Founder: CyberCure Technologies Pvt. Ltd. FreeLancer: Cybercrime Investigation Guest Lecturer: in more than 300 Engineering College Sangeet Chopra.

Slides:



Advertisements
Similar presentations
The flexibility is one of the most important aspects. Students can work at their own pace, receive immediate feedback and get a nationally recognised.
Advertisements

Cyber Time For Second Grade Personal Information  Never give out your full name.  Never give out your address while on the internet.  Never give out.
UNIT 20 The ex-hacker.
Craig Rimando Luke White. “hacking” - negative connotation Not always that way Originally a compliment Not all hacking necessarily bad “Good” hacking?
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
1Balaji.S. 2 COMPUTER NETWORK AND SECURITY 3Balaji.S.
INTERNET SAFETY FOR STUDENTS
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
The Uses of White Hat Hacking Tyler Schumacher
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
Hacking And Cracking ICT Project.
1 UNIT 20 The ex-hacker Lecturer: Ghadah Aldehim.
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
 The hackers is a persons that they have a many knowledge in the area of ​​ computer and are capable of deceive the security.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
DIYTP What is Cybercrime?  Using the Internet to commit a crime.  Identity Theft  Hacking  Viruses  Facilitation of traditional criminal activity.
ETHICS IN COMPUTER SCIENCE Hacking and identity theft.
Computer Hacking Cybercrime (1).
My Hobby is Gaming By: Anthony Lupi World of Warcraft The Elder Scrolls V: Skyrim Team Fortress 2 How I got started How long have you been doing it and.
Hacking Phishing Passwords Sourendu Gupta (TIFR).
Social Informatics (8571) Review on literature review “Why Computer Talents Become Computer Hackers” By Billy Lu Leo Li.
Question: Future Sessions AI and Military (UAS) Virtual Worlds Privacy and NSA Free Software Movement.
Automated SW testing Lukáš Miňo
PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD NUR’ ARINA ATIQAH BT ASRAR
Varun Sharma Application Consulting and Engineering (ACE) Team, Microsoft India.
ALL ABOUT ME By:Dawngi,van. THINGS I LIKE TO DO I like to swim, play outside, play with my friends, and be with my family.
International Certification Services Pvt Ltd.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
Introduction to Computer Security PA Turnpike Commission.
Name:Neha Madgaonkar Roll no:  What are intruders?  Types  Behavior  Techniques.
Security+ Brian E. Brzezicki. About Me Instructor Brian E. Brzezicki Bachelor of Science, Computer.
Format of a Covering Letter
 Introduction to Computing  Computer Programming  Terrorisom.
Electronic Commerce By: Shannon McManus. Background  The process of buying, selling, or exchanging products through a computer.  Transactions are usually.
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
Presidio Bank Business Online Banking Security Overview.
Presented by Ronni Rosewicz.  To learn the basics of Social Thinking  To learn practical strategies and common vocabulary to help your child be more.
ONLINE RISKS FOR TEENS MRS. WISCOUNT. DO YOU KNOW WHO YOU ARE TALKING TO? design-a-seo-blog?start=55
MORE MONEY FOR CYBER- SECURITY?. CYBER SECURITY: A TICKING TIME BOMB? Richie Sabu G/T Independent Research Howard High School Mr. Brian Price, Advisor.
Chapter 15 Science and Technology The Global Context: the Technological Revolution Sociological Theories of Science and Technology.
The Six Thinking Hats Edward de Bono. Six Coloured Hats “Put on your thinking cap” “I am wearing my parent hat” Six hats to put on or take off: –White-Yellow.
City of London 1 Understanding Cybercrime Risk 21 April 2016 Chris Keesing.
Wegilant Net Solutions Pvt. Ltd. An Introduction …An IIT Bombay Student’s Initiative.
Logan Wojcik COSC 101. Overview ~ Both are hackers ~White hats help computer systems become more secure ~Black hats attack and exploit breaches in systems.
Ethical #Hacking. Ethical Hacking !! Content !! * Overview of Ethical Hacking * Prospectus of Ethical Hacking * Evaluation of Ethical Hacking * Training.
INTERNET SAFETY How to Keep Yourself Safe Online.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
1 Figure 1-3: Attack Trends Growing Incident Frequency  Incidents reported to the Computer Emergency Response Team/Coordination Center  1997: 2,134.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Wegilant – An Introduction. Wegilant Net Solutions Pvt. Ltd., Mumbai Who we are? Wegilant is a youthful initiative of IIT Bombay’s Student & IIM Alumnus.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Firmware threat Dhaval Chauhan MIS 534.
HACKING VS PENTESTING NURUL HAFIZAH HAZWNI BINTI HASHIM (MCS151019)
De Bono’s Thinking Hats
Hackers and Crackers iJacsn.
Ethical hacking
Best SEO services for your business website | SEO | Innothoughts Systems
Engineering Secure Software
Penetration Testing Computer Science and Software Engineering
Catholic University College of Ghana Fiapre-Sunyani
People: The Social Engineer’s Dream
Catholic University College of Ghana Fiapre-Sunyani
Introduction to Cybercrime and Security
What is computer hacking?
Engineering Secure Software
How much do I know about the topic?
“Hacking” and Computer System Security
8th Grade time capsule I am ________yrs old My Favorite food (restaurant) is ________________ My best friends are______________,_____________ The song.
Penetration Testing Market Research Report By Forecast to 2023 Industry Survey, Growth, Competitive Landscape and Forecasts to 2023 PREPARED BY Market.
Presentation transcript:

Founder: CyberCure Technologies Pvt. Ltd. FreeLancer: Cybercrime Investigation Guest Lecturer: in more than 300 Engineering College Sangeet Chopra

Perception about hackers: hackers are Criminals!

Resources: Computer Emergency Response Team- India

Cherry keyboard – My best Friend!! My First hack!! My Favorite Technologies!! My Second hack!!

First Telephone Bill when we have a girlfriend! Rs 10000/- Approx. Second Hack: Culprit and Motivator: My First Girlfriend! Consequences – Parents Locked the Keypad. Outcome – Another hack! Eventual Realization: We can fool machines and Computers!

What hackers can Do to You? Security is Nothing, It is just a Feeling!

Golden Rule to safeguard yourself from Attackers! Black Hat Hacker Normal User White hat Hacker Attack Bounce Back Learn Hacking and get equivalent Knowledge!

Golden Rule to safeguard yourself from Attackers! Learn Hacking & stay Secure!! Thank You!