Computer Security and Penetration Testing

Slides:



Advertisements
Similar presentations
ETHICAL HACKING.
Advertisements

Invitation to Computer Science 5th Edition
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Craig Rimando Luke White. “hacking” - negative connotation Not always that way Originally a compliment Not all hacking necessarily bad “Good” hacking?
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
Physical Security Logical/Computer Security What other examples?
Chapter 1 Ethical Hacking Overview. Who Am I?  Kevin Riley  Systems / Network Analyst Orange Coast College   Phone
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Prepared by: Nahed Al-Salah
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
Computers in Society Week 8: Computer Security and Hacking.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Hands-On Ethical Hacking and Network Defense
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Security Certification
DIYTP What is Cybercrime?  Using the Internet to commit a crime.  Identity Theft  Hacking  Viruses  Facilitation of traditional criminal activity.
Computer Hacking Cybercrime (1).
Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally.
By Carlos G. Coca.  Originally a person who was skilled at programming language who was able to create/alter web content.  Now: “A person who illegally.
ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
V1.3 Network+ Certification. CompTIA Network+ Certification Vendor Neutral Certification Fulfills the U.S. Department of Defense Directive Fulfills.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Introduction to Computer Ethics
PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD NUR’ ARINA ATIQAH BT ASRAR
By zeeShan Yaqoob. What’s the Internet? The Internet is built on a chaotic mishmash of hardware, governed by minimal standards and even fewer rules. Thousands.
Ethical Hacking
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa.
Hosted by Staffing Security Positions How To Choose The Right Personnel Jeffrey Posluns, CISA, CISSP, SSCP, CCNP, GSEC SecuritySage Inc.
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
Lecture 21 Computer Security Ethics
CJ416 Eric Salvador. Housekeeping Lets finish strong in Unit 9 discussions Alternative seminars Final submission of work – Tues. May 29 th at midnight.
Unit 9.  Lets finish strong in Unit 9 discussions  Alternative seminars  Final submission of work – Tuesday, October 9 th at midnight.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
Hacking by Tiffany Duff Computing in the Modern World Ms. Stewart.
Presents Ethical Hacking For Inplant Training / Internship, please download the "Inplant training registration form" from our website.
MVHS Career Night 2015 Information Security. Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning.
Presents Ethical Hacking 1 For Inplant Training / Internship, please download the "Inplant training registration form" from our.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
Computer and Network Security Brendan Duncombe Bahein Maung.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge.
Certified Ethical Hacker v8 Question Answer Eccouncil v8.
1 Figure 1-3: Attack Trends Growing Incident Frequency  Incidents reported to the Computer Emergency Response Team/Coordination Center  1997: 2,134.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
CITA 352 Chapter 1 Ethical Hacking Overview. Introduction to Ethical Hacking Ethical hackers –Hired by companies to perform penetration tests Penetration.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Seminar On Ethical Hacking Submitted To: Submitted By:
Presented by: Kevin Regaldo Phillip Dai
HACKING VS PENTESTING NURUL HAFIZAH HAZWNI BINTI HASHIM (MCS151019)
The Impact Of ICT “Hacking”
CertStore Solution is a platform of 100+ IT professionals and having 500+ IT/Security and Academic courses. Cert Store is the Gold and Accredited partner.
ECCouncil Exam Real Dumps - ECCouncil Exam 100% Passing Guarantee
Penetration Testing Computer Science and Software Engineering
Prepared By : Binay Tiwari
Computer Security Fundamentals
Chapter 5: Will Your Future Be in Cybersecurity?
Introduction to Cybercrime and Security
Presentation transcript:

Computer Security and Penetration Testing Chapter 1 Ethics of Hacking and Cracking

Objectives Understand how the act of unethical computer hacking is a crime Classify and identify groups and classes of hackers Distinguish the rationale for various types of hackers Computer Security and Penetration Testing

Objectives (continued) Understand and determine differences in information warfare Understand how computer hacking originated and its evolution Recognize the importance of ethical hacking and the issues involved in hacker ethics Computer Security and Penetration Testing

The Impact of Unethical Hacking Computer cracking Term for illegally hacking into a computer system without the permission of the system’s owner Despite the motivations of computer crackers Cracking a system is a crime Computer Security and Penetration Testing

Hacker Communities Two ways commonly used to categorize hackers White Hat good hackers vs. Black Hat bad hackers Based loosely on psychological profiling Computer Security and Penetration Testing

Hat Categories White Hat/Black Hat model White hats represent the “good guys” Black hats represent the “bad guys” Everything the good guys do is right, legal, and justified “Gray Hat” hackers Evidence that the dichotomy of good and evil is NOT a very good fit to the real world Computer Security and Penetration Testing

Hat Categories (continued) Computer Security and Penetration Testing

Hacker Profiling Hacking requires that the practitioner be intimately familiar with the techniques of the perpetrator Or opponent Reading and techniques used by both ethical and malicious hackers are identical Profile of a hacker is multifaceted Black Hat Briefings convention Highlights breaking security research submitted by leading corporate professionals, government experts, and members of the underground hacking community Computer Security and Penetration Testing

Computer Security and Penetration Testing

Hacker Motivations Curiosity Love of puzzles Desire for recognition or fame Revenge Financial gain Patriotism or politics Computer Security and Penetration Testing

Ethical Hacking Ethics are the principles of conduct that govern individuals, groups, and professions Without a published code of ethics, it is difficult to gain public trust for a profession Network security is emerging from a chaotic set of conflicting ethics Separating the ethical hacker from the unethical cracker Will allow security professionals to present the benefits of their profession Computer Security and Penetration Testing

Evolution of Hacking The modern concept of hacking began in the late 1950s Students at the Massachusetts Institute of Technology started using their access to the MIT mainframe To work on new languages First password hacks were a response to the Compatible Time Sharing System (CTSS) Developed in the early 1960s Computer Security and Penetration Testing

Evolution of Hacking (continued) In the 1970s phone phreaks used phreaking to access telephone networks To make free calls from payphones In the 1980s War dialers were developed to search for open modems Personal computer prices dropped and users became more common Hacker communities also grew Viruses, worms, and Trojans started appearing in 1988 Computer Security and Penetration Testing

Evolution of Hacking (continued) Antisocial actions of crackers and script kiddies made it difficult to defend the original concept of hacking “Computer hacker” describes computer experts with malicious intent Computer Security and Penetration Testing

Vendor-Neutral Security Certifications Security certificates and issuing bodies CompTIA Security+™ Certification Global Information Assurance Certification (GIAC), Security Administration Certifications ISC2 Certifications Associate of (ISC)2 SSCP Examination Computer Security and Penetration Testing

Vendor-Neutral Security Certifications (continued) Security certificates and issuing bodies (continued) CAP Examination CISSP Examination CISSP Concentrations EC-Council Certifications Computer Security and Penetration Testing

Vendor-Specific Security Certificates There are almost as many vendor-specific certificates as there are network vendors Cisco’s CCNA, and Microsoft’s MSCE Useful to newcomers to the network security industry Computer Security and Penetration Testing

What Needs to Be Secured Protection of data provided to organizations or stored on personal computers is a high priority Some crackers break into systems to utilize what they consider wasted computer energy Using bandwidth without permission may seem harmless But it is a crime, in addition to being unethical Many hackers find it tempting to copy, download, and use proprietary software and other copyrighted works Computer Security and Penetration Testing

What Needs to Be Secured (continued) Ethical Issues of Hacking Professional hackers have a responsibility to society Their activities should help to build and improve upon existing technology They should use their skills and interests as opportunities to learn and to teach Ethical hacker A security professional who applies his or her hacking skills for defensive purposes Computer Security and Penetration Testing

What Needs to Be Secured (continued) Ethical Hacking and System Security Some companies prefer to pay an ethical hacker to discover their systems’ weaknesses and security gaps Ethical hackers work to protect all areas of information technology Hackers must have experience in software engineering, network engineering, and system security Computer Security and Penetration Testing

Summary Computer cracking is illegally hacking into a computer system without the permission of the system’s owner Hackers are commonly thought of in two groups: White Hat and Black Hat Nine major profiles of hackers The techniques used by ethical and malicious hackers are similar Hackers may be motivated by curiosity, puzzles, fame, revenge, money, or patriotism Computer Security and Penetration Testing

Summary (continued) The modern concept of hacking began in the late 1950s While there are several vendor-neutral and vendor-specific certifications available to computer security professionals, there is no national certification standard Professional security experts, technologists, and hackers must develop a public code of ethics An ethical hacker is a security professional who applies hacking skills for defensive purposes Computer Security and Penetration Testing