Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Vulnerability Analysis. Formal verification Formally (mathematically) prove certain characteristics Proves the absence of flaws in a program or design.
Software Quality Assurance Plan
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 5 Port Scanning.
Chapter 1 Ethical Hacking Overview. Who Am I?  Kevin Riley  Systems / Network Analyst Orange Coast College   Phone
Computer Threats I can understand computer threats and how to protect myself from these threats.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Computer Security and Penetration Testing
Penetration Testing Anand Sudula, CISA,CISSP SSA Global Technologies, India Anand Sudula, CISA,CISSP SSA Global Technologies, India.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
Hands-On Ethical Hacking and Network Defense
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Vulnerability Assessment & Penetration Testing By: Michael Lassiter Jr.
Comp 8130 Presentation Security Testing Group Members: U Hui Chen U Ming Chen U Xiaobin Wang.
1-1 McGraw-Hill/IrwinCopyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. fundamentals of Human Resource Management 4 th edition by.
Computer Hacking Cybercrime (1).
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Employee Orientation and Training
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Test Roles and Independence of Testing Telerik Software Academy Software Quality Assurance.
PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD NUR’ ARINA ATIQAH BT ASRAR
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Perky Perko Placement Co Employment Training Agency.
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
CJ416 Eric Salvador. Housekeeping Lets finish strong in Unit 9 discussions Alternative seminars Final submission of work – Tues. May 29 th at midnight.
Unit 9.  Lets finish strong in Unit 9 discussions  Alternative seminars  Final submission of work – Tuesday, October 9 th at midnight.
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
Microsoft Visual Basic 2010: Reloaded Fourth Edition Overview An Introduction to Programming.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Presents Ethical Hacking For Inplant Training / Internship, please download the "Inplant training registration form" from our website.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Chapter 23: Vulnerability Analysis Dr. Wayne Summers Department of Computer Science Columbus State University
Presents Ethical Hacking 1 For Inplant Training / Internship, please download the "Inplant training registration form" from our.
ISA 330 Introduction to Proactive System Security Philip Robbins – August 31, 2013 Ethical Hacking Information Security & Assurance Program University.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
Last revised A.A. Degree CNIT 120: Network Security Fundamentals of Network Security Preparation for Security+ Certification Essential for.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
1 Figure 1-3: Attack Trends Growing Incident Frequency  Incidents reported to the Computer Emergency Response Team/Coordination Center  1997: 2,134.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
CITA 352 Chapter 1 Ethical Hacking Overview. Introduction to Ethical Hacking Ethical hackers –Hired by companies to perform penetration tests Penetration.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Seminar On Ethical Hacking Submitted To: Submitted By:
Ethical Hacking By: Erin Noonan.
HACKING VS PENTESTING NURUL HAFIZAH HAZWNI BINTI HASHIM (MCS151019)
The IT Environment Sections 6 and 7 ICA11v1.0
Security Testing Methods
Ethical hacking
FORMAL SYSTEM DEVELOPMENT METHODOLOGIES
Unit 7 – Organisational Systems Security
Hands-On Ethical Hacking and Network Defense
Penetration Testing Computer Science and Software Engineering
Managing the Security Function
Job Analysis Prof Srividya Iyengar.
Chapter 5: Will Your Future Be in Cybersecurity?
Ethical Hacking.
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Presentation transcript:

Chapter 1 Ethical Hacking Overview

Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical hacker Describe the Role Of Security And Penetration Testers Describe the Penetration-Testing Methodologies 2

Introduction to Ethical Hacking Ethical hackers Hired by companies to perform penetration tests Penetration test Attempt to break into a company’s network to find the weakest link Security test More than a break in attempt; includes analyzing company’s security policy and procedures Vulnerabilities are reported 3

The Role of Security and Penetration Testers Hackers Access computer system or network without authorization Breaks the law; can go to prison Crackers Break into systems to steal or destroy data U.S. Department of Justice calls both hackers Ethical hacker Performs most of the same activities with owner’s permission 4

The Role of Security and Penetration Testers (cont’d.) Script kiddies or packet monkeys Younger, inexperienced hackers who copy codes from knowledgeable hackers Programming languages used by experienced penetration testers Practical Extraction and Report Language (Perl) C language Script Set of instructions Runs in sequence to perform tasks 5

The Role of Security and Penetration Testers (cont’d.) Tiger box Collection of tools Used for conducting vulnerability assessments and attacks 6

Penetration-Testing Methodologies White box model Tester is told about network topology and technology Tester is permitted to interview IT personnel and company employees Makes tester’s job a little easier Black box model Staff does not know about the test Tester is not given details about technologies used Burden is on tester to find details Tests security personnel’s ability to detect an attack 7

8 Figure 1-1 A sample floor plan

Penetration-Testing Methodologies (cont’d.) Gray box model Hybrid of the white and black box models Company gives tester partial information (e.g., OSs are used, but no network diagrams) 9

Summary Companies hire ethical hackers to perform penetration tests Penetration tests discover vulnerabilities in a network Security tests are performed by a team of people with varied skills Penetration test models White box model Black box model Gray box model 10