SlideShare a Scribd company logo
1 of 11
Lecture 19
Hacking
WHAT IS NETWORK SECURITY?
• Security is much larger than just packets, firewalls,
and hackers. Security includes:
– Policies and procedures
– Liabilities and laws
– Human behavior patterns
– Corporate security programs and implementation
– Technical aspects- firewalls, intrusion detection systems,
proxies, encryption, antivirus software, hacks, cracks, and
attacks
• Understanding hacking tools and how attacks are
carried out is only one piece of the puzzle.
2
ATTACKS
 THERE ARE MANY TYPES OF ATTACKS
• SPOOFING ATTACK
• TELNET BASED ATTACK
• DOS (Daniel of service) ATTACK
• PING OF DEATH
• DISTRIBUTED DOS ATTACK
• MAILBOMBS
NEED FOR SECURITY
 SOME EXELLENT SOFTWARE CAN PROVIDE
YOU BEST SECURITY
 LIKE
• TROJAN
• FIREWALL
TROJAN
 WINDOWS TROJANS ARE SMALL ASPECT OF
WINDOWS SECURUTY
 TROJAN IS UNOTHORIZED PROGRAM
CONTAINED WITHIN A LEGIMATE PROGRAM
 THIS PROGRAM PERFORMS FUNCTION
UNKNOWN BY USER
FIREWALL
 FIREWALL IS ANY DEVICE USED TO PREVENT
OUTSIDERS FROM GAINING ACCESS TO YOUR
NETWORK
 TYPES OF FIREWALLS
• PACKET FILTER
• APPLICATION PROXY
• PACKET INSPECTION
Common Steps for Attackers
Reconnaissance
– Intelligent work of obtaining information either
actively or passively
– Examples:
• Passively: Sniffing Traffic, eavesdropping
• Actively: Obtaining data from American Registry for
Internet Numbers (ARIN), whois databases, web sites,
social engineering
7
Common Steps for Attackers
• Scanning
– Identifying systems that are running and services
that are active on them
– Examples: Ping sweeps and port scans
8
Common Steps for Attackers
• Gaining Access
– Exploiting identified vulnerabilities to gain
unauthorized access
– Examples: Exploiting a buffer overflow or brute
forcing a password and logging onto a system
9
Common Steps for Attackers
• Maintaining Access
– Uploading malicious software to ensure re-entry is
possible
– Example: Installing a backdoor on a system
10
Common Steps for Attackers
• Covering Tracks
– Carrying out activities to hide one’s malicious
activities
– Example: Deleting or modifying data in a system
and its application logs
11

More Related Content

What's hot

Computer hacking – Is it Ethical PPT
Computer hacking – Is it Ethical PPTComputer hacking – Is it Ethical PPT
Computer hacking – Is it Ethical PPT
Vivekanandan M
 

What's hot (20)

Hacking
HackingHacking
Hacking
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should Follow
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer hacking – Is it Ethical PPT
Computer hacking – Is it Ethical PPTComputer hacking – Is it Ethical PPT
Computer hacking – Is it Ethical PPT
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Network security
Network securityNetwork security
Network security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Hacking
HackingHacking
Hacking
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Hacking
HackingHacking
Hacking
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 

Viewers also liked

Dessler hrm12e ppt_03
Dessler hrm12e ppt_03Dessler hrm12e ppt_03
Dessler hrm12e ppt_03
obeden
 
Fall2012 ppt ch03 dessler
Fall2012 ppt ch03 desslerFall2012 ppt ch03 dessler
Fall2012 ppt ch03 dessler
obeden
 
Hrm chapter 1 spring 2012
Hrm chapter 1 spring 2012Hrm chapter 1 spring 2012
Hrm chapter 1 spring 2012
obeden
 

Viewers also liked (20)

Introduction to Human Resource Management - HRM Dessler 12e Chapter 01
Introduction to Human Resource Management - HRM Dessler 12e Chapter 01Introduction to Human Resource Management - HRM Dessler 12e Chapter 01
Introduction to Human Resource Management - HRM Dessler 12e Chapter 01
 
