National Information Security Education & Awareness program<br />Linux User Group of BIT Mesra<br />Sponsored by www.theha...
 Hacker<br />
 What is Hacking<br />Hacking is the art of finding a solution to real life problems<br />
 Who is Hacker<br />Hackers are developers.<br />Hackers are those geeks and scientists who provide IT solutions to real l...
                   Examples<br />Social Networking site for plants.<br />Sending sms to smart phone whenever a  post man d...
                   Hackers<br />Development of Science   <><>  Hackers<br />
                Misconception<br />What about those who break into systems?<br />Are they hacker?<br />The answer is no.<b...
 Who is Responsible for   misconception<br />Media  is the root cause of all this misconception.<br />Lack of Awareness a...
                      Cracker<br />One who breaks into systems illegally are crackers.<br />They are bad guys or gals<br />
 Case studies (Mumbai India)<br />Lady living in one-room apartment.<br />Lady had the habit of chatting  on internet with...
            case studies cont.<br />It continued for 3-4 months.<br />When she went for job interview she her boss immedia...
   Impacts<br />Privacy Invasion<br />Harassment and mental torture<br />The lady almost became paranoid and never want to...
            Hacker vs Cracker<br /><ul><li>  Qualities of hacker: </li></ul>        Lots of knowledge<br />       Good Guy...
Hacker vs Cracker<br />Qualities of cracker<br />     Lots of knowledge<br />     Bad ethics<br />     Cyber criminals<br />
    Skills of Hacker<br />Learn Programming languages ( C, C++)<br />Learn scripting languages ( JSP, Python, PHP )<br />G...
 Options for 12th students<br /><ul><li>There is no any substitute of BE/B.tech
Should not go for CEH or certification  courses in Ethical Hacking and penetration Testing </li></li></ul><li>            ...
 Thank You<br />  The End<br />
Upcoming SlideShare
Loading in...5
×

National information security education & awareness program

947
-1

Published on

This PPT is owned by Neel Kamal . He is the owner and admin of www.thehackbook.com

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
947
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
24
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Ankit
  • National information security education & awareness program

    1. 1. National Information Security Education & Awareness program<br />Linux User Group of BIT Mesra<br />Sponsored by www.thehackbook.com<br />Introduction To Ethical Hacking<br /> By Neel kamal<br />
    2. 2. Hacker<br />
    3. 3. What is Hacking<br />Hacking is the art of finding a solution to real life problems<br />
    4. 4. Who is Hacker<br />Hackers are developers.<br />Hackers are those geeks and scientists who provide IT solutions to real life problems.<br />Hackers think beyond the boundaris<br />e.g : Newton , Einstein , J.C Bose<br />
    5. 5. Examples<br />Social Networking site for plants.<br />Sending sms to smart phone whenever a post man delivers the letter in the letter box.<br />Sending sms to near & dear ones whenever you reach the destination.<br />
    6. 6. Hackers<br />Development of Science <><> Hackers<br />
    7. 7. Misconception<br />What about those who break into systems?<br />Are they hacker?<br />The answer is no.<br />
    8. 8. Who is Responsible for misconception<br />Media  is the root cause of all this misconception.<br />Lack of Awareness among common students and people.<br />
    9. 9. Cracker<br />One who breaks into systems illegally are crackers.<br />They are bad guys or gals<br />
    10. 10. Case studies (Mumbai India)<br />Lady living in one-room apartment.<br />Lady had the habit of chatting on internet with strangers.<br />An attacker from Russia installed Trojan in her system.<br />With the help of Trojan he switched her web camera on.<br />And make it live on internet and invaded her privacy.<br />
    11. 11. case studies cont.<br />It continued for 3-4 months.<br />When she went for job interview she her boss immediately exclaimed that she would definitely get the job as he enjoyed her on pornographic website on a regular basis.<br />The attacker was never caught<br />
    12. 12. Impacts<br />Privacy Invasion<br />Harassment and mental torture<br />The lady almost became paranoid and never want to use internet again.<br />
    13. 13. Hacker vs Cracker<br /><ul><li> Qualities of hacker: </li></ul> Lots of knowledge<br /> Good Guy<br /> Strong Ethics<br /> Helps in catching cyber criminals<br />
    14. 14. Hacker vs Cracker<br />Qualities of cracker<br /> Lots of knowledge<br /> Bad ethics<br /> Cyber criminals<br />
    15. 15. Skills of Hacker<br />Learn Programming languages ( C, C++)<br />Learn scripting languages ( JSP, Python, PHP )<br />Good knowledge of database and query languages (SQL, YQL, FQL, etc)<br />Learn Networking (TCP/IP)<br />Learn to work in Unix<br />Start playing with web api’s<br />
    16. 16. Options for 12th students<br /><ul><li>There is no any substitute of BE/B.tech
    17. 17. Should not go for CEH or certification courses in Ethical Hacking and penetration Testing </li></li></ul><li> career options<br />Indian universities don’t provide under grad degree in Information Security.<br />One can opt for CS/IT/ECE in Indian universities<br />
    18. 18. Thank You<br /> The End<br />
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×