Final Mis

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 12

E T H I C A L

H A C K I N G

7/28/18 1
Isn’t Hacking a Crime?

7/28/18 2
Ethical Hacking Demystified

Breaking Into a Computer System



Discover Security Vulnerability

 Security Assessment

Work Ethically

Respect Privacy

Maintain System Integrity

7/28/18 3
7/28/18 4
Phases of Ethical Hacking

Reconna Gaining Covering


-issance Access Tracks


 1 2 3 4 5

Scanning Maintaining
Access

7/28/18 5
Hacking Over the Years

•The first hackers appeared during


1960’s.

•Phone hackers appeared during


1970’s.

•The term “Ethical Hacking” was


first used by IBM’s John Patrick in
1995.

7/28/18
6
Types of Ethical Hacking

 Local
 Remote Network

Network

Stolen
Equipment
Remote dial
up network
Wireless Network
7/28/18
Testing 7
Types of Ethical Hacking


 Social Physical Entry

Engineering

Network Testing
Application
Network
Code Review
7/28/18 8
Services of Ethical Hacking





Application Network Wireless
Testing Testing Security

     
7/28/18 9
Why do Businesses Need Ethical Hacking?

1 4
Defend Cyber Crimes Basic & Traditional
Attackers are being paid to Every single business sector
breach security and to defend needs to be prepared for cyber
that business requires Ethical attacks and get rid of lacking in
 Hacking pro-activeness

2 5
Security Requirements Lagging Industry
Business requires up to date Industries that are lagging
 security system as per changing behind need to upgrade their
hacking tactics, handling hidden security strategy for data
 vulnerabilities and evolving protection purpose
technologies

3 6
Professionalism Awareness
Ethical Hacking ensures Building-up awareness against
effectiveness of service and day to day threats of worms,
confidentiality to the business malware, ransomwares and
viruses and how ethical hacking
can provide safeguard

7/28/18 10
Industry Specific Views on Ethical Hacking
Healthcare
According to Parameter Security, “The latest Ponemon
 Institute study reveals 60% of healthcare providers had
more than 2 security breaches in the last year with the
average breach costing them $2 million.”

Retail
While regular brick-and-mortar retail stores can still benefit
 from the services of ethical hackers by securing point-of-
sale (POS) devices, and proper encryption of credit card
information, the realm of the retail store has transformed
into e-commerce.

Finance
 With ethical hacking being a security service to test an
organization for potential exposure to cyber-attacks, the
realm has opened up to many financial institutions.
Financial institutions carry more wealth and personal assets
than any other industry..




Thank You

7/28/18 12

You might also like