TECHNOLOGY THE NEW ERA OF BUSINESSES PRESENTED BY:
ARANZAMENDEZ, ALDRICH JOSEPH
AVERION LOUIE MARTIN
SALINAS, JOHN PAUL
SALINAS, KEVIN EMMANUEL
MORAL LESSON The video demonstrates the importance of ethical hackers to maintaining the security of our online environment. They function as a kind of shield, guarding our digital assets and preventing hackers from identifying and exploiting vulnerabilities. Their commitment to keep everyone's access to the internet safe by following the rules and responsibly disclosing any vulnerabilities they come across. Good hackers are the unseen heroes of our online lives, keeping the internet a safer place for everyone by following the guidelines and being transparent about what they discover. Collaboration between security programs and these ethical hackers builds trust and ensures the strength and safety of our online community. GROUP OBSERVATION The group has observed that ethical hackers play an important part in the online community. The video demonstrates how crucial these ethical hackers are to identifying vulnerabilities before the bad guys do. We appreciate that ethical hacking allows us to stay ahead of the problem, protecting our online assets, and maintaining the integrity of all data. The video further explains that ethical hackers always follow the law and properly report any issues they come across. In terms of keeping things safe on the internet, this increases mutual trust. By keeping an eye out for threats and working to keep the internet resistant against attacks, ethical hackers play a crucial role in making the internet a safer place for everyone. ARANZAMENDEZ’S SYNTHESIS Computer ethical hacking, sometimes referred to as "white hat" hacking, is an essential technique used to strengthen the security of networks and digital systems. Ethical hackers, with permission from administrators or system owners, perform methodical testing and probing to find flaws. They imitate actual attacks using a variety of strategies, including network scanning, penetration testing, and social engineering, in order to evaluate the target system's security posture without endangering users. Ethical hackers prioritize user privacy and data confidentiality while adhering to stringent legal and ethical standards. They notify the system owner of any flaws they find so they can be fixed. These experts, who frequently have certifications from programs like the Offensive Security Certified Professional (OSCP) or Certified Ethical Hacker (CEH), help companies foster a culture of security awareness and ongoing development. AVERION’S SYNTHESIS Ethical hacking, often referred to as penetration testing or white-hat hacking, is the practice of systematically probing computer systems, networks, and applications for security vulnerabilities. Unlike malicious hackers, ethical hackers operate with the explicit permission of the system owners to identify weaknesses and strengthen defenses. This proactive approach helps organizations safeguard their digital assets, prevent data breaches, and protect sensitive information from cyber threats. Ethical hacking plays a crucial role in society by bolstering cybersecurity measures, promoting trust in digital systems, and ultimately safeguarding individuals' privacy and security in an increasingly interconnected world. By uncovering vulnerabilities before they can be exploited by malicious actors, ethical hackers contribute to the resilience and integrity of our digital infrastructure, making the internet a safer place for everyone. SALINAS, JOHN’S SYNTHESIS In this activity, we have learned about the practice of ethical hacking, which is sometimes referred to as penetration testing or white-hat hacking, is crucial for proactively locating and fixing security flaws in digital networks, applications, and systems. Ethical hackers assist firms in fortifying their defenses and reducing the likelihood of data breaches and financial losses by mimicking actual cyberattacks. In addition to improving cybersecurity procedures, this proactive strategy encourages end users' accountability, openness, and confidence. By encouraging ongoing cybersecurity measure development, ethical hacking guarantees that digital goods and services are resistant to changing threats. To preserve credibility and respect moral norms in their work, ethical hackers must, nevertheless, abide by stringent moral principles and legal frameworks. In the end, ethical hacking is essential for safeguarding end users and preserving the digital ecosystem. SALINAS, KEVIN’S SYNTHESIS Ethical hacking, sometimes referred to as penetration testing or white-hat hacking, is an important method for enhancing the security of digital networks and systems. With authorization from system owners or administrators, ethical hackers carry out in-depth analyses to find vulnerabilities while putting user security first. They simulate actual cyberattacks using methods like network scanning, penetration testing, and social engineering in order to evaluate security measures. Ethical hackers prioritize user privacy while following strict legal and ethical requirements. They also immediately report any vulnerabilities they find for fixes. Their experience helps companies develop a security- conscious culture that makes it easier to keep improving cybersecurity protocols. In the end, ethical hacking is essential to protecting end users and maintaining the integrity of the digital space. THANK YOU VERY MUCH! PRESENTED BY ARANZAMENDEZ, AVERION, SALINAS J., SALINAS K.
Hacking With Kali Linux - A Step by Step Guide To Ethical Hacking, Tools For Computer, and Protect Your Family and Business From Cyber Attacks Using The Basics of Cybersecurity by Jeremy Hack