7. ETHICAL HACKING
Computer or network expert
Seeking vulnerabilities
Victims – Official & Private websites
8. Conclusion
• Proper ethical hackers should be employed
• Do not expose your passwords to untrusted sites
• Practice using exact web address
• Close your internet while not in use
9. SOURCES OF REFERENCE
En.wikipedia.org/wiki/Hacker_(computer_security)
^ S. Raymond, Eric.”Jargon File: Craker”.
Retrieved 2010-05-08. “Coined ca. 1985 by hackers
in defense against journalistic misuse of hacker”
Icsd.i2r.a-star.edu.sg/staff/sethome/pdf.010.pdf