Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Introduction to Computing

Name: Eaiman Basit

Submitted to:
Class: BBA (2nd Semester)
Muhammad Ehtisham
CMS: 404405

ETHICAL HACKING

1. HISTORY
The phrase “ethical hacking” was first used in 1995 by IBM Vice President John
Patrick. It was a result for a way to reduce the fear and worry of the data being
hacked, organizations have come to the realization that an effective way to
evaluate security threats is to have independent security experts attempt to hack in
their security system. These Tiger teams or Ethical hackers use the same tools
and techniques as an attacker, but rather than damage the system or steal
information, they would evaluate the system security and report the vulnerabilities
they found and provide instruction for how to remedy them.
2. ETHICAL HACKER
He is an information security expert who systematically attempts to penetrate a
computer system, network, application or other computing resource on behalf of
its owners – and with their permission. Individuals interested in becoming an
ethical hacker can get certification provided by International Council of EC-
Council; named Certified Ethical Hacker or CEH. Ethical hackers are often
referred to as Whitehats.
3. ETHICAL HACKING
Ethical hacking refers to the act of locating potential threats, weaknesses and
vulnerabilities of a computer or network by duplicating the intent and actions of
malicious hackers. Ethical hacking is also known as penetration testing, intrusion
testing, or red teaming. In order to operate effectively and legally, an ethical
hacker must be informed of the assets that should be protected.
i. Process of Ethical Hacking
Introduction to Computing

 Planning
 Reconnaissance
 Enumeration
 Vulnerability Analysis
 Exploitation
 Final Analysis
 Deliverables
 Integration
ii. Purpose of Ethical Hacking
 Attempts to bypass system security and search for any weak
points that could be exploited.
 Collect the information used to overcome the loss of data as well
as financial loss.
 Improve the security of the network by fixing the vulnerabilities
found during the testing.
 Demonstrating knowledge of assessing the security of computer
systems and penetration testing techniques.
 Helps to improve the national security by fighting against
terrorism.

THANK YOU.

You might also like