Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 8

Ethical Hacking

Student Name
Course Name
Instructor Name
September 25, 2020
Introduction
 Ethical hacking is the approach to discover the vulnerabilities and weaknesses in the
computer network or system.
 It is a technique to define the process of hacking in a moral manner for any kind of
network.
 There are several hackers whose purpose is not to hurt them.
 Ethical hackers in the current scheme are expected to evaluate and verify bugs and flaws.
 This paper has attempted to clarify the positive as well as negative aspect of hackers and
perhaps even ethical hackers and what are the distinct effects on the diverse areas of the
community.
History
 The term "ethical hacking" was first seen through IBM Vice President John Patrick in
1995, but the idea existed for a long time.
 The hacker’s modern depiction as cybercriminals & robbers makes it impossible to believe
that the term "hacker" has everything but derogatory implications.
 In the 1980s & 1990s, the word hacker started to be nearly entirely associated with illegal
activity.
 Hackers have been seen as hackers – software intruders – who used their skills to obtain
private devices access, steal records, and extort huge amounts of money from companies.
 These types of hackers are what we call black hat hackers today: they are solely involved in
using their abilities for sinister ends and are frequently tied to several various illegal
activities.
Continue…
• Hackers of the Black hat are attracting the
media coverage of the vast majority, there have
been prominent attacks on big corporations
such as Sony and eBay lately.
• Ethical hackers normally need a certain degree
of anonymity to conduct their work properly.
• It ensures that they can typically be hired
directly by companies without the involvement
of their employees or data security departments
Advancements and Failures
 The initial purpose of carrying out identification, collecting as much knowledge as
possible.
 Ethical hacking is meant to imitate an attacker when evaluating the stability of an
organization's IT asset(s).
 I think skills and certifications are the part that can do well in our research topic because
Ethical hackers must have a wide variety of programming skills.
 Ethical hackers need a lot of courage, determination, and perseverance to try again and
again, wait for the desired outcome.
 In my opinion, the three most critical facets of science are originality, significance, and
the development of new insights.
Continue…
• The primary advantage of ethical hacking is to
deter data from being intercepted and misused by
unauthorized criminals and to uncover flaws from
an attacker's POV .
• Attempting to defend national security and
shielding data from terrorists has also been
established.
• Ethical hacking copies the black hat hacking
methodology used to test security flaws.
• Initially, ethical hackers were understood to
obtain as much knowledge as possible.
Final Conclusion
 I think that my subject topic will grow up because it all works on learning programs.
 Ethical hackers are supposed to test and check glitches and weaknesses in the new system.
 Crimes such as phishing, credit card theft, bank robbery, illicit copying, industrial
hacking, child porn, child abduction by chat rooms, scams, cyber warfare, virus
development and dissemination, spam, and so on.
 The sector of ethical hacking will see rapid development in the coming years as the world
transitions into a global marketplace.
 So Ethical Hacking's career has bright opportunities shortly.
 Finally, the benefits of professionalization to resolve the established shortcomings could
outweigh the possible costs.
References
 Begum, S., Kumar, S., & Ashhar. (2016). A comprehensive study on ethical hacking.
International Journal of Engineering Sciences & Research, 5(8), 214-219. Retrieved from
http://www.ijesrt.com/issues%20pdf%20file/Archive-2016/August-2016/21.pdf
 Kumar, S. (2018). Hacking attacks, methods, techniques and their protection measures.
International Journal of Advance Research in Computer Science and Management, 4(4),
2353-2358. Retrieved from https://
www.researchgate.net/publication/324860675_Hacking_Attacks_Methods_Techniques_A
nd_Their_Protection_Measures
 Shrivastava, V., & Pangaria, M. (2013). Need of ethical hacking in online world.
International Journal of Science and Research, 2(4), 529-531. Retrieved from https://
www.academia.edu/5673296/Need_of_Ethical_Hacking_in_Online_World

You might also like