Ethical Hacking
Ethical Hacking
Ethical Hacking
Contents
Definition
Why Ethical Hacking?
Evolution of Ethical Hacking
News Related to Cyber Crime and Ethical Hacking
Types of Hacking Attacks
Prevention of Hacking Attacks
Advantages and Disadvantages of Ethical Hacking
Uses and Needs of Ethical Hacking
13,301
2011
22,060
2012
27,605
28,481
2012
2013
21,699
2013
2011
Ethical Hacking
Definition
Of course, for a long time, nobody was calling it ethical hacking - but
that's exactly what it was: Individuals or groups were assessing their own
resiliency to attack. In other words, they were hacking themselvesfor their
own good.
10
11
12
13
14
Trojan Programs
Conceals itself with an
unsuspected program
Unknowingly executed
Read, delete , move and
execute any file
Hacker steals user information
when user comes online
15
16
Phishing
Fake emails asking to fill personal
information on counterfeit links
Manipulating URL and redirecting
to phishers website
17
18
Advantages
It can help a country fight against national security
breaches and terrorism.
White hat hackers can also demonstrate the techniques
used by unethical invaders and help prepare organizations
for black hat hacker attacks.
It can help organizations identify vulnerable areas in their
information system.
It can benefit organizations by creating a computer
system that prevents malicious hackers from gaining
access to the system.
19
Disadvantages
The ethical hacker can use the knowledge they have
gained and engage in malicious hacking activities.
There is a possibility that the ethical hacker will send
and/or place malicious code, viruses, malware and other
destructive and harmful things on a computer system.
The ethical hacker can himself engage in massive security
breach.
20
21
22
24
Contd.
An ethical hacker once helped a multinational bank crack
down a hacker who gained access to their server to steal
data. The white hat hacker and his group took the issue
to the international war room for internet which had
experts from all over the world. This helped them track
the identity of the hacker immediately and stopped the
crime.
A white hat hacker also help find the culprit who hacked
AIADMK website last year.
25
Thank You!