Ethical Hacking


Chrisnoblet3

Uploaded on Nov 21, 2022

Category Business

PPT on Ethical Hacking

Category Business

Comments

                     

Ethical Hacking

Introduction  Hacking can be defined as to gain unauthorized access to any computer system and performing malicious activities.  Hacking done without permission is illegal whereas hacking done with permission comes under Ethical Hacking and is done to find out vulnerabilities in one’s computer system. Source: www.shiksha.com Unethical Hacking  Hacking of any system without permission or related activity is considered as serious cybercrimes and can lead a person to extreme consequences.  There are provisions of years of imprisonment to people found guilty of unethical hacking or any other cyber-crime. Source: www.shiksha.com What constitutes ethical hacking?  For hacking a computer system ethically, the hacker must obey the following rules:  Written permission to explore the network and attempt to identify potential security risks.  While performing hacking or related tasks, a hacker must respect the individual's or company's privacy. Source: www.shiksha.com What constitutes ethical hacking cont.  After completing his/her work, the hacker must not leave anything open for someone else to exploit it later.  Before starting the hacking, an ethical hacker must inform software developers or hardware manufacturers to know of any security vulnerabilities in their software or hardware. Source: www.shiksha.com Eligibility for Ethical Hacker  It is important to have a Bachelor’s degree (BSc, BTech, BE, BCA) in Information Technology or Computer Science to become an ethical hacker.  Candidates having an advanced diploma in network security can also opt for ethical hacking as a career.  A certification from a reputed institute enhances the chances of getting hired by some big names in the IT sector. Source: www.shiksha.com Ethical Hacker Salary  In the present scenario, a fresher Ethical Hacker can expect to get Rs 4.8 lakh per annum. However, candidates with higher academic qualifications and work experience draw up to Rs 30 lakh per year. Source: www.shiksha.com Role of a White Hat Hacker  Using port scanning tools like Nmap or Nessus to scan an organization’s systems and find open ports. The vulnerabilities with each of these ports can be studied and remedial measures can be taken.  Examining security patch installations and making sure that they can’t be exploited. Source: www.shiksha.com How Ethical Hacking Helps Cybersecurity  Ethical hacking is considered essential both for companies looking to safeguard their information and assets, and for governments looking to defend people and shared infrastructure from evildoers. Source: onlinedegrees.sandiego.edu Career Prospects  Growing cases of computer hacking have forced renowned companies, financial institutions, and government organizations to recruit ethical hackers.  Ethical hackers help these companies in finding out vulnerabilities and possible security leaks of their computer systems and also to protect them from any potential threat. So Ethical Hacking as a career has promising prospects in the near future. Source: www.shiksha.com Common Careers in Ethical Hacking  Common job titles within the field of ethical hacking include:  Penetration Tester  Vulnerability Assessor  Information Security Analyst  Security Analyst  Certified Ethical Hacker (CEH)  Ethical Hacker  Security Consultant  Security Engineer/Architect  Information Security Manager Source: onlinedegrees.sandiego.edu