Dessler 01
Dessler 01Dessler 01
Dessler 01
 
Dessler hrm12e ppt_03
Dessler hrm12e ppt_03Dessler hrm12e ppt_03
Dessler hrm12e ppt_03
 
PPIT Lecture 1
PPIT Lecture 1PPIT Lecture 1
PPIT Lecture 1
 
PPIT Lecture 2
PPIT Lecture 2PPIT Lecture 2
PPIT Lecture 2
 
Gary Dessler 10e.. ppt 01
Gary Dessler 10e.. ppt 01Gary Dessler 10e.. ppt 01
Gary Dessler 10e.. ppt 01
 
Job Analysis ( chapter 4 )
Job Analysis ( chapter 4 )Job Analysis ( chapter 4 )
Job Analysis ( chapter 4 )
 
Hrm10e ch04
Hrm10e ch04Hrm10e ch04
Hrm10e ch04
 
Powerpoint slides
Powerpoint slides Powerpoint slides
Powerpoint slides
 
Lecture 3 Dl.ppt
Lecture 3 Dl.pptLecture 3 Dl.ppt
Lecture 3 Dl.ppt
 
Strategic planning
Strategic planning Strategic planning
Strategic planning
 
Fall2012 ppt ch03 dessler
Fall2012 ppt ch03 desslerFall2012 ppt ch03 dessler
Fall2012 ppt ch03 dessler
 
Dessler hrm12e ppt_01
Dessler hrm12e ppt_01Dessler hrm12e ppt_01
Dessler hrm12e ppt_01
 
Using Habit for Good - Nir Eyal, 2016 Habit Summit
Using Habit for Good - Nir Eyal, 2016 Habit SummitUsing Habit for Good - Nir Eyal, 2016 Habit Summit
Using Habit for Good - Nir Eyal, 2016 Habit Summit
 
Why Engagement Matters to Investors - Sarah Tavel, Partner, Greylock Partners...
Why Engagement Matters to Investors - Sarah Tavel, Partner, Greylock Partners...Why Engagement Matters to Investors - Sarah Tavel, Partner, Greylock Partners...
Why Engagement Matters to Investors - Sarah Tavel, Partner, Greylock Partners...
 
Designing for a Future Self - Yingzhao Liu, Director of User Experience Inter...
Designing for a Future Self - Yingzhao Liu, Director of User Experience Inter...Designing for a Future Self - Yingzhao Liu, Director of User Experience Inter...
Designing for a Future Self - Yingzhao Liu, Director of User Experience Inter...
 
PPIT Lecture 4
PPIT Lecture 4PPIT Lecture 4
PPIT Lecture 4
 
Persuasive Web Design - How to Get People to Take Action (Without Using Words...
Persuasive Web Design - How to Get People to Take Action (Without Using Words...Persuasive Web Design - How to Get People to Take Action (Without Using Words...
Persuasive Web Design - How to Get People to Take Action (Without Using Words...
 
Mondy hrm13 inppt04.ppt
Mondy hrm13 inppt04.pptMondy hrm13 inppt04.ppt
Mondy hrm13 inppt04.ppt
 
Hrm chapter 1 spring 2012
Hrm chapter 1 spring 2012Hrm chapter 1 spring 2012
Hrm chapter 1 spring 2012
 

Similar to PPIT Lecture 19

Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
Karan Bhandari
 

Similar to PPIT Lecture 19 (20)

Cybersecurity Concerns You Should be Thinking About
Cybersecurity Concerns You Should be Thinking AboutCybersecurity Concerns You Should be Thinking About
Cybersecurity Concerns You Should be Thinking About
 
22-NTU-BA-1784.pptx
22-NTU-BA-1784.pptx22-NTU-BA-1784.pptx
22-NTU-BA-1784.pptx
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of Computer
 
