2. CONTENTS TO FOCUS:-
• HACKING
• ETHICAL HACKING
• TYPES OF HACKERS
• WHO ARE ETHICAL HACKERS?
• HACKERS V/s CRACKERS
• INTRUDERS
• ADVANTAGES OF ETHICAL HACKING
• WHAT SHOULD BE DONE IF THE SYSTEM IS
HACKED?
• SECURING OUR WIRELESS NETWORKS
3. HACKING
Also known as Attack or Penetration
Testing.
Hackers are those who access
computer networks, legally or otherwise.
4. ETHICAL HACKING
Ethical hacking involves getting
authorized access to resources in order
to test if that resource is vulnerable
against attacks.
5. TYPES OF HACKERS
There are two types of hackers:-
White hat hacker
Black hat hacker
White hat hacker:-
These are considered as good
guys. They do not use their skills for illegal
purposes.They usually become computer
security experts and they help to protect from
the black hat hackers.
6. Black hat hacker:-
These are the bad
guys. They usually use their skills
for their personal gains. They are
the people that hack banks
accounts, steal credit cards and
deface websites.
7. WHO ARE ETHICAL
HACKERS? To test a security system, ethical hackers use the
same methods as their less principled counterparts,
but report problems instead of taking advantage of
them.
Ethical hacker is a computer and network expert
who attacks a security system on behalf of its
owners, seeking vulnerabilities that a
malicious hacker could exploit.
An ethical hacker is usually employed by an
organization who trusts him or her to attempt to
penetrate networks and/or computer systems, using
the same methods as a hacker for the purpose of
finding and fixing computer security vulnerabilities.
8. HACKERS V/s
CRACKERS A hacker is a person who is proficient with
computers and/or programming to an elite level
where they know all of the in's and out's of a system.
There is no illegality involved with being a hacker.
A cracker is a hacker who uses their proficiency for
personal gains outside of the law. EX: stealing data,
changing bank accounts, distributing viruses etc.
9.
10.
11. INTRUDERS
An Intruder is a person who enters into the
restricted area of a network and breaks it’s
security. An Intruder is a person that acts as a
third party between two communicating
networks. An Intruder is a person with negative
intensions that can steal,harm or even destroy
our confidential data.
12. ADVANTAGES OF ETHICAL
HACKINGEthical hacking will reveal the flaws of what is
being hacked (software, a website, a network,
etc.) without actually causing any damage. An
ethical hacker will find the flaw and report it to
the owner so that it can be fixed as soon as
possible.
14. WHAT SHOULD BE DONE IF THE
SYSTEM IS HACKED?
Call your bank and/or credit
agencies.
Scan and update your computer.
Update and boost your passwords.
15. SECURING OUR WIRELESS
NETWORKS Use strong data encryption protocols.
Change default passwords and usernames.
Limit access to your access point.
Do not connect to open wi-fi networks.
Enable firewall to each computer and
router.
Assign static IP address to devices.