SlideShare a Scribd company logo
1 of 42
A Step into the Computer Underground “ By Understanding The Enemy We Are Better Prepared To Defend Ourselves” by Anil Nayak
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],OBTAIN CRACK DISTRIBUTE
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
Group Leaders Suppliers Crackers Couriers Trainers Intros
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
 
[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],BECAUSE THEY CAN!
Presentation Slides And Speech Available For Download From: http://www.security-assessment.com

More Related Content

What's hot (20)

Computer security
Computer securityComputer security
Computer security
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDF
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Security
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
Post Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismPost Apocalyptic Cyber Realism
Post Apocalyptic Cyber Realism
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Firewall
FirewallFirewall
Firewall
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Web Security
Web SecurityWeb Security
Web Security
 
Hacking
HackingHacking
Hacking
 
Hacking final
Hacking finalHacking final
Hacking final
 
Computer virus
Computer virusComputer virus
Computer virus
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Web security
Web securityWeb security
Web security
 
Web defacement
Web defacementWeb defacement
Web defacement
 

Viewers also liked

þEtta er svo gott fólk menntakvika 2013
þEtta er svo gott fólk   menntakvika 2013þEtta er svo gott fólk   menntakvika 2013
þEtta er svo gott fólk menntakvika 2013Helgi Svavarsson
 
Julen gabiria olatz eta elena
Julen gabiria olatz eta elenaJulen gabiria olatz eta elena
Julen gabiria olatz eta elenaNORURIBARRI
 
My first presentation
My first presentationMy first presentation
My first presentationajishere
 
The Csi Group, LLC PowerPoint Presentation
The Csi Group, LLC PowerPoint Presentation The Csi Group, LLC PowerPoint Presentation
The Csi Group, LLC PowerPoint Presentation crobison58
 
427 416 ชั่วโมงที่ ˆ 1 20 มิ.ย. 54
427 416  ชั่วโมงที่ ˆ 1 20 มิ.ย. 54427 416  ชั่วโมงที่ ˆ 1 20 มิ.ย. 54
427 416 ชั่วโมงที่ ˆ 1 20 มิ.ย. 54Sani Satjachaliao
 
Slide การพัฒนาองค์การและการเปลี่ยนแปลง รศ.ดร.เนตร์พัณณา
Slide การพัฒนาองค์การและการเปลี่ยนแปลง รศ.ดร.เนตร์พัณณาSlide การพัฒนาองค์การและการเปลี่ยนแปลง รศ.ดร.เนตร์พัณณา
Slide การพัฒนาองค์การและการเปลี่ยนแปลง รศ.ดร.เนตร์พัณณาNatepanna Yavirach
 

Viewers also liked (8)

þEtta er svo gott fólk menntakvika 2013
þEtta er svo gott fólk   menntakvika 2013þEtta er svo gott fólk   menntakvika 2013
þEtta er svo gott fólk menntakvika 2013
 
Julen gabiria olatz eta elena
Julen gabiria olatz eta elenaJulen gabiria olatz eta elena
Julen gabiria olatz eta elena
 
My first presentation
My first presentationMy first presentation
My first presentation
 
Issues concerning leaders
Issues concerning leadersIssues concerning leaders
Issues concerning leaders
 
The Csi Group, LLC PowerPoint Presentation
The Csi Group, LLC PowerPoint Presentation The Csi Group, LLC PowerPoint Presentation
The Csi Group, LLC PowerPoint Presentation
 
Research1
Research1Research1
Research1
 
427 416 ชั่วโมงที่ ˆ 1 20 มิ.ย. 54
427 416  ชั่วโมงที่ ˆ 1 20 มิ.ย. 54427 416  ชั่วโมงที่ ˆ 1 20 มิ.ย. 54
427 416 ชั่วโมงที่ ˆ 1 20 มิ.ย. 54
 
Slide การพัฒนาองค์การและการเปลี่ยนแปลง รศ.ดร.เนตร์พัณณา
Slide การพัฒนาองค์การและการเปลี่ยนแปลง รศ.ดร.เนตร์พัณณาSlide การพัฒนาองค์การและการเปลี่ยนแปลง รศ.ดร.เนตร์พัณณา
Slide การพัฒนาองค์การและการเปลี่ยนแปลง รศ.ดร.เนตร์พัณณา
 

Similar to Security Assessment

Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersSomyos U.
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9Geoff Pesimo
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyb coatesworth
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptJatinRajput67
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII studentsAkiumi Hasegawa
 
Meeting02_RoT.pptx
Meeting02_RoT.pptxMeeting02_RoT.pptx
Meeting02_RoT.pptxothmanomar13
 
web-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfweb-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfLucaMartins7
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?TechGenie
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hackingCmano Kar
 
Volume And Vectors 090416
Volume And Vectors 090416Volume And Vectors 090416
Volume And Vectors 090416Anthony Arrott
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingzing12345
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manualRoel Palmaers
 

Similar to Security Assessment (20)

Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
cyber crime
cyber crimecyber crime
cyber crime
 
Meeting02_RoT.pptx
Meeting02_RoT.pptxMeeting02_RoT.pptx
Meeting02_RoT.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking and its Defence
Hacking and its DefenceHacking and its Defence
Hacking and its Defence
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
web-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfweb-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdf
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
 
Hack the hack
Hack the hackHack the hack
Hack the hack
 
31.ppt
31.ppt31.ppt
31.ppt
 
31.ppt
31.ppt31.ppt
31.ppt
 
Volume And Vectors 090416
Volume And Vectors 090416Volume And Vectors 090416
Volume And Vectors 090416
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manual
 

Security Assessment

  • 1. A Step into the Computer Underground “ By Understanding The Enemy We Are Better Prepared To Defend Ourselves” by Anil Nayak
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Group Leaders Suppliers Crackers Couriers Trainers Intros
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.  
  • 19.
  • 20.
  • 21.
  • 22.  
  • 23.
  • 24.
  • 25.  
  • 26.  
  • 27.  
  • 28.
  • 29.  
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.  
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42. Presentation Slides And Speech Available For Download From: http://www.security-assessment.com