30-01-2012, 03:05 PM
ETHICAL HACKING
Ethical-Hacking-Ppt by Bhupendra Singh.ppt (Size: 570.5 KB / Downloads: 140)
It is Legal
Permission is obtained from the target user
Part of an overall security program
Learn about the system and trying to find its weaknesses.
Why can’t we be protect against hacking?
There are many unknown security hole
Hackers need to know only one security hole to hack the system
Admin need to know all security holes to defend the system
What to do after being hacked?
Shutdown the system
Or turn off the system
Separate the system from network
Restore the system with the backup
Or reinstall all programs
Connect the system to the network
It can be good to call the police
Conclusions
Always security professionals are one step behind the hackers and crackers.
Plan for the unplanned attacks.
The role of ethical hacking in security is to provide customers with awareness of how they could be attacked and why they are targeted.
“Security though a pain”, is necessary.
Ethical-Hacking-Ppt by Bhupendra Singh.ppt (Size: 570.5 KB / Downloads: 140)
It is Legal
Permission is obtained from the target user
Part of an overall security program
Learn about the system and trying to find its weaknesses.
Why can’t we be protect against hacking?
There are many unknown security hole
Hackers need to know only one security hole to hack the system
Admin need to know all security holes to defend the system
What to do after being hacked?
Shutdown the system
Or turn off the system
Separate the system from network
Restore the system with the backup
Or reinstall all programs
Connect the system to the network
It can be good to call the police
Conclusions
Always security professionals are one step behind the hackers and crackers.
Plan for the unplanned attacks.
The role of ethical hacking in security is to provide customers with awareness of how they could be attacked and why they are targeted.
“Security though a pain”, is necessary.