PRESENTED BY : Bhupendra Singh

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Your Users, Friend or Foe? Matthew Sullivan IT Security Manager, the University of Canberra Creator, the Spam and Open Relay Blocking System (SORBS)
HACKING. Contents (1)  VARIOUS DEFINITIONS OF HACKING.  Who is hacker? (various definitions).  What does he do?.  Why does he do?  Who is a cracker?
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
Ethical Hacking Pratheeba Murugesan. HACKER AENDA  What is Ethical Hacking?  Who are ethical hackers?  Every Website-A Target  Get out of jail free.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
-Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application.
What is hacking? Taeho Oh
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Lecture 17 Introduction to Hacking. WHAT IS NETWORK SECURITY? Security is much larger than just packets, firewalls, and hackers. Security includes: –
Hands-On Ethical Hacking and Network Defense
SECURITY What does this word mean to you? The sum of all measures taken to prevent loss of any kind.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Chapter 7 HARDENING SERVERS.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
1 UNIX Postmortem Mark Henman. 2 Introduction For most system administrators, there is no question that at some point at least one of their systems is.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Web server security Dr Jim Briggs WEBP security1.
Factors to be taken into account when designing ICT Security Policies
1.0 Computer Lab Regulations 1.1 Computer Lab Rules 1.2 User 1.3 Equipment 1.4 Data and User Security.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
What does “secure” mean? Protecting Valuables
CPT 123 Internet Skills Class Notes Internet Security Session A.
Computer security By Shreya Houji. VirusesViruses.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
AASSA Conference 2012 Quito, Ecuador March 16 th 2012 All the rights reserved.Instructor: Francisco Bolaños, Ing. InterAmerican Academy Ethical Hacking.
INTERNET: The Good, The Bad and The Ugly
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
Chapter 2 Securing Network Server and User Workstations.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
MIS 7003 MIS Core Course The MBA Program The University of Tulsa Professor: Akhilesh Bajaj Security: Personal & Business © Akhilesh Bajaj 2004,2005, 2007,
5/18/2006 Department of Technology Services Security Architecture.
KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
CONTROLLING INFORMATION SYSTEMS
Computer Security By Duncan Hall.
Ethical Hacking Keith Brooks CIO and Director of Services
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
PREPARED BY : Harsh patel dhruv patel sreejit sundaram.
Windows Administration How to protect your computer.
Web Server Security: Protecting Your Pages NOAA OAR WebShop 2001 August 2 nd, 2001 Jeremy Warren.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Securing Interconnect Networks By: Bryan Roberts.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Seminar On Ethical Hacking Submitted To: Submitted By:
Computer Security and Ethical Hacking
Working at a Small-to-Medium Business or ISP – Chapter 8
I S P S loss Prevention.
HACKING.
Year 10 ICT ECDL/ICDL IT Security.
I have many checklists: how do I get started with cyber security?
Information Security Awareness
Ethical Hacking.
Test 3 review FTP & Cybersecurity
6. Application Software Security
Presentation transcript:

PRESENTED BY : Bhupendra Singh ETHICAL HACKING PRESENTED BY : Bhupendra Singh

Contents – Ethical Hacking Types of Hacking Why do Hackers Hack? Ethical Hacking? Who are Ethical Hacker? Why Ethical Hacking? Conclusion?

HACKING What Hack actually mean??? 2)Examine something very minutely Hack definition: 1) an article or project without constructive end 2)Examine something very minutely

S-Server H-Hacker U-User Types of hacking Normal data transfer U S S-Server H-Hacker U-User Interruption Interception U S U S H Modification Fabrication U S U S H H

Why do hackers hack? Just for fun Show off To know others secrets Steal important information Destroy enemy’s computer network during the war

ETHICAL HACKING It is Legal Permission is obtained from the target user Part of an overall security program Learn about the system and trying to find its weaknesses.

Who are Ethical Hackers??? Completely trustworthy. Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner Black-hat – Hacker White-hat – Ethical Hackers

Why Ethical Hacking???

Why Ethical Hacking?? Defacement Statistics for Indian Websites 1131 June 01, 2006 to Dec.31, 2006 Domains No of Defacements .com 922 .gov.in 24 .org 53 .net 39 .biz 12 .co.in 48 .ac.in 13 .info 3 .nic.in 2 .edu other Total 1131

Why can’t we be protect against hacking? There are many unknown security hole Hackers need to know only one security hole to hack the system Admin need to know all security holes to defend the system

How Ethical Hackers defend??? Harden the servers Scan, test and apply patches Monitor logs Train the technical staff on security Serious policy and procedures!

How to prevent Hacking??? Encrypt important data Ex) confidential data Do not run unknown programs Setup firewall Ex) ipchains , antivirus Backup the system often

What to do after being hacked? Shutdown the system Or turn off the system Separate the system from network Restore the system with the backup Or reinstall all programs Connect the system to the network It can be good to call the police

Conclusions Always security professionals are one step behind the hackers and crackers. Plan for the unplanned attacks. The role of ethical hacking in security is to provide customers with awareness of how they could be attacked and why they are targeted. “Security though a pain”, is necessary.

ANY QUERIES??

THANK YOU