Download Presentation

What is Ethical hacking

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. What is Ethical hacking? Ethical Hacking is also called penetration Testing. It is an act of penetrating networks or systems to find out threats and vulnerabilities in that system which the attacker would have exploited and caused the loss of data, financial loss or other major damages to a business. Purpose of Ethical hacking The purpose of Ethical hacking is to build the security of the system or network by settling the vulnerabilities which are detected while testing. Ethical hackers may use the same techniques and mechanisms used by malicious hackers but with the permission of the authorized person, the Ethical hackers help to develop the security and defend the systems from attacks. Why is Ethical Hacking important? When the Ethical hacker finds a vulnerability, he will inform the issues and advise how to fix the problem. The company employs an Ethical hacker to protect and secure their data. The Ethical hacker’s tests do not always mean a system is attacked by malicious attackers. Sometimes, it means the hacker is preparing and protecting their data in precaution. Some of the advanced attacks caused by hackers include:- ● Piracy ● Vandalism ● Credit card theft ● Theft of service ● Identity theft ● Manipulation of data ● Denial-of-service Attacks These types of cyberattacks, hacking cases are increased because of the huge usage of online services and online transactions in the last decade.

  2. Phases of Ethical Hacking:- The phases of Ethical Hacking:- ● Scanning ● Footprinting & Reconnaissance ● Enumeration ● System Hacking ● Escalation of Privileges ● Covering Track Skills of an Ethical Hacker A skilled Ethical Hacker should hold a collection of technical and non-technical skills. Technical Skills 1. The Ethical Hackers must have strong knowledge in all Operating Systems like Windows, Linux, and Mac. 2. The Ethical Hackers should be skilled with Networking and have a strong knowledge of basic and detailed concepts in technologies, software, and hardware applications. 3. Ethical Hackers must know all kinds of attacks. Non-Technical Skills 1. Communication Skills 2. Learning Ability 3. Problem-solving skills 4. Proficient in the security policies 5. Awareness of laws, standards, and regulations. Scope of Ethical Hacking:- Ethical hacking is generally used as penetration testing to detect vulnerabilities, risk and identify the loopholes in a security system and to take corrective measures against those attacks.

  3. Ethical hacking is a key component of risk evaluation, auditing, and counter-frauds. The scope for the Ethical Hackers is high and it is one of the rapidly growing careers at present as many malicious attackers cause a threat to the business and its networks. Industries like Information Technology and Banking Sectors hire several Ethical hackers to protect their data and infrastructure. Also, in the upcoming days, the demand for this profile is going to be high compared to other profiles due to an increased threat of vulnerabilities.

More Related
SlideServe
Audio
Live Player
Audio Wave
Play slide audio to activate visualizer