Lecture with Hands on Session 1: Introduction to Ethical Hacking and Cyber Security

Mr.Pradeep G S and  Mr. Raghavendra Patil G E took the session on 01 September 2018, delivered a talk on the importance of Cryptography network security and Ethical Hacking.



                             



Session by Mr.Pradeep G S   

Topics Covered:

1. How to Install Kali Linux

2.  Introduction to Ethical Hacking and Cyber Security

3. Introduction to

• Types of Ethical Hacking

• Advantages of Ethical Hacking

• Vulnerabilities in Network Security

• Ethical Hacking Tools

• Kali Linux

 Date:01-September-2018









Ethical Hacking


Hacking is usually legal as long as it is being done to find weaknesses in a computer or network system for testing purpose. This sort of hacking is what we call Ethical Hacking.

Types of Hacking

We can segregate hacking into different categories, based on what is being hacked. Here is a set of examples −
  1. Website Hacking − Hacking a website means taking unauthorized control over a web server and its associated software such as databases and other interfaces.
  2. Network Hacking − Hacking a network means gathering information about a network by using tools like Telnet, NS lookup, Ping, Tracert, Netstat, etc. with the intent to harm the network system and hamper its operation.
  3. Email Hacking − It includes getting unauthorized access on an Email account and using it without taking the consent of its owner.
  4. Password Hacking − This is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
  5. Computer Hacking − This is the process of stealing computer ID and password by applying hacking methods and getting unauthorized access to a computer system.


Hacking is quite useful in the following scenarios −

1.To recover lost information, especially in case you lost your password.

2.To perform penetration testing to strengthen computer and network security.

3.To put adequate preventative measures in place to prevent security breaches.

4.To have a computer system that prevents malicious hackers from gaining access.


DIFFERENT TYPES OF HACKERS

  1. White hat hacker/Ethical hackerThese professionals hack computer systems to check the level of available security. They are the good guys and do not make use of their skills to destroy data or inject viruses.
  2. Black hat hackerThey are the bad guys who hack into systems with malicious intent. They like to cause damage to vulnerable data. Their work is illegal around the world.
  3. Grey hat hackerThey constitute of both white and black hat hackers. Their job is to provide national security.