Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Craig Rimando Luke White. “hacking” - negative connotation Not always that way Originally a compliment Not all hacking necessarily bad “Good” hacking?
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
Introduction to Ethical Hacking, Ethics, and Legality.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Chap 1: Overview Concepts of CIA: confidentiality, integrity, and availability Confidentiality: concealment of information –The need arises from sensitive.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background.
The Uses of White Hat Hacking Tyler Schumacher
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
Penetration Testing Anand Sudula, CISA,CISSP SSA Global Technologies, India Anand Sudula, CISA,CISSP SSA Global Technologies, India.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Hands-On Ethical Hacking and Network Defense
Information System Security Engineering and Management Additional slides for INFORMATION SECURITY RISK MANAGEMENT Dr. William Hery
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Vulnerability Assessment & Penetration Testing By: Michael Lassiter Jr.
Web Application Testing with AppScan Terry Labach.
ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
ISE Confidential - not for distribution THE EVOLVING THREAT LANDSCAPE: ADVANCING ENTERPRISE SECURITY 11 December 2013.
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
CSCE 4561 Ethical Hacking and Whistle Blowing A Hypothetical Case Study By Barret Miller.
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
1 Introduction and Definitions. 2 Purpose of the Course This course is designed to provide students with hands on experience on identifying places where.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
South Wales Cyber Security Cluster A networking group with a purpose Membership Open to anyone with an interest in Cyber Security.
Conduct A Strong Evaluation Soar to New Heights! 2013 National Equipment Finance Summit, Albuquerque, NM.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning.
Ethics CSE 591 – Security and Vulnerability Analysis Spring 2015 Adam Doupé Arizona State University
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
Theoretical and practical training for setup of a business on the basis of cleaning services CO-OPERATION PHASE 1 CO-OPERATION PHASE 2 Theoretical and.
BS in Computer and Information Systems Security A 2+2 degree program between Peninsula College and Western Washington University David Bover Professor,
Smart City Hacked??? Technology & Society. American cities vulnerable to large-scale cyber attack
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Security Risk Analysis Dr. Lo’ai Tawalbeh Prepared for: The Arab Academy for Business and Financial Sciences (AABFS)-2007.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
Black + White = Grey Ethical Issues Surrounding the Creation and Distribution of Hacker Tools Used in Distributed Denial of Service Attacks Joseph Levine.
Objectives Who I Am The Company I Interned With The Projects I Worked On Project Details How The Experience Relates To My Education Conclusions Drawn.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
CITA 352 Chapter 1 Ethical Hacking Overview. Introduction to Ethical Hacking Ethical hackers –Hired by companies to perform penetration tests Penetration.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Defining your requirements for a successful security (and compliance
Seminar On Ethical Hacking Submitted To: Submitted By:
312-50v9: Certified Ethical Hacker Exam V9
CompTIA Security+ Study Guide (SY0-401)
HACKING VS PENTESTING NURUL HAFIZAH HAZWNI BINTI HASHIM (MCS151019)
Ethics CSE 591 – Security and Vulnerability Analysis Spring 2017
Ethical hacking
ECCouncil Exam Real Dumps - ECCouncil Exam 100% Passing Guarantee
Penetration Testing Computer Science and Software Engineering
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
National Cyber Security
Chapter 13 Security and Ethical Challenges.
Ethics CSE 545 – Software Security Spring 2018 Adam Doupé
Chapter 5: Will Your Future Be in Cybersecurity?
Privacy Policy the Law….
Network Traffic and Cybersecurity
Chris Romano Andrew Shepardson IA 456
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Professional Services END TO END NETWORK SECURITY SOLUTION
Presentation transcript:

Ethical Hacking Introduction

 What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills of the hacker Overview

Ethical What is it? Hacking

 Art and Science of  Understanding and determining  vulnerabilities inside  the information infrastructure Art and Science of understanding and determining vulnerabilities inside the information infrastructure

Ethical Types of Ethical Hacking Hacking

Types BLACK BOX GREY BOX WHITE BOX Knowledge of information infrastructure

Ethical Responsibilities of Ethical Hacker Hacking

Responsibilities Use your knowledge & tools only for legal purposes. Only hack to identify security issues with goal of defense. Get management approvals.

Ethical Customer Expectations Hacking

Customer Expectations Define Goals and expectations Confidentiality Who owns the resultant data- the company Full disclosures

Ethical Hacker’s skills Hacking

Hacker’s skills Network/Systems Administrator Security expertiseExtensive Knowledge

Ethical Laws and Preparation Hacking

Preparation Get signed approvals for all test Sign confidentiality agreements (NDA) Get approval from collateral parties Put together teams and tools Define Goals

Ethical Types of Attacks Hacking

Types of Attacks Full Penetration Denial of Service Specific Information ( theft or disclosure) Social Engineering