PRESENTOR : SYED ASAD ABBAS ABIDI & SYED AHAD IMRAN
ROLL NO : BCSM-F19-367 & BCSM-F19-360 PRESENTED TO : MISS QAISRA HONEY SUPERIOR UNIVERSITY, LAHORE
PRESENTER : ABDULLAH NAVEED
Basic definiton of Hacking: The process of gaining unauthorized access to the “Data”. A brief description about Hacking: The financial industry is dependent on Technology. What if some unauthorized person gets access to it? It will result in Financial Loss and Damaged Reputation. Types of “Hacking”: Hacking can be categorized into three ways: Black Hat Hacking. Grey Hat Hacking. White Hat Hacking.
Here we’ll discuss about these terms which
are actually the classifications of “Hacking” . Black Hat Hacking: This term is referrred to as the Hacking which is done for personal intentions and profits. Black Hat Hacking is illegal because it is gaining access to the server’s data without letting them know or without their permission. White Hat Hacking: White Hat Hackers penetrates the system with the permission of the developers. The White Hat Hackers identifies the insecurities in the system to improve the security. White Hat Hacking is considered Legal as these types of hackers hack the system on the will of the developers. Grey Hat Hacking: The Grey Hat Hackers are a combo of both White Hat and Black Hat hackers. A Grey Hat Hacker works for “Bug Bounty”. Bug Bounty is a process where the developers pays reward for finding bugs in the system. “Ethical Hacking:” Ethical Hacking is a type of White Hat Hacking. Ethical Hacking is when a friendly hackers tries to break into a system and identifies it’s weaknesses and enhance its Cyber Resilience. Goals of Ethical Hacking: o The main purposes of Ethical Hackers are:
Protect the privacy of organization.
Identify the weaknesses(with details) and identify the solution to this problem. Importance of Ethical Hacking:
They deal with Security Threats.
What is a Security Threat? Any risk that can potentially harm a computer system is known as a ‘Security Threat. Skills of an Ethical Hacker: o An Ethical Hacker should have command over programming languages such as: • HTML • JAVASCRIPT • PYTHON • JAVA o In-depth knowledge of OS’s(Windows,MacOS,Linux). Ethical Hacking Tools: The modern tools used by Ethical Hackers are: Netsparker(Web-App security scanner). BURPSUITE. NMAP. ACUNETIX. HASHCAT. SQLMAP. Thank you!!!