1_Introduction.pdf
1_Introduction.pdf1_Introduction.pdf
1_Introduction.pdf
 
BYOD and Your Business
BYOD and Your BusinessBYOD and Your Business
BYOD and Your Business
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Subhankar Dutta, Cyber security presentation.pptx
Subhankar Dutta, Cyber security presentation.pptxSubhankar Dutta, Cyber security presentation.pptx
Subhankar Dutta, Cyber security presentation.pptx
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptx
 
Untitled (1).pptx
Untitled (1).pptxUntitled (1).pptx
Untitled (1).pptx
 
Untitled (1).pptx
Untitled (1).pptxUntitled (1).pptx
Untitled (1).pptx
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
2016 to 2021
2016 to 20212016 to 2021
2016 to 2021
 

More from Kashif Sohail (7)

PPIT Lecture 20
PPIT Lecture 20PPIT Lecture 20
PPIT Lecture 20
 
PPIT Lecture 10
PPIT Lecture 10PPIT Lecture 10
PPIT Lecture 10
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
 
PPIT Lecture 8
PPIT Lecture 8PPIT Lecture 8
PPIT Lecture 8
 
PPIT Lecture 7
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
 
PPIT Lecture 06
PPIT Lecture 06PPIT Lecture 06
PPIT Lecture 06
 
PPIT Lecture 5
PPIT Lecture 5PPIT Lecture 5
PPIT Lecture 5
 

Recently uploaded

%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 

Recently uploaded (20)

OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 

PPIT Lecture 19

  • 2. WHAT IS NETWORK SECURITY? • Security is much larger than just packets, firewalls, and hackers. Security includes: – Policies and procedures – Liabilities and laws – Human behavior patterns – Corporate security programs and implementation – Technical aspects- firewalls, intrusion detection systems, proxies, encryption, antivirus software, hacks, cracks, and attacks • Understanding hacking tools and how attacks are carried out is only one piece of the puzzle. 2
  • 3. ATTACKS  THERE ARE MANY TYPES OF ATTACKS • SPOOFING ATTACK • TELNET BASED ATTACK • DOS (Daniel of service) ATTACK • PING OF DEATH • DISTRIBUTED DOS ATTACK • MAILBOMBS
  • 4. NEED FOR SECURITY  SOME EXELLENT SOFTWARE CAN PROVIDE YOU BEST SECURITY  LIKE • TROJAN • FIREWALL
  • 5. TROJAN  WINDOWS TROJANS ARE SMALL ASPECT OF WINDOWS SECURUTY  TROJAN IS UNOTHORIZED PROGRAM CONTAINED WITHIN A LEGIMATE PROGRAM  THIS PROGRAM PERFORMS FUNCTION UNKNOWN BY USER
  • 6. FIREWALL  FIREWALL IS ANY DEVICE USED TO PREVENT OUTSIDERS FROM GAINING ACCESS TO YOUR NETWORK  TYPES OF FIREWALLS • PACKET FILTER • APPLICATION PROXY • PACKET INSPECTION
  • 7. Common Steps for Attackers Reconnaissance – Intelligent work of obtaining information either actively or passively – Examples: • Passively: Sniffing Traffic, eavesdropping • Actively: Obtaining data from American Registry for Internet Numbers (ARIN), whois databases, web sites, social engineering 7
  • 8. Common Steps for Attackers • Scanning – Identifying systems that are running and services that are active on them – Examples: Ping sweeps and port scans 8
  • 9. Common Steps for Attackers • Gaining Access – Exploiting identified vulnerabilities to gain unauthorized access – Examples: Exploiting a buffer overflow or brute forcing a password and logging onto a system 9
  • 10. Common Steps for Attackers • Maintaining Access – Uploading malicious software to ensure re-entry is possible – Example: Installing a backdoor on a system 10
  • 11. Common Steps for Attackers • Covering Tracks – Carrying out activities to hide one’s malicious activities – Example: Deleting or modifying data in a system and its application logs 11