Presentation is loading. Please wait.

Presentation is loading. Please wait.

PRESENTED BY : Bhupendra Singh

Similar presentations


Presentation on theme: "PRESENTED BY : Bhupendra Singh"— Presentation transcript:

1 PRESENTED BY : Bhupendra Singh
ETHICAL HACKING PRESENTED BY : Bhupendra Singh

2 Contents – Ethical Hacking
Types of Hacking Why do Hackers Hack? Ethical Hacking? Who are Ethical Hacker? Why Ethical Hacking? Conclusion?

3 HACKING What Hack actually mean??? 2)Examine something very minutely
Hack definition: 1) an article or project without constructive end 2)Examine something very minutely

4 S-Server H-Hacker U-User
Types of hacking Normal data transfer U S S-Server H-Hacker U-User Interruption Interception U S U S H Modification Fabrication U S U S H H

5 Why do hackers hack? Just for fun Show off To know others secrets
Steal important information Destroy enemy’s computer network during the war

6 ETHICAL HACKING It is Legal
Permission is obtained from the target user Part of an overall security program Learn about the system and trying to find its weaknesses.

7 Who are Ethical Hackers???
Completely trustworthy. Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner Black-hat – Hacker White-hat – Ethical Hackers

8 Why Ethical Hacking???

9 Why Ethical Hacking?? Defacement Statistics for Indian Websites 1131
June 01, to Dec.31, 2006 Domains No of Defacements .com 922 .gov.in 24 .org 53 .net 39 .biz 12 .co.in 48 .ac.in 13 .info 3 .nic.in 2 .edu other Total 1131

10 Why can’t we be protect against hacking?
There are many unknown security hole Hackers need to know only one security hole to hack the system Admin need to know all security holes to defend the system

11 How Ethical Hackers defend???
Harden the servers Scan, test and apply patches Monitor logs Train the technical staff on security Serious policy and procedures!

12 How to prevent Hacking??? Encrypt important data
Ex) confidential data Do not run unknown programs Setup firewall Ex) ipchains , antivirus Backup the system often

13 What to do after being hacked?
Shutdown the system Or turn off the system Separate the system from network Restore the system with the backup Or reinstall all programs Connect the system to the network It can be good to call the police

14 Conclusions Always security professionals are one step behind the hackers and crackers. Plan for the unplanned attacks. The role of ethical hacking in security is to provide customers with awareness of how they could be attacked and why they are targeted. “Security though a pain”, is necessary.

15 ANY QUERIES??

16 THANK YOU


Download ppt "PRESENTED BY : Bhupendra Singh"

Similar presentations


Ads by Google