Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.

Slides:



Advertisements
Similar presentations
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Advertisements

1.8 Malpractice and Crime In this section you must be able to: Explain the consequences of malpractice and crime on information systems. Describe the possible.
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
Protection from Internet Theft By James Seegars. What Is Hacking? Definition – A)To change or alter(Computer Program) – B) To gain access to (a computer.
Chapter 1 Ethical Hacking Overview. Who Am I?  Kevin Riley  Systems / Network Analyst Orange Coast College   Phone
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Computer Security and Penetration Testing
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
 ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.
Security, Privacy, and Ethics Online Computer Crimes.
Ethical Hacking by Shivam.
Hands-On Ethical Hacking and Network Defense
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.
Issues Raised by ICT.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
IT security By Tilly Gerlack.
Ethical Hacking Defeating Wireless Security. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
Nata Raju Gurrapu Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips.
Topic : Malicious Software Written By :Kaveh Maroufi December.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
First Look at Security and Privacy Jeremiah Burleson.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
Presents Ethical Hacking For Inplant Training / Internship, please download the "Inplant training registration form" from our website.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Ethical Hacking: Defeating Logon Passwords. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
Presents Ethical Hacking 1 For Inplant Training / Internship, please download the "Inplant training registration form" from our.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
Last revised A.A. Degree CNIT 120: Network Security Fundamentals of Network Security Preparation for Security+ Certification Essential for.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
1 Figure 1-3: Attack Trends Growing Incident Frequency  Incidents reported to the Computer Emergency Response Team/Coordination Center  1997: 2,134.
By Collin Donaldson Man in the Middle Attack: Password Sniffing and Cracking.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
CITA 352 Chapter 1 Ethical Hacking Overview. Introduction to Ethical Hacking Ethical hackers –Hired by companies to perform penetration tests Penetration.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Seminar On Ethical Hacking Submitted To: Submitted By:
Ethical Hacking By: Erin Noonan.
Ethical Hacking: Hacking GMail
The Impact Of ICT “Hacking”
ECCouncil Exam Real Dumps - ECCouncil Exam 100% Passing Guarantee
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
The Art of Deception.
Hands-On Ethical Hacking and Network Defense
Penetration Testing Computer Science and Software Engineering
Chapter 13 Security and Ethical Challenges.
Introduction to Cybercrime and Security
Ethical Hacking.
Presentation transcript:

Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006

Contact Information Sam Bowne Website: samsclass.info All materials from this talk are already on that website Download them and use them freely Hands-On Ethical Hacking and Network Defense2

3 Isn’t Hacking a Crime?

4 Introduction to Ethical Hacking Ethical hackers –Employed by companies to perform penetration tests Penetration test –Legal attempt to break into a company’s network to find its weakest link –Tester only reports findings, does not harm the company

5 The Role of Security and Penetration Testers Hackers –Access computer system or network without authorization –Breaks the law; can go to prison Crackers –Break into systems to steal or destroy data –U.S. Department of Justice calls both hackers Ethical hacker –Performs most of the same activities but with owner’s permission

6 The Role of Security and Penetration Testers (continued) Script kiddies or packet monkeys –Young inexperienced hackers –Copy codes and techniques from knowledgeable hackers Experienced penetration testers use Perl, C, Assembler, or other languages to code exploits

Security Credentials CompTIA offers Security+ certification, a basic familiarity with security concepts and terms 7

8 OSSTMM Professional Security Tester (OPST) Designated by the Institute for Security and Open Methodologies (ISECOM) Based on the Open Source Security Testing Methodology Manual (OSSTMM) –Written by Peter Herzog

9 Certified Information Systems Security Professional (CISSP) Issued by the International Information Systems Security Certifications Consortium (ISC 2 ) Usually more concerned with policies and procedures than technical details Web site –

10 Certified Ethical Hacker (CEH) But see Run Away From The CEH Certification –Link at samsclass.info

11 What You Cannot Do Legally Accessing a computer without permission is illegal Other illegal actions –Installing worms or viruses –Denial of Service attacks –Denying users access to network resources Possession of others’ passwords can be a crime –See Password theft Link at samsclass.info

12 Get Out of Jail Free Card When doing a penetration test, have a written contract giving you permission to attack the network Using a contract is just good business Contracts may be useful in court Have an attorney read over your contract before sending or signing it

Projects Project 1: Using a Keylogger to record keystrokes (including passwords) Project 2: Using The Metasploit Framework to take over a vulnerable computer remotely Demonstration: Using Ophcrack to crack Windows passwords with Rainbow tables 13