Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Copy of Hacking

No description
by

Najy Fannoun

on 8 February 2016

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Copy of Hacking


Considered "Ethical"
Good guys

Hacking
Ethical
M
eqdad
D
arwish
N
ajy
F
announ (
t
amimi )
M
ohammad Abu-arqoup

فاشىن غخع

Thank you
Any Question ?
Hacking
:
Entering a network or PC without authorization.
Ethical Hacking
:
Hacking for a "good cause ".

Hacker
:
The person who hacks .

HACKING DEFINITION
Some Types of Hacking:
Don’t use their skill for illegal purpose
Use their skill maliciously for personal gain

Considered "Un ethical"
Bad guys



It is a combination of
White & Black
Hackers
Advantages of hacking

Can be used to recover lost.


To test how good security is
on your own network.


New jobs
.

Disadvantages of hacking
Cyberbullying .

Financial losses and
banking details to be seen
(hacked) .

destroyed software’s .

Ethical theories Evaluation:
Subjective Relativism
Cultural Relativism
Kantianism
Act Utilitarianism
Rule Utilitarianism
Social Contract Theory
Each person decides what
is wrong or right .

No universal right or wrong
based on society moral
guidelines .
morals vary between societies.

Grey Hat

Black Hat
White Hat
opinions ..
Divin command theory
Based on drections from God .
Actions should be guided by moral rules
laws are universal
Besed on reason
Explain why right or wrong
An action is good if benefits someone and bad if it harms someone .
Does not exmine motivates .
Consequentialist theory .
Evaluate by looking for the increasing in total happiness
Based on universal moral rules .
rules can be derived through a rational process .
C|EH :
https://www.eccouncil.org/
https://iclass.eccouncil.org/?p=719
Ethical Hacker :
https://searchsecurity.techtarget.com/
To be safe : visit & download from :
https://pegasusvpn.com/en/

The Certified Ethical Hacker
(CEH)
program is the core of the most desired information security training system any information security professional will ever want to be in .

The newest version: v9

C
ertified
E
thical
H
acker
C|EH
How ?
- Supervision by EC-Council .
- Course details .
- Duration .
- Exam .
Full transcript