SlideShare una empresa de Scribd logo
1 de 8
Introduction to Ethical Hacking


The simple Definition for Ethical hacking is that:
“It is an Art and science of determining the vulnerabilities of your
information infrastructure to better defend them”.
It is performed by high skilled ethical security professionals.
Who are Hackers?
Hackers can be divided into three groups:

White Hats Good guys, ethical hackers

Black Hats Bad guys, malicious hackers

Gray Hats Good or bad hacker; depends on the situation

Ethical hackers usually fall into the white-hat category, but sometimes
they’re former gray hats who have become security professionals and
who now use their skills in an ethical manner.
Why ethical hacking?
Why ethical hacking is because there are many advantages of ethical
hacking like

     To take preventive measures against hackers.
      To fight against terrorism.
     A system that helps prevent entry by hackers to create.
     Ethical hacking will reveal the flaws of what is being
     hacked (software, a website, a network, etc.)
     without actually causing any damage. An ethical
     hacker will find the flaw and report it to the owner so
     that it can be fixed as soon as possible.
Approaches of ethical hacking
So here are some approaches of ethical hacking and friendly speaking
these approaches that are mentioned here can only be understand by a
hacker because these ways of hacking are way too complicated to define
in a short amount of time.
Ethical Hackers & Careers


Businesses and government-related organizations that are
serious about their network security hire ethical hackers and
penetration testers to help probe and improve their networks,
applications, and other computer systems with the ultimate goal of
preventing data theft and fraud. You may not get the same
adrenaline rush that you might with underground hacking, but you
can earn a good and honest living--and not end up facing prison
time, as some illegal "black hat" hackers do.
Conclusion
 * Always security professionals are one step behind the hackers and
   crackers.
 * Plan for the unplanned attacks.
 * Never underestimate the attackers or overestimate our existing
   posture.
 * To protect against an attack.
 * The role of ethical hacking in security is to provide customers with
   awareness of how they could be attacked and why they are
   targeted.
 “Security though a pain", is necessary.
Some Facts
• Charlie Miller a security researcher found a hole in Safari that can be
used to hack a Mac Book in just ten seconds.
• Scott Lunsford, an IBM researcher broke into a computer network in a
nuclear power station in just one day.
Contents
  * Introduction to Ethical Hacking
  * Who are Hackers
  * Why Ethical Hacking??
  * Approaches of Ethical Hacking
  * Ethical Hackers & Careers
  * Conclusion

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Network security
Network securityNetwork security
Network security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Perimeter security solutions
Perimeter security solutionsPerimeter security solutions
Perimeter security solutions
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
1524 elliptic curve cryptography
1524 elliptic curve cryptography1524 elliptic curve cryptography
1524 elliptic curve cryptography
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hacking
HackingHacking
Hacking
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Cryptography
CryptographyCryptography
Cryptography
 

Destacado

The History of Hacking in 5minutes (for dummie)
The History of Hacking in 5minutes (for dummie)The History of Hacking in 5minutes (for dummie)
The History of Hacking in 5minutes (for dummie)Stu Sjouwerman
 
3 minute presentation
3 minute presentation3 minute presentation
3 minute presentationseanmelliott
 
Social Engineering
Social EngineeringSocial Engineering
Social EngineeringCyber Agency
 
Informative speech powerpoint 7 29
Informative speech powerpoint 7 29Informative speech powerpoint 7 29
Informative speech powerpoint 7 29chall55
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple pptAgarwaljay
 
Smoking Powerpoint Presentation
Smoking Powerpoint PresentationSmoking Powerpoint Presentation
Smoking Powerpoint Presentationnmccabe
 

Destacado (9)

The History of Hacking in 5minutes (for dummie)
The History of Hacking in 5minutes (for dummie)The History of Hacking in 5minutes (for dummie)
The History of Hacking in 5minutes (for dummie)
 
3 minute presentation
3 minute presentation3 minute presentation
3 minute presentation
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Informative speech powerpoint 7 29
Informative speech powerpoint 7 29Informative speech powerpoint 7 29
Informative speech powerpoint 7 29
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
 
Smoking Powerpoint Presentation
Smoking Powerpoint PresentationSmoking Powerpoint Presentation
Smoking Powerpoint Presentation
 
How Google Works
How Google WorksHow Google Works
How Google Works
 

Similar a Ehtical hacking speech

Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
Etical hacking
Etical hackingEtical hacking
Etical hackingtalhaabid
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
 
Why Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdfWhy Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdfvinsys2
 
Ethical Hacking As A Career
Ethical Hacking As A CareerEthical Hacking As A Career
Ethical Hacking As A CareerSrashti Jain
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfuzair
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
ehical hacking.pptx
ehical hacking.pptxehical hacking.pptx
ehical hacking.pptxNarangYadav
 

Similar a Ehtical hacking speech (20)

Hackers
HackersHackers
Hackers
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Etical hacking
Etical hackingEtical hacking
Etical hacking
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
hacking
hackinghacking
hacking
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical-Hacking.pdf
Ethical-Hacking.pdfEthical-Hacking.pdf
Ethical-Hacking.pdf
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
hackers
hackershackers
hackers
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Why Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdfWhy Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdf
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking As A Career
Ethical Hacking As A CareerEthical Hacking As A Career
Ethical Hacking As A Career
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdf
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
ehical hacking.pptx
ehical hacking.pptxehical hacking.pptx
ehical hacking.pptx
 

Ehtical hacking speech

  • 1. Introduction to Ethical Hacking The simple Definition for Ethical hacking is that: “It is an Art and science of determining the vulnerabilities of your information infrastructure to better defend them”. It is performed by high skilled ethical security professionals.
  • 2. Who are Hackers? Hackers can be divided into three groups: White Hats Good guys, ethical hackers Black Hats Bad guys, malicious hackers Gray Hats Good or bad hacker; depends on the situation Ethical hackers usually fall into the white-hat category, but sometimes they’re former gray hats who have become security professionals and who now use their skills in an ethical manner.
  • 3. Why ethical hacking? Why ethical hacking is because there are many advantages of ethical hacking like To take preventive measures against hackers. To fight against terrorism. A system that helps prevent entry by hackers to create. Ethical hacking will reveal the flaws of what is being hacked (software, a website, a network, etc.) without actually causing any damage. An ethical hacker will find the flaw and report it to the owner so that it can be fixed as soon as possible.
  • 4. Approaches of ethical hacking So here are some approaches of ethical hacking and friendly speaking these approaches that are mentioned here can only be understand by a hacker because these ways of hacking are way too complicated to define in a short amount of time.
  • 5. Ethical Hackers & Careers Businesses and government-related organizations that are serious about their network security hire ethical hackers and penetration testers to help probe and improve their networks, applications, and other computer systems with the ultimate goal of preventing data theft and fraud. You may not get the same adrenaline rush that you might with underground hacking, but you can earn a good and honest living--and not end up facing prison time, as some illegal "black hat" hackers do.
  • 6. Conclusion * Always security professionals are one step behind the hackers and crackers. * Plan for the unplanned attacks. * Never underestimate the attackers or overestimate our existing posture. * To protect against an attack. * The role of ethical hacking in security is to provide customers with awareness of how they could be attacked and why they are targeted. “Security though a pain", is necessary.
  • 7. Some Facts • Charlie Miller a security researcher found a hole in Safari that can be used to hack a Mac Book in just ten seconds. • Scott Lunsford, an IBM researcher broke into a computer network in a nuclear power station in just one day.
  • 8. Contents * Introduction to Ethical Hacking * Who are Hackers * Why Ethical Hacking?? * Approaches of Ethical Hacking * Ethical Hackers & Careers * Conclusion