A presentation on ethical hacking that covers some basic concepts on it and help audience understand it.
But before presenting don't forget to reharse.
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Ethical hacking ppt
1.
2. HACKING
Unlike most computer crime / misuse
areas which are clear cut in terms of
actions and legalities , computer
hacking is more difficult to define.
There is no exact definition of hacking.
Hacking means finding out weaknesses
in an established system and exploiting
them. Computer hacking always
involves some degree of infringement
on the privacy of others or damage to
computer-based property such as
files, web pages or software
3. WHO IS A HACKER?
On hearing the word “HACKER” most of
the peoples are scared. Most of them
think of hacker as a computer vandals.
But hackers are not computer criminals.
Traditionally, hackers were computer
geeks who know almost everything about
computers both hardware and software
and are widely respected for there
knowledge.
4. People who break into
someone’s system are called
“CRACKERS”.
People who code and release
viruses are not necessarily
hackers, they are
“VIRIiCODERS”.
5. TYPES OF HACKERS
• BLACK HAT HACKERS
• WHITE HAT HACKERS
• GRAY HAT HACKERS
6. THREE TOP SIGNS SHOWING THAT
A PERSON IS NOT A REAL HACKER
He uses weird handles like
avenger, skull, kewl etc.
He boasts about how much he knows, a
sure sign of a person who lacks real
knowledge.
He flames newbie's of people who ask
questions, instead of helping them learn.
7. CYBER CRIME
We can categorize Cyber crimes in two
ways
The Computer as a Target :-using a
computer to attack other computers e.g.
Hacking, Virus/Worm attacks, DOS attack
etc.
The computer as a weapon :-using a
computer to commit real world crimes.
e.g. Cyber Terrorism, IPR
violations, Credit card frauds, EFT
frauds, Pornography etc.
8. IT ACT 2000
• In May 2000, both the houses of the
Indian Parliament passed the
Information Technology Bill. The Bill
received the assent of the President in
August 2000 and came to be known as the
Information Technology Act, 2000. Cyber
laws are contained in the IT Act, 2000.
• This Act aims to provide the legal
infrastructure for e-commerce in India.
And the cyber laws have a major impact
for e-businesses and the new economy in
India. So, it is important to understand
what are the various perspectives of the IT
Act, 2000 and what it offers.
9. WHAT CAN BE HACKED?
WINDOWS
MOBILE
NETWORK
WEB
PASSWORDS
10. HACKING WINDOWS
• Simple step just open the computer
then look for a round lithium
round battery it will probably look
like a silver coin. Remove the
battery and after 30 seconds or so
put it back. Some computers may
also require you to reset the
jumper, so look for a 3-pin jumper
and reset it. If you move the jumper
to pins two and three and leave it
there for over five seconds, it will
reset the CMOS.
11. CAREER IN ETHICAL
HACKING
• In the past few years the demand
of ethical hackers is increased in
the industry. Undoubtly it is a
highly paid job.
• You can become a “CERTIFIED
ETHICAL HACKER”(CEH) or a
“PENETRATION TESTER”
12. Some terms related to Hacking
• INTERNET WORMS
Worms are often used to
infect large no. of broadband connected
computers with remote control software.It
works differently then a virus.It won’t attach
to different programs but it will produce
precise copies of itself
13. • ROOTKITS
A rootkit is often a collection of
programs which are hidden deep into your
computer system. They enable administrator
level access to a computer or network. For
installing a rootkit first of all a programmer
has to gain user level access in a system
14. • ZOMBIES
A zombie computer or a “DRONE”
is a computer that has been secretly
compromised by hacking tools which allow
third party to control the computer and its
resources remotely.
15. • SPAM
Used to be a junk or bulk email sent by
the spammer to various recipients aimed at
advertising, scamming and sending viruses.