2

Click here to load reader

Ethical hacking front page

Embed Size (px)

DESCRIPTION

Ethical hacking also known as penetration testing or white-hat hacking, involves the same tools, tricks, and techniques that hackers use, but with one major difference that Ethical hacking is legal. Ethical hacking is performed with the target’s permission. The intent of ethical hacking is to discover vulnerabilities from a hacker’s viewpoint so systems can be better secured. Its part of an overall information risk management program that allows for ongoing security improvements. Ethical hacking can also ensure that vendors’ claims about the security of their products are legitimate.

Citation preview

Page 1: Ethical hacking   front page

ETHICAL HACKING

SEMINAR REPORT

SUBMITTED BY: Nitheesh.A

Remil C.V

Salu Thomas

3rd semester GNIIT Students

Page 2: Ethical hacking   front page

CONTENT

PAGE

INTRODUCTION 1-2

HACKING 2

TYPES OF HACKERS 2-4

ETHICAL HACKING 4-6

HISTORY HIGHLIGHTS 6

ETHICAL HACKING COMMANDMENTS 6-7

METHODOLOGY OF HACKING 7-14

REPORTING 15

ADVANTAGES AND DISADVANTAGES 15-16

CONCLUSION 16-17

REFERENCE 18