Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

1.8 Malpractice and Crime In this section you must be able to: Explain the consequences of malpractice and crime on information systems. Describe the possible.
Assessments, Audits, and Penetration Tests, Oh My Ira Winkler, CISSP
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
Protection from Internet Theft By James Seegars. What Is Hacking? Definition – A)To change or alter(Computer Program) – B) To gain access to (a computer.
Ethical Hacking Pratheeba Murugesan. HACKER AENDA  What is Ethical Hacking?  Who are ethical hackers?  Every Website-A Target  Get out of jail free.
Penetration Testing Anand Sudula, CISA,CISSP SSA Global Technologies, India Anand Sudula, CISA,CISSP SSA Global Technologies, India.
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
Network Vulnerability Scanning Xiaozhen Xue Dept. of Computer Science Texas Tech University, USA Akbar Siami Namin Dept. of Computer.
Vulnerability Assessment & Penetration Testing By: Michael Lassiter Jr.
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
Sam Cook April 18, Overview What is penetration testing? Performing a penetration test Styles of penetration testing Tools of the trade.
ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.
PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD NUR’ ARINA ATIQAH BT ASRAR
Information Security. Survey Results Question What do you think Information Security is?
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
AASSA Conference 2012 Quito, Ecuador March 16 th 2012 All the rights reserved.Instructor: Francisco Bolaños, Ing. InterAmerican Academy Ethical Hacking.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Introduction to Security Dr. John P. Abraham Professor UTPA.
Computer Security By Duncan Hall.
The Art of Deception: Controlling the Human Element of Security by Kevin D. Mitnick, William L. Simon, Steve Wozniak Kevin D. MitnickWilliam L. SimonSteve.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Exploitation Development and Implementation PRESENTER: BRADLEY GREEN.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Vulnerability Analysis Dr. X. Computer system Design Implementation Maintenance Operation.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
7 Tips To Improve Your Website Security. Introduction Use of Content management systems like WordPress, Joomla & Drupal, utilization of various tools,
Defining your requirements for a successful security (and compliance
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
CYBERSECURITY SOLUTIONS
Seminar On Ethical Hacking Submitted To: Submitted By:
Edexcel GCSE Cyber security threats Computer Science 1CP1
3.6 Fundamentals of cyber security
Ethical Hacking By: Erin Noonan.
Big Picture Consider this How many online threats might you be faced with a day?
Systems Security Keywords Protecting Systems
Secure Software Confidentiality Integrity Data Security Authentication
Compliance with hardening standards
Some Methods Phishing Database & Password Exploits Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch.
Homeland Security: Computer Protection
Hackers and Crackers iJacsn.
The Impact Of ICT “Hacking”
Answer the questions to reveal the blocks and guess the picture.
NEED OF JAILBREAKING IN IOS PENETRATION TESTING
Teaching Computing to GCSE
John Butters Running Tiger Teams
Little work is accurate
Unit 1.6 Systems security Lesson 3
Risk of the Internet At Home
Topic 5: Communication and the Internet
Penetration Testing Computer Science and Software Engineering
Unit 1.6 Systems security Lesson 2
Security Essentials for Small Businesses
Brute force attacks, DDOS, Botnet, Exploit, SQL injection
Ethical Hacking.
Intrusion.
WJEC GCSE Computer Science
Stop Ignoring the Problem
Code vulnerabilities Vulnerabilities are mistakes, errors or weaknesses in a piece of software’s source code that can be directly used by a hacker to perform.
social Engineering and its importance during Security Audits
IP Addresses & Ports IP Addresses – identify a device on a network
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious – they are actually hacking to help companies secure their network. Companies will hire ethical hackers to help them secure the network/computer systems, by understanding their current weaknesses.

Examples of Ethical Hacking Ethical hackers perform both behavioural (social engineering) and technical attacks on computer systems and networks. An ethical hacker may employ social engineering techniques like shoulder surfing to gain access to crucial information. An ethical hacker may also perform technical work such as examining software patches and penetration testing. Ethical hackers therefore help companies in improving their security by giving advice and recommendations on their current network security.

Video – Penetration Testing https://www.youtube.com/watch?v=l6rf5JdtLzQ&list=PLCiOXwirraUBxNcIyeIHIxsYiv9KokURp&index=5

“Pen Testing” / Penetration Testing Penetration testing (sometimes called pen test) is used by organisations to assess the security of their computer systems, networks and websites. During the test, a simulated attack takes place, specifically looking for vulnerabilities and exploits that might allow criminals access to the system. The important thing to understand is that penetration tests are authorised by the company. The aim is to identify weaknesses so that they can be fixed.

Specific Roles of the Pen Tester A pen tester will use a range of commercial analysis tools to help him locate vulnerabilities. These tools will search for common vulnerabilities (weak passwords, configuration problems, software that hasn’t been updated, etc.) and produce some kind of report. This report could be used to help fix security problem and grades companies on their current risk of a data breach.