Hacking refers to illegally accessing computer systems or networks without authorization. The document discusses different types of hackers such as black hat and white hat hackers. Ethical hacking involves legally testing the security of systems and networks with permission to help defend against cyber threats. Ethical hackers are trusted to have strong skills but use them to detect and prevent attacks rather than carry them out. The document provides tips on how to defend against hacking such as using strong passwords and keeping systems updated. It also outlines the consequences of illegal hacking such as fines and imprisonment.
Hacking refers to illegally accessing computer systems or networks without authorization. The document discusses different types of hackers such as black hat and white hat hackers. Ethical hacking involves legally testing the security of systems and networks with permission to help defend against cyber threats. Ethical hackers are trusted to have strong skills but use them to detect and prevent attacks rather than carry them out. The document provides tips on how to defend against hacking such as using strong passwords and keeping systems updated. It also outlines the consequences of illegal hacking such as fines and imprisonment.
Hacking refers to illegally accessing computer systems or networks without authorization. The document discusses different types of hackers such as black hat and white hat hackers. Ethical hacking involves legally testing the security of systems and networks with permission to help defend against cyber threats. Ethical hackers are trusted to have strong skills but use them to detect and prevent attacks rather than carry them out. The document provides tips on how to defend against hacking such as using strong passwords and keeping systems updated. It also outlines the consequences of illegal hacking such as fines and imprisonment.
Hacking refers to illegally accessing computer systems or networks without authorization. The document discusses different types of hackers such as black hat and white hat hackers. Ethical hacking involves legally testing the security of systems and networks with permission to help defend against cyber threats. Ethical hackers are trusted to have strong skills but use them to detect and prevent attacks rather than carry them out. The document provides tips on how to defend against hacking such as using strong passwords and keeping systems updated. It also outlines the consequences of illegal hacking such as fines and imprisonment.
WHO ARE HACKERS??? WHAT IS ETHICAL HACKING ??? WHO ARE ETHICAL HACKERS??? TYPES OF HACKING HOW TO DEFEND FROM HACKING??? CONSEQUENCES OF ILLEGAL HACKING CONCLUSION SUMMARY What Is Hacking??? • Hacking is cracking into an account or cheating in a game without using cheat codes. Hacking passwords requires a program or requires finding glitches from the website. Who are Hacker??? • Hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" Hackers Classes – Black hats :– highly skilled, malicious, destructive “crackers” – White hats – skills used for defensive security analysts – Gray hats – offensively and defensively; will hack for different reasons, depends on situation. What is Ethical Hacking ???
• It is Partially Legal (May vary by country
law) • Completely legal in INDIA • Permission is obtained from the target user • Part of an overall security program. Who are Ethical Hackers??? • Completely trustworthy. • Strong programming and computer networking skills. • Techniques of Criminal hackers- Detection-Prevention. • Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non- destructive manner . • E.G. Cyber Crime investigators Types Of Hacking • Website Hacking • Email Hacking • Network Hacking • Password Hacking • Online transactions Hacking • Computer Hacking • Mobile Hacking • PDA(personal digital assistant) hacking • Metropolitan system hacking How to Defend from Hacking??? • Use Strong Passwords! (Follow Universal Code while creation) • Unsolicited Installation of Scripts • Avoid Scam/Spammy Websites • Clear the Cookies! • Do not make any financials transactions on (http://) • Prevent illegal farmers’ from “harvesting” your lists • Don’t use Generic Usernames & Passwords • Use Secure Ports • Keep OS updated with security patches • Never trust mails which makes an attractive offers (like you have won 100Millions dollars/ anything else..) What to do after being hacked? • Shutdown the system • Clear the memory using Cleaners (like CCleaner) • Scan infected sections with good antivirus • Separate the system from network (Do not use internet) • Restore the system with the backup (If o/s problem) • Finally, connect the system to the network How Ethical Hackers defend???
• Harden the servers
• Scan, test and apply patches • Monitor logs • Train the technical staff on security • Serious policy and procedures! How much do Ethical Hackers get Paid?
• Globally, the hiring of ethical hackers is on the rise with
most of them working with top consulting firms.
• In the United States, an ethical hacker can make upwards
of $120,000 per annum.
• Freelance ethical hackers can expect to make $10,000 per
assignment.
• Some ranges from $15,000 to $45,000 for a standalone
• Deface hacked web pages to • Hired as Preventive
advertise their prowess measure • Doings are Evil & Illegal • Doings are good & justice • Work is done to get illegal • Work is Legal & to restore information for themselves the hacked the website . or for someone else Consequences Of illegal Hacking • Thousands Of Dollars in Fines • Imprisonment • Seizure Of Your Computer • Proper Ethical Hacker Should Be Employed • Do Not Exposed Your Passwords to Untrusted Sites • Close Your Internet While Not in Use • Having Basic Knowledge of Internet