2. CONTENTS
Introduction
Types Of Hackers
Hacking Process
Certifications
Hacking Language
Security Types
System Security
Keyloggers,Anti-keyloggers
Tips For Securing System Data And System
Advantages Of Ethical Hacking
Disadvantages Of Ethical Hacking
Conclusion
3. INTRODUCTION
Ethical hacking is also known as penetration
testing, instruction testing or red teaming
It is Legal
Permission is obtained from the target
Part of an overall security program
Identify vulnerabilities visible from Internet at
particular point of time
Hacker
Cracker
4. TYPES OF HACKERS
White Hat Hacker
Good guys
Don’t use their skill for illegal purpose
Black Hat Hacker
Bad guys
Use their skill maliciously for personal gain
Grey Hat Hacker
It is a combination of White hat n Black Hat
Hackers
Goal of grey hat hackers is to provide national
security
6. CERTIFICATIONS
The International Council of E-Commerce Consultants
(EC-Council) provides a professional certification for
Certified Ethical Hackers (CEH). A certified ethical
hacker is an ethical hacker who has obtained the
certification provided by the EC-Council.
1. Legality
2. Footprint
3. Scanning
4. Enumeration
5. System Hacking
6. Trojans & Backdoors
7. Sniffers
8. Denial of Service
9. Social Engineering
10. Session Hacking
8. SECURITY TYPES
Broadly we can divide security in three divisions
1.System security
2.Data Security
3.Network Security
System security is least consider nowadays also
when we have maximum number of hackers and
crackers.
9. SYSTEM SECURITY
System security means securing a system from
unauthorized access by the person who can
physically access it.
System security is further divided into two divisions
1. System accessible Security
2. Data accessible Security
10. SYSTEM ACCESSIBLE SECURITY
System accessible security means restricting
someone to access the system completely, it can
be referred as OS level security.
Eg:
Provide user password in the system
11. DATA ACCESSIBLE SECURITY
When we give permission to a user to access only
certain files and folders in a system then it is
consider as the Data Accessible Security.
We can achieve data accessible security by many
ways.
Some of the ways are:-
1) Encrypting Hard disk
2) Hiding Folders
3) By locking folders
12. KEYLOGGERS, ANTI-KEYLOGGERS
Keyloggers are a software or hardware which
records the screenshots or keystrokes without the
knowledge of user.
Types of keyloggers:
1.SOFTWARE KEYLOGGERS
2.HARDWARE KEYLOGGERS
Hardware key loggers can be detected by carefully
observing the port but to prevent system from
software keyloggers, we need to install anti
keyloggers.
14. TIPS FOR SECURING SYSTEM DATA AND
SYSTEM
Install and Use Anti-Virus, firewalls & Anti key logger Programs
While installing OS like Windows XP give admin password.
Use Care When Reading Email with Attachments and following links.
Install and Use a Firewall Program
Make Backups of Important Files and Folders
Change passwords
Use Care When Downloading and Installing Programs
Install and Use a Hardware Firewall
Install and Use a File Encryption Program and Access Controls
Safeguard your Data
Real-World Warnings keep you safe online.
15. ADVANTAGES OF ETHICAL HACKING
Provides security to banking and financial
establishments
Prevents website defacements
An evolving technique
To catch a thief you have to think like a thief
16. DISADVANTAGES OF ETHICAL HACKING
All depends upon the trustworthiness of the ethical
hacker
Hiring professionals is expensive.
17. REFERENCES
Ethical Hacking –Wikipedia
Ethics in ethical hacking-Idimadakala nagaraju
Need of ethical hacking in online world-Vivek
shrivastava,monika pangaria
History and impact of ethical hacking-History of
computing final paper
18. Ethical hacking : A technique to enhance
Information security-Gorpreet k.Juneja
Ethical hacking techniques with penetration testing-
K.Bala chowdappa,S.Subba lakshmi,P.N.V.S.
Pavan kumar
Ethical hacking in linux environment-Anirudhha P
tekada,pravin Gurjar,Pankaj
R.Inglr,DR.BB.Meshram
System security in ethical hacking-Kumar utkarsh
http://www.slideshare.com
19. CONCLUSION
We should pay maximum attention towards our
system security and we can do the same by
remembering this line “Treat your password like you
treat your toothbrush. Never give it to anyone else
to use, and change it every few months & most
importantly use SYSKEY”