Ethical Hacking
Ethical Hacking
N
Roll no :12202080701091
Class :4IT2
Batch :C
CONTENT
• INTRODUCTION
• HISTORY OF ETHICAL HACKING
• PURPOSE OF ETHICAL HACKING
• TYPES OF HACKERS
• ETHICAL HACKING PROCESS
• COMMON HACKING TECHNIQUES
• WHAT SHOULD WE DO IF HACKED
• IMPORTANCE OF ETHICAL HACKING
• CONCLUSION
INTRODUCTION
1. Identifying Vulnerabilities
4. Security Awareness
TYPES OF HACKERS
2. Scanning:
1. Phishing:
• Description: Phishing involves tricking users into divulging sensitive
information such as login credentials, financial data, or personal details by
impersonating legitimate entities via email, phone calls, or other
communication channels.
2. Social Engineering:
Description: Social engineering manipulates individuals into performing
actions or divulging confidential information through psychological
manipulation, deception, or coercion.
use.
• Now we can see what we can do against hacking or to protect
ourselves from hacking.
• The first thing we should do is to keep ourselves updated about those
software’s we are using for official and reliable sources.
• Educate the employees and the users against black hat hacking.
THANK YOU