
 5# Hardware Hacking Have Fun
  While Voiding Your Warranty
CAREERS IN NETWORK SECURITY
AND ETHICAL HACKING
I am ready to
fight for rules
against hackers
!!--FUTURE OF ETHICAL HACKING--!!
LET”S PROTECT YOUR EMAIL PASSWORD…..
Ethical hacking

Más contenido relacionado

Destacado

Converting your waste into wealth
Converting your waste into wealthConverting your waste into wealth
Converting your waste into wealthMalini Rajendran
 
Wealth out of waste final
Wealth out of waste finalWealth out of waste final
Wealth out of waste finalDFC2011
 
Turning waste to wealth
Turning waste to wealthTurning waste to wealth
Turning waste to wealthTheHut2013
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Securitysumit dimri
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKINGSHERALI445
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern timesjeshin jose
 
Waste is Wealth: depending on how it is managed and utilized.
Waste is Wealth: depending on how it is managed and utilized.Waste is Wealth: depending on how it is managed and utilized.
Waste is Wealth: depending on how it is managed and utilized.Dr. Joshua Zake
 

Destacado (17)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Converting your waste into wealth
Converting your waste into wealthConverting your waste into wealth
Converting your waste into wealth
 
Wealth out of waste final
Wealth out of waste finalWealth out of waste final
Wealth out of waste final
 
Turning waste to wealth
Turning waste to wealthTurning waste to wealth
Turning waste to wealth
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Reliance Jio
Reliance JioReliance Jio
Reliance Jio
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Hacking
HackingHacking
Hacking
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Reliance jio
Reliance jioReliance jio
Reliance jio
 
Ppt on Reliance jio
Ppt on Reliance jioPpt on Reliance jio
Ppt on Reliance jio
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Waste is Wealth: depending on how it is managed and utilized.
Waste is Wealth: depending on how it is managed and utilized.Waste is Wealth: depending on how it is managed and utilized.
Waste is Wealth: depending on how it is managed and utilized.
 

Último

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Último (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Ethical hacking

  • 2.
  • 3.  Computer hacking is when someone modifies computer hardware or software in a way that alters the creator's original intention,  There are two types of people in the world. good one & bad one
  • 4. An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners An ethical hacker is sometimes called a white hat, a term that comes from old Western movies, where the "good guy" wore a white hat and the "bad guy" wore a black hat.
  • 5. OTHER TYPES OF HACKER  SCRIPT KIDDIES: Script kiddie is a pejorative term for a computer intruder with little or no skill; a person who simply follows directions or uses a cook-book approach .  CRACKERS : Those who will enter your computer just for the fun of it, or to prove their technical skills.  Gray-hat Hackers: These individuals typically follow the law but sometimes venture over to the darker side of blackhat hacking.
  • 6.
  • 8.
  • 9. NEED OF ETHICAL HACKING
  • 10.
  • 13. *Age-28 *Occupation-Author, computer security consultant, MTV host. *he wrote Unofficial Guide to Ethical Hacking at the age of 15. *Help in 9/11 attack to decode a messagae of al-qyaeda. *In 2008, the IMT Ghaziabad Centre for Distance Learning signed an MoU with Fadia to organise its one-year Post- Graduate Diploma in Cyber Security.[18]
  • 14.  1# The secret of Hacking 1 Edition.  2# Social Engineering: The Art of Human Hacking.  3# Dangerous Google - Searching For Secrets.  4#Gray Hat Hacking The Ethical Hackers Handbook.  5# Hardware Hacking Have Fun While Voiding Your Warranty
  • 15. CAREERS IN NETWORK SECURITY AND ETHICAL HACKING
  • 16.
  • 17. I am ready to fight for rules against hackers
  • 18. !!--FUTURE OF ETHICAL HACKING--!!
  • 19. LET”S PROTECT YOUR EMAIL PASSWORD…..