Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

What is Ethical Hacking and Ethical Hackers?

No description
by

Ivan James Fermanejo

on 19 December 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of What is Ethical Hacking and Ethical Hackers?

What is Ethical Hacking and Ethical Hackers?
What is Ethical Hacking?
Penetration Testing
Intrusion Testing
Red Teaming
but commonly know as White Hat

Definition
hacking performed to help a company or individual identify potential threats on the computer or network.
What is Ethical Hacker?
a term that comes from old Western movies, where the "good guy" wore a white hat and the "bad guy" wore a black hat.
attempts to hack their way past the system security, finding any weak points in the security that could be exploited by other hackers.
In order for hacking to be deemed ethical, the hacker must obey the below rules.
1. You have permission to probe the network and attempt to identify potential security risks. It's recommended that if you are the person performing the tests that you get written consent.
Rules... Cont...
2. You respect the individual's or company's privacy and only go looking for security issues.

3. You report all security vulnerabilities you detect to the company, not leaving anything open for you or someone else to come in at a later time.
Rules... Cont...
4. You let the software developer or hardware manufacturer know of any security vulnerabilities you locate in their software or hardware if not already known by the company.
http://www.pcworld.com/article/250045/how_to_become_an_ethical_hacker.html
4. You let the software developer or hardware manufacturer know of any security vulnerabilities you locate in their software or hardware if not already known by the company.
Full transcript