A Critique of the Proposed National Education Policy Reform
Ethical hacking
1. Submitted To SUBMITTED BY
MR DINESH VERMA VISHESH SINGHAL
ASST PROFESSOR MCA -2nd YEAR
MCA DEPT 15713
PIET PIET
2. Contents
Security
Hacking
Types of Hackers
Ethical Hacking
Mechanism of Ethical Hacking
Benefits
Disaffects
Demand in Industry
Domain of Ethical Hacking
Conclusion
Bibliography
3. WHAT IS SECURITY
Security is the degree of resistance to,
or protection from harm. It is the state of
being free from danger or threat.
It is done mainly for external forces
For Example :
In government building the metal
detector and x-rays machine are used
for protection from external threats.
4. HACKING
Hacking is unauthorized intrusion into a
computer or a network.
The person engaged in hacking
activities is generally referred to as a
hacker.
5. Types OF Hackers
There are several types of hacker in our
industry in which some are malicious
and some are good. These are
categorized in 3 main types.
1. White Hat Hacker
2. Black Hat Hacker
3. Grey Hat Hacker
6. WHITE HAT
You can call Angel of Internet to white hat
hackers.
Also known as ethical hackers, White Hat hackers
are the good guys of the hacker world.
An organization can hire these consultants to do
tests and implement best practices that make
them less vulnerable to malicious hacking
attempts in the future.
7. BLACK HAT
Leave the “can” but you should call them devil
of internet.
Also known as crackers. They find banks or
other companies with weak security and steal
money or credit card information.
Black hat hackers can inflict major damage on
both individual computer users and large
organizations by stealing personal financial
information, compromising the security of
major systems, or shutting down or altering the
function of websites and networks.
8. GRAY HAT HACKER
These are combination of both Black
and white hat hackers. But like black hat
they don’t misuse of their hacking skill.
They just hack vulnerable things to tell
their owner and to make them
understand how it can be hacked.
9. Ethical Hacking
An ethical hacking is the term which a
computer and networking expert
systematically attempts to penetrate a
computer system or network on behalf
of its owners for the purpose of finding
security vulnerabilities that a
malicious hacker could potentially
exploit.
11. RECONNAISSANCE
It is also called FOOT PRINTING
It is done on both business and
technical side
In business side, we try to find the
employee details , location ,physical
address.
In technical side, we cover Search
Engine Hacking, Network Mapping.
12. SCANNING
It is the detailed study of system which
is going to be hacked.
Scanning is the process of connecting to
TCP and UDP ports for the purpose of
finding what services and applications
are open on the target device.
In this we study about the networking
topology, IP of system and app running
on target system.
13. GAINING ACCESS
Gaining access is the most important phase of
an attack in terms of potential damage,
although attackers don’t always have to gain
access to the system to cause damage. For
instance, denial-of-service attacks can either
exhaust resources or stop services from
running on the target system.
Stopping a service can be carried out by
killing processes, using a logic/time bomb, or
even reconfiguring and crashing the system.
Resources can be exhausted locally by filling
up outgoing communication links.
14. MAINTAINING ACCESS
Once an attacker gains access to the
target system, the attacker can choose
to use both the system and its resources
and further use the system as a launch
pad to scan and exploit other systems,
or he can keep a low profile and
continue exploiting the system.
Both these actions can damage the
organization.
15. COVERING TRACK
An attacker needs to destroy evidence
of his presence and activities for several
reasons like being able to maintain
access and evade detection.
Erasing evidence of a compromise is a
requirement for any attacker who wants
to remain obscure and evade trace
back.
16. Benefits of Ethical Hacking
Fighting against terrorism and national
security breaches
Having a computer system that prevents
malicious hackers from gaining access
Having adequate preventative measures
in place to prevent security breaches
17. Disaffects of Ethical
Hacking
The ethical hacker using the knowledge
they gain to do malicious hacking activities
Allowing the company’s financial and
banking details to be seen
The possibility that the ethical hacker will
send and/or place malicious code, viruses,
malware and other destructive and harmful
things on a computer system
Massive security breach
18. Demand in Industry
The threat hackers pose to businesses is finally
being taken seriously as more e-commerce and
mobile app-based service providers are taking
concrete steps to address the loopholes in their
networks.
As for the ethical hacking workforce, companies will
start integrating it as an essential department of their
businesses. Cyber security will become a facet that
no company would be able to overlook. People will
start demanding more personalized services.
Considering the above statement we find that the
future of ETHICAL HACKING is bright.
19. Domain of Ethical Hacking
The key areas where this technology is
used are
1. National Security
2. Free Lancer
3. IT Companies
20. National Security
It is the main concern of every country to
protect there national assets (person,
treasure, R&D).
So here Ethical Hackers are required
the most
21. FREE LANCER
These are the person who did not work
for a particular organization, rather they
work as an individual and who so ever
call them they work for them (freely).
There main aim is to just get Name and
Fame
22. IT COMPANIES
IT companies make different software
for big organization.
For example
SBI Website is made by TCS
So here TCS will hire the EH to find the
Loopholes in there website.
23. Conclusion
The word "hacker" carries weight
Ethical Hacking is the term which has a
shining career in the near future.
It is my hope that the hackers of the
future will move beyond their limitations
and become hacktivists. They need to
work with non-technologically based and
technology-borrowing social movements
in the struggle for global justice.