Ethical Hacking.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
ETHICAL HACKING.
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Ethical Hacking Pratheeba Murugesan. HACKER AENDA  What is Ethical Hacking?  Who are ethical hackers?  Every Website-A Target  Get out of jail free.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Prepared by: Nahed Al-Salah
The Uses of White Hat Hacking Tyler Schumacher
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
HACKER NOT CRACKER. HACKER IS  A person who enjoys exploring the details of programmable systems and how to stretch their capabilities  Most often programmers.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Ethical Hacking by Shivam.
Hands-On Ethical Hacking and Network Defense
Week 1-1 CSc 196n Computer Attacks & Countermeasures 1.Aka Ethical Hacking 2.How to successfully defend against attacks Know your enemy How they think.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Presenter Deddie Tjahjono.  Introduction  Website Application Layer  Why Web Application Security  Web Apps Security Scanner  About  Feature  How.
ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
INTRUDERS BY VISHAKHA RAUT TE COMP OUTLINE INTRODUCTION TYPES OF INTRUDERS INTRUDER BEHAVIOR PATTERNS INTRUSION TECHNIQUES QUESTIONS ON INTRUDERS.
Name:Neha Madgaonkar Roll no:  What are intruders?  Types  Behavior  Techniques.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Topic 5: Basic Security.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Computer Security By Duncan Hall.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Safe’n’Sec IT security solutions for enterprises of any size.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
PREPARED BY : Harsh patel dhruv patel sreejit sundaram.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
PRESENTED BY : Bhupendra Singh
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Technical Implementation: Security Risks
Seminar On Ethical Hacking Submitted To: Submitted By:
COMPUTER CRIMES Presented by THABO.
Ethical Hacking By: Erin Noonan.
Common Methods Used to Commit Computer Crimes
cybercrime Presented to you by : NAMES MATRIC NO
Chapter 11 crime and security in the networked economy
Answer the questions to reveal the blocks and guess the picture.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Forensics Week 11.
Security in Networking
The Art of Deception.
Computer Crime and Security Measures
Penetration Testing Computer Science and Software Engineering
Unit 6 Digital Literacy Study S3 Obj 2-2
Unit 6 Digital Literacy Study S3 Obj 2-2
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Chapter # 3 COMPUTER AND INTERNET CRIME
Intrusion.
Introduction to Computer Ethics
Presentation transcript:

Ethical Hacking

HACKER

AENDA What is Ethical Hacking? Who are ethical hackers? Every Website-A Target Get out of jail free card Kinds of Testing Final Report

Ethical Hacking Independent computer security Professionals breaking into the computer systems. Neither damage the target systems nor steal information. Evaluate target systems security and report back to owners about the vulnerabilities found.

Ethical Hackers but not Criminal Hackers Completely trustworthy. Strong programming and computer networking skills. Learn about the system and trying to find its weaknesses. Techniques of Criminal hackers-Detection-Prevention. Published research papers or released security software. No Ex-hackers.

Being Prepared What can an intruder see on the target systems? What can an intruder do with that information? Does anyone at the target notice the intruder's attempts or successes? What are you trying to protect? Who are you trying to protect against? How much time, effort, and money are you willing to expend to obtain adequate protection?

Get out of Jail free card Security evaluation plan Identify system to be tested How to test? Limitations on that testing Evaluation done under a “no-holds-barred” approach. Clients should be aware of risks. Limit prior knowledge of test.

Kinds of Testing Remote Network Remote dial-up network Local network Stolen laptop computer Social engineering Physical entry 1.Total outsider 2.Semi-outsider 3.Valid user

Final Report Collection of all discoveries made during evaluation. Specific advice on how to close the vulnerabilities. Testers techniques never revealed. Delivered directly to an officer of the client organization in hard-copy form. Steps to be followed by clients in future.

Suggestions?