How secure are you……?www.technopundits.in    Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Agenda• What is Information Security and Ethical Hacking• Career options in Information Security and Ethical Hackingwww.te...
Did you know In 1980 a computer cracked a 3-character  password within one minute. In 1999 a team of computers cracked a...
What is Ethical HackingEthical hacking, often performed by white hats or skilledcomputer experts, is the use of programmin...
Types of Hackers• Black Hat Hackers• Gray Hat Hackers• White Hat Hackerswww.technopundits.in   Copyright © 2011 Technopund...
Types of Hacking•   Website Hacking•   Email Hacking•   Network Hacking•   Password Hacking•   Online banking Hacking•   C...
Malwares•   Virus and Worms•   Logic Bombs•   Spywares•   Trojan Horse•   Botswww.technopundits.in   Copyright © 2011 Tech...
Protect yourself from Malwares•   Antivirus software and keep it upto date•   Email attachment should be scanned•   Downlo...
Hacking Attacks• Social Engineering Attack  – Impersonation  – Shoulder surfing  – Popup windows• Phishing  – Fake pages  ...
Fake GMAIL Pagewww.technopundits.in   Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Phishing Email - Examplewww.technopundits.in       Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reser...
Phishing Email - Examplewww.technopundits.in       Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reser...
Phishing Email - Examplewww.technopundits.in       Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reser...
Nigerian Phishing Email Scamwww.technopundits.in    Copyright © 2011 Technopundits Business Solutions LLP. All Rights Rese...
Offer Letter Fraudwww.technopundits.in   Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
A World of OpportunitiesThe Asia-Pacific region is anticipated to account for the majority ofInformation security solution...
Career options that you have                Cyber Security Professional                Information Security Professional  ...
What do we do?•   Education•   Online Reputation Management•   Fraud Investigations•   Reference checks•   Antivirus solut...
Accelerating your career growth          Building your future  contact@technopundits.in                        9962006587w...
What is ethical hacking
Upcoming SlideShare
Loading in...5
×

What is ethical hacking

297

Published on

Published in: Education
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
297
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
12
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

What is ethical hacking

  1. 1. How secure are you……?www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  2. 2. Agenda• What is Information Security and Ethical Hacking• Career options in Information Security and Ethical Hackingwww.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  3. 3. Did you know In 1980 a computer cracked a 3-character password within one minute. In 1999 a team of computers cracked a 56- character password within one day. In 2004 a computer virus infected 1 million computers within one hour.www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  4. 4. What is Ethical HackingEthical hacking, often performed by white hats or skilledcomputer experts, is the use of programming skills todetermine vulnerabilities in computer systems. While thenon-ethical hacker or black hat exploits thesevulnerabilities for mischief, personal gain or otherreasons, the ethical hacker evaluates them, points themout, and may suggest changes to systems that makethem less likely to be penetrated by black hats.www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  5. 5. Types of Hackers• Black Hat Hackers• Gray Hat Hackers• White Hat Hackerswww.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  6. 6. Types of Hacking• Website Hacking• Email Hacking• Network Hacking• Password Hacking• