Top Banner
ETHICAL HACKING … About Ethical Hacking O.R.Santhosh B.Tech Bharathidasan University.Trichy.
7
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Easy view about Ethical hacking....

ETHICAL HACKING …About Ethical Hacking

O.R.Santhosh B.TechBharathidasan University.Trichy.

Page 2: Easy view about Ethical hacking....

What is Ethical hacking?

• It is a method developed by third parties (Hackers) to discover the Vulnerabilities existing in the system.

• Neither disturb the Target system Nor steal the Information.

• By the Growth of internet, nowadays a security must be needed in the fields where the computers are used more.

• The purpose of ethical hacking is to evaluate the security of a network or system's infrastructure.

08/02/2015Santhosh, BDU

Page 3: Easy view about Ethical hacking....

About Ethical Hackers…

• An ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit.

•Ethical Hacker typically have very strong programming and Computer Networking skills.

•Experienced with all popular operating systems and can easily adopt the techniques.

Page 4: Easy view about Ethical hacking....

Santhosh, BDU

Work of Ethical Hackers…

•An Ethical Hacker evaluates the system security functions and answer to the following questions:

> What can intruder see on the target system?

> What can intruder do with that information?

> What are trying to protect?

> What are you trying to protect against?

> How much time and what kind security handle

to protect?

08/02/2015

Page 5: Easy view about Ethical hacking....

Santhosh, BDU

Modes Of Ethical Hacking…

• Insider Hack

• Outsider Hack

• Stolen Equipment Hack

• Physical Hack

• Social Engineering Hack

08/02/2015

Page 6: Easy view about Ethical hacking....

Santhosh, BDU

• Collection of all discoveries made during evaluation.

• Specific advice on how to close the vulnerabilities.

• Testers techniques never revealed.

• Delivered directly to an officer of the client organization in hard-copy form.

• Steps to be followed by clients in future.

At the End…

08/02/2015

Page 7: Easy view about Ethical hacking....

08/02/2015