Ethical Hacking And Ethical Hackers - PowerPoint PPT Presentation

About This Presentation
Title:

Ethical Hacking And Ethical Hackers

Description:

Ethical hacking has the ability to suggest proper security tools that can avoid attacks on the network. An Ethical hacker is the one who perform security measure on behalf of the organization owners.Know about ethical hacking and more. For professional ethical hacking services in Dubai, visit: – PowerPoint PPT presentation

Number of Views:2462
Slides: 8
Provided by: helpagmiddleeast
Category:

less

Transcript and Presenter's Notes

Title: Ethical Hacking And Ethical Hackers


1
Ethical Hacking AndEthical Hackers
2
What is Ethical Hacking
  • Ethical hacking is the hacking performed by a
    company or individual to help identify potential
    threats on a computer or network.
  • Ethical hacker attempts to bypass system security
    and search for any weak points that could be
    exploited by malicious hackers.
  • The information is then used by the organization
    to improve the system security.
  • This helps to minimize or eliminate any potential
    attacks.

3
Why Ethical Hacking
  • Information is one of the most important assets
    of an organization.
  • Keeping information secure can protect and save
    an organizations reputation and money.
  • Organizations that deals with finance such as
    PayPal, hacking can lead to loss of business.
  • Ethical hacking puts them a step ahead of the
    cyber criminals who would otherwise lead to loss
    of business.
  • Ethical Hacking is legal.

4
Ethical Hackers
  • Ethical Hackers are often referred to as Whitehat
    Hackers or Whitehats.
  • They are security professional who applies their
    hacking skills for defensive purposes.
  • They work on the behalf of the owners of
    information systems.
  • They may also perform penetration testing and
    vulnerability assessments.

5
Hacker Types
  • Ethical Hacker (White hat) A hacker who gains
    access to systems with a view to fix the
    identified weaknesses
  • Cracker (Black hat)A hacker who gains
    unauthorized access to computer systems for
    personal gain
  • Grey Hat A hacker who is in between ethical and
    black hat hackers.
  • Script Kiddies A non-skilled person who gains
    access to computer systems using already made
    tools.
  • Hacktivist A hacker who use hacking to send
    social, religious, and political messages.
  • Phreaker A hacker who identifies and exploits
    weaknesses in telephones instead of computers.

6
Rules For Ethical Hackers
  • Ethical hacking is an emerging tools used by most
    of the organizations for testing network
    security. An ethical hackers must abide by the
    following rules before hacking.
  • Get written permission from the owner of the
    computer system and/or computer network before
    hacking.
  • Protect the privacy of the organization been
    hacked.
  • Transparently report all the identified
    weaknesses in the computer system to the
    organization.
  • Inform hardware and software vendors of the
    identified weaknesses.

7
Conclusion
  • The nature of cyber security threats keeps
    evolving.
  • The security risks and vulnerabilities in a
    network can be recognized with the help of
    ethical hacking.
  • Ethical hacking has the ability to suggest proper
    security tools that can avoid attacks on the
    networks.
  • For certified ethical hacking service in Dubai,
    visit https//www.helpag.com/services/cyber-secur
    ity-analysis/
Write a Comment
User Comments (0)
About PowerShow.com