Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

SECURITY AND

TECHNOLOGY
THE NEW ERA OF
BUSINESSES
PRESENTED BY:

ARANZAMENDEZ, ALDRICH JOSEPH

AVERION LOUIE MARTIN

SALINAS, JOHN PAUL

SALINAS, KEVIN EMMANUEL


MORAL LESSON
The video demonstrates the importance of ethical hackers to
maintaining the security of our online environment. They
function as a kind of shield, guarding our digital assets and
preventing hackers from identifying and exploiting
vulnerabilities. Their commitment to keep everyone's access to
the internet safe by following the rules and responsibly
disclosing any vulnerabilities they come across. Good hackers
are the unseen heroes of our online lives, keeping the internet
a safer place for everyone by following the guidelines and
being transparent about what they discover. Collaboration
between security programs and these ethical hackers builds
trust and ensures the strength and safety of our online
community.
GROUP
OBSERVATION
The group has observed that ethical hackers play an
important part in the online community. The video
demonstrates how crucial these ethical hackers are to
identifying vulnerabilities before the bad guys do. We
appreciate that ethical hacking allows us to stay ahead of the
problem, protecting our online assets, and maintaining the
integrity of all data. The video further explains that ethical
hackers always follow the law and properly report any issues
they come across. In terms of keeping things safe on the
internet, this increases mutual trust. By keeping an eye out for
threats and working to keep the internet resistant against
attacks, ethical hackers play a crucial role in making the
internet a safer place for everyone.
ARANZAMENDEZ’S
SYNTHESIS
Computer ethical hacking, sometimes referred to as "white
hat" hacking, is an essential technique used to strengthen the
security of networks and digital systems. Ethical hackers, with
permission from administrators or system owners, perform
methodical testing and probing to find flaws. They imitate
actual attacks using a variety of strategies, including network
scanning, penetration testing, and social engineering, in order
to evaluate the target system's security posture without
endangering users. Ethical hackers prioritize user privacy and
data confidentiality while adhering to stringent legal and
ethical standards. They notify the system owner of any flaws
they find so they can be fixed. These experts, who frequently
have certifications from programs like the Offensive Security
Certified Professional (OSCP) or Certified Ethical Hacker (CEH),
help companies foster a culture of security awareness and
ongoing development.
AVERION’S
SYNTHESIS
Ethical hacking, often referred to as penetration testing or
white-hat hacking, is the practice of systematically probing
computer systems, networks, and applications for security
vulnerabilities. Unlike malicious hackers, ethical hackers
operate with the explicit permission of the system owners to
identify weaknesses and strengthen defenses. This proactive
approach helps organizations safeguard their digital assets,
prevent data breaches, and protect sensitive information from
cyber threats. Ethical hacking plays a crucial role in society by
bolstering cybersecurity measures, promoting trust in digital
systems, and ultimately safeguarding individuals' privacy and
security in an increasingly interconnected world. By
uncovering vulnerabilities before they can be exploited by
malicious actors, ethical hackers contribute to the resilience
and integrity of our digital infrastructure, making the internet
a safer place for everyone.
SALINAS, JOHN’S
SYNTHESIS
In this activity, we have learned about the practice of ethical
hacking, which is sometimes referred to as penetration testing
or white-hat hacking, is crucial for proactively locating and
fixing security flaws in digital networks, applications, and
systems. Ethical hackers assist firms in fortifying their
defenses and reducing the likelihood of data breaches and
financial losses by mimicking actual cyberattacks. In addition
to improving cybersecurity procedures, this proactive strategy
encourages end users' accountability, openness, and
confidence. By encouraging ongoing cybersecurity measure
development, ethical hacking guarantees that digital goods
and services are resistant to changing threats. To preserve
credibility and respect moral norms in their work, ethical
hackers must, nevertheless, abide by stringent moral
principles and legal frameworks. In the end, ethical hacking is
essential for safeguarding end users and preserving the digital
ecosystem.
SALINAS, KEVIN’S
SYNTHESIS
Ethical hacking, sometimes referred to as penetration testing
or white-hat hacking, is an important method for enhancing
the security of digital networks and systems. With
authorization from system owners or administrators, ethical
hackers carry out in-depth analyses to find vulnerabilities
while putting user security first. They simulate actual
cyberattacks using methods like network scanning,
penetration testing, and social engineering in order to
evaluate security measures. Ethical hackers prioritize user
privacy while following strict legal and ethical requirements.
They also immediately report any vulnerabilities they find for
fixes. Their experience helps companies develop a security-
conscious culture that makes it easier to keep improving
cybersecurity protocols. In the end, ethical hacking is essential
to protecting end users and maintaining the integrity of the
digital space.
THANK
YOU VERY
MUCH!
PRESENTED BY ARANZAMENDEZ, AVERION, SALINAS J.,
SALINAS K.

You might also like