Professional Documents
Culture Documents
CSE Ethical Hacking
CSE Ethical Hacking
CSE Ethical Hacking
Ethical Hacking
• WAN(wide-area network)
Content…
What do hackers do after Hacking?
Advantages
Disadvantages
Future Enhancements
Conclusion
Introduction
Ethical hacking also known as penetration testing or
white-hat hacking, involves the same tools, tricks, and
techniques that hackers use, but with one major difference that
Ethical hacking is legal.
Ethical hacking, is legally breaking into computers and
That is black hat hackers use their knowledge and skill for
their own personal gains probably by hurting others.
White-Hat Hacker
White hat hackers are those individuals professing
hacker skills and using them for defensive purposes.
Trojans: A Trojan Horse Virus is a type of malware that downloads onto a computer
disguised as a legitimate program.
Clears Tracks: The final phase of every successful hacking attack is clearing the
tracks. It is very important, after gaining access and misusing the network, that the attacker
cover the tracks to avoid being traced and caught.
Why Do We Need Ethical Hacking
Protection from possible External Attacks
Social
Engineering
Automated
Organizational Attacks
Attacks
Restricted
Data
Accidental
Breaches in
Security Denial of
Viruses, Trojan Service (DoS)
Horses,
and Worms
Required Skills of an Ethical Hacker
Microsoft: skills in operation, configuration and management.
• To crack passwords, you need a cracking tool such as LC4, John the Ripper, or
pwdump.
Removing all traces from the log files and escaping without a trace.
The General Data Protection Regulation (GDPR)
The General Data Protection Regulation (GDPR) is legislation that updated and unified data
privacy laws across the European Union (EU). GDPR was approved by the European
Parliament on April 14, 2016 and went into effect on May 25, 2018. GDPR replaces the EU
Data Protection Directive of 1995.
Fair and Lawful Use, Transparency. The principle of this first clause is simple. ...
Specific for Intended Purpose. ...
Minimum Data Requirement. ...
Need for Accuracy. ...
Data Retention Time Limit. ...
The right to be forgotten. ...
Ensuring Data Security. ...
Accountability.
Understanding the Need to Hack Your Own Systems
Network-infrastructure attacks:
Connecting into a network through a rogue modem attached to
Working ethically: The word ethical in this context can be defined as working
with high professional morals and principles.
Respecting privacy: Treat the information you gather with the utmost respect. All
information you obtain during your testing — from Web-application log files to
clear-text passwords — must be kept private
Not crashing your systems: One of the biggest mistakes I’ve seen when people try
to hack their own systems is inadvertently crashing their systems. The main reason
for this is poor planning
The Ethical Hacking Process
Formulating your plan: Approval for ethical hacking is essential. Make what
you’re doing known and visible — at least to the decision makers. Obtaining
sponsorship of the project is the first step. This could be your manager, an
executive, a customer, or even yourself if you’re the boss. You need someone
to back you up and sign off on your plan. Otherwise, your testing may be
called off unexpectedly if someone claims they never authorized you to
perform the tests.
Ethical Hacking :
Ethical hacking — also known as penetration testing or white-hat
hacking — involves the same tools, tricks, and techniques that hackers
use, but with one major difference: Ethical hacking is legal. Ethical
hacking is performed with the target’s permission.
The objective of this policy is to safeguard both information and the infrastructure
in cyberspace.
It seeks to establish the capabilities needed to prevent and respond effectively to
cyber threats, as well as to minimize vulnerabilities and mitigate the impact of
cyber Incidents.
Information Technology (Guidelines for Intermediaries and Digital Media Ethics
Code) Rules, 2021
66C- For cheating by personation by using computer source: Imprisonment up to
three years and fine up to Rs 100,000.
66- Hacking a computer system with the intent or knowledge to cause wrongful
loss: Imprisonment up to three years, a fine up to Rs 200,000, or both.
43- Damage to computer, computer system, etc: Compensation up to Rs 1 crore to
the affected person.
Conclusion
In the preceding sections we saw the methodology of hacking,
why should we aware of hacking and some tools which a
hacker may use.
Now we can see what can we do against hacking or to protect
ourselves from hacking.
The first thing we should do is to keep ourselves updated
about those software’s we and using for official and reliable
sources.
Educate the employees and the users against black hat
hacking.
Advantages
1. Enhanced security: Hacking can help identify vulnerabilities in a system or
network that can be fixed to prevent malicious attacks by cybercriminals.
2. Improving systems: Ethical hacking can help organizations identify weaknesses in
their system and fix them, leading to improved security.
3. Protecting privacy: Hacking can uncover security flaws that may compromise user
privacy, and fixing these flaws can help protect user data.
Disadvantages
4. Illegal activities: Hacking is often associated with illegal activities that can result in
legal consequences.
5. Data breaches: Hacking can result in data breaches, which can lead to the exposure
of sensitive information or financial loss.
6. Ethical concerns: Hacking raises ethical concerns, particularly in cases where it
involves intruding into someone's privacy.
Future Enhancements
As it an evolving branch the scope of enhancement in
technology is immense.