Ethical Hacking by Shivam.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Internet Safety Rockingham County Public Schools
ETHICAL HACKING.
Implications and Security Issues of the Internet By Neelesh Patel.
Understanding and Building Basic Networks Chapter 4 Protecting Yourself Online.
© 2005 Convio, Inc. NTEN Webinar: Protecting your organization and donors from online scams February 23, 2006.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Ethical Hacking Pratheeba Murugesan. HACKER AENDA  What is Ethical Hacking?  Who are ethical hackers?  Every Website-A Target  Get out of jail free.
Computer Threats I can understand computer threats and how to protect myself from these threats.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Trojan Horse Program Presented by : Lori Agrawal.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
HACKER NOT CRACKER. HACKER IS  A person who enjoys exploring the details of programmable systems and how to stretch their capabilities  Most often programmers.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Personal Security on the Internet. Introduction What is InfoSec? Information Security (InfoSec) is: –Protection of information –Its critical elements.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Protecting ICT Systems
Cyber Crimes.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Cyber crime & Security Prepared by : Rughani Zarana.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
“ Copyright © Allyn & Bacon 2010 Deviance 10e Chapter Fifteen Internet Deviance This multimedia product and its contents are protected under copyright.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Unethical use of Computers and Networks
-Tyler. Social/Ethical Concern Security -Sony’s Playstation Network (PSN) hacked in April Hacker gained access to personal information -May have.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Information Security. Survey Results Question What do you think Information Security is?
AASSA Conference 2012 Quito, Ecuador March 16 th 2012 All the rights reserved.Instructor: Francisco Bolaños, Ing. InterAmerican Academy Ethical Hacking.
PREPARED BY: SYAIDATUL SYAZANA BT PAUZI INTRODUCTION What is the definition of Phishing Hacking.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Topic 5: Basic Security.
What is hacking? Hacking is the use of a computer and its files with out being allowed by the owner. Hacking is used to find out peoples passwords and.
IDENTITY THEFT By Deshano Dottery. FASTEST GROWING PROBLEM IN AMERICA Approximatley 15 million victims per year Approximatley 15 million victims per year.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Computer crimes.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
Monitoring Employees on Networks
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
 Internet –INTERnational NETwork is the network of computer networks.  It is a Wide Area Network(WLAN).You can have unlimited access to internet. 
Issues for Computer Users, Electronic Devices, Computer and Safety.
Filip Chytrý Everyone of you in here can help us improve online security....
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
 Define hacking  Types of hackers  History  Intentions  Statistics  Facts  How to Protect yourself.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Seminar On Ethical Hacking Submitted To: Submitted By:
Ethical Hacking By: Erin Noonan.
To Know what Cyber crime is
Common Methods Used to Commit Computer Crimes
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
How And The Internet Work
Five Unethical Uses of Computers
Information Technology Services Education and Awareness Team
Unit 4 IT Security Kerris Davies.
Ethical Hacking.
Information Technology Services Education and Awareness Team
Presentation transcript:

Ethical Hacking by Shivam. A technological threat Website:- http://hacker-shivam.webnode.in/

Overview What is hacking Types of hacking Ethical hacking Consequences Conclusion

Hacking Hobby/profession of working with computers. Breaking into computers Gaining access

Types of Hacking Website Hacking Email Hacking Network Hacking Password Hacking Online banking Hacking Computer Hacking

Website Hacking Main focus- Vulnerable loopholes Collapses the information Make changes in the information

Email Hacking Can Emails Be Hacked? Store business data, private information Serious precautions are not taken

Computer Hacking Steals information from pc Remote desktop connection technique Accessing other person’s files

Online banking Hacking Online banking disadvantages Hackers create fake websites Using proper website address

Ethical Hacking Computer or network expert Seeking vulnerabilities Victims – Official & Private websites

What do ethical hackers do? An ethical hacker’s evaluation of a system security seeks answers to these basic question: What can an intruder see on the target systems? What are you trying to protect ? What can an intruder do with that information ?

Consequences Thousands of dollars in fines Imprisonment Seizure of your computer

Conclusion Proper ethical hackers should be employed Do not expose your passwords to untrusted sites Practice using exact web address Close your internet while not in use

Summary Hacking is of two types There are several types of hacking Ethical hacking – a legal method Consequences of illegal hacking

THANK YOU. Website:- http://hacker-shivam.webnode.in/