Ethical Hacking Presentation on post graduation level

kashikasri1114 12 views 10 slides Sep 09, 2024
Slide 1
Slide 1 of 10
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10

About This Presentation

presentation on ethical hacking


Slide Content

Ethical Hacking TEAM MEMBERS : PALLAVI DHAR – 113 KASHIKA SRIVASTAVA – 81 MEGHA SINHA – 99 MUSKAN MACHALE – 104 KAUSHAL JHA - 77

01 INTRODUCTION IMPORTANCE TYPES OF HACKER 02 03 04 05 06 OTHER TYPES OF HACKER STEPS OF ETHICAL HACKING CONCLUSION CONTENTS :

WHAT IS ETHICAL HACKING : computer experts, use their skills to find and fix security weaknesses in computer systems, networks, and software. HELPS FOR – Authorized Access Protecting Systems Legal and Responsible Preventing Cyber Attacks Continuous Improvement

IMPORTANCE OF ETHICAL HACKING : Identifying Vulnerabilities Risk Mitigation Compliance Requirements Enhancing Incident Response Protecting Sensitive Data Building Customer Trust Continuous Improvement Educating Staff Preventing Financial Losses SECURITY COMPANY

HACKER TYPES OF HACKER : HACKER GREY HAT BLACK HAT WHITE HAT

SOME MORE TYPES OF HACKER - 1. RED HAT HACKER 2. BLUE HAT HACKER 3. GREEN HAT HACKER 4. HACKTIVISTS

STEPS IN ETHICAL HACKING : 1. RECONNAISSANCE 2. SCANNING 4. MAINTAINING ACCESS 3. GAINING ACCESS 5. COVERING TRACKS

CASE STUDY / CONCLUSION In 2017, Zomato , a prominent online restaurant guide and food ordering app, fell victim to a significant security breach orchestrated by a hacker. The breach compromised sensitive user data, including names, emails, numeric user IDs, usernames, and passwords, affecting millions of users. The hacker proceeded to offer this data for sale on the darknet, sparking concerns about cybersecurity in India. Following public exposure, Zomato addressed the breach through blog posts, attributing the discovery to an ethical hacker aiming to highlight national cybersecurity vulnerabilities. This incident underscores the critical importance of robust cybersecurity measures for safeguarding user information and maintaining public trust in online platforms .

THANK YOU !!
Tags