20-10-2010, 12:46 PM
Hacking.docx (Size: 48.39 KB / Downloads: 250)
ETHICAL HACKING by dilip jha.pptx (Size: 1.39 MB / Downloads: 277)
Ethical Hacking.ppt (Size: 109.5 KB / Downloads: 572)
ethical hacking full report
Dilip Kumar Jha “Deepak”
Roll no: 870056
MCA 2nd year(4th sem.)
Kalinga institute of industrial technology
School of Computer Application
and
Pratheeba Murugesan
INTRODUCTION
Ethical hacking- also known as penetration testing or intrusion testing or red teaming has become a major concern for businesses and governments.
Ethical hackers employ the same tools and techniques as the intruders.
They neither damage the target systems nor steal information.
The tool is not an automated hacker program rather it is an audit that both identifies the vulnerabilities of a system and provide advice on how to eliminate them.
Ethical Hacking
Pratheeba Murugesan
Independent computer security Professionals breaking into the computer systems.
Neither damage the target systems nor steal information.
Evaluate target systems security and report back to owners about the vulnerabilities found.