02-05-2012, 01:43 PM
ETHICAL HACKING
ethical hacking.pptx (Size: 2.43 MB / Downloads: 71)
INTRODUCTION
Hackers
Access computer system or network without authorization.
Breaks the law; can go to prison.
Crackers
Break into systems to steal or destroy data.
U.S. Department of Justice calls both hackers.
Ethical hacker
Performs most of the same activities but with owner’s permission.
Computer Hackers have been around for so many years.
Since the Internet became widely used in the World, We have started to hear more and more about hacking.
Only a few Hackers, such as Kevin Mitnick, are well known.
Types of Hacker’s
Black Hat Hacker: These are the Criminal Hackers or Crackers who use their skills and knowledge for illegal or malicious purposes.
White Hat Hacker: A White Hat Hacker is computer guy who perform Ethical Hacking. These are usually security professionals with knowledge of hacking and the Hacker toolset and who use this knowledge to locate security weaknesses and implement countermeasures in the resources.
PHISHING
Phishing is a way of attempting to acquire information such as usernames , passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.
Conclusion
Ethical Hacking is just a security system or tool for security to safe your data it is not an ultimate solution of problem.
To test the security and the other functionalities of product is not new.
But in the early stages of Internet no one know about Ethical Hacking even about hacking, but with the passage of time people are more concern about the security of their data, especially due to hackers.
Time to time assessment, prepared interference recognition, good system administration performance and computer safety knowledge are all very vital part of a firm’s or company’s security system.
ethical hacking.pptx (Size: 2.43 MB / Downloads: 71)
INTRODUCTION
Hackers
Access computer system or network without authorization.
Breaks the law; can go to prison.
Crackers
Break into systems to steal or destroy data.
U.S. Department of Justice calls both hackers.
Ethical hacker
Performs most of the same activities but with owner’s permission.
Computer Hackers have been around for so many years.
Since the Internet became widely used in the World, We have started to hear more and more about hacking.
Only a few Hackers, such as Kevin Mitnick, are well known.
Types of Hacker’s
Black Hat Hacker: These are the Criminal Hackers or Crackers who use their skills and knowledge for illegal or malicious purposes.
White Hat Hacker: A White Hat Hacker is computer guy who perform Ethical Hacking. These are usually security professionals with knowledge of hacking and the Hacker toolset and who use this knowledge to locate security weaknesses and implement countermeasures in the resources.
PHISHING
Phishing is a way of attempting to acquire information such as usernames , passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.
Conclusion
Ethical Hacking is just a security system or tool for security to safe your data it is not an ultimate solution of problem.
To test the security and the other functionalities of product is not new.
But in the early stages of Internet no one know about Ethical Hacking even about hacking, but with the passage of time people are more concern about the security of their data, especially due to hackers.
Time to time assessment, prepared interference recognition, good system administration performance and computer safety knowledge are all very vital part of a firm’s or company’s security system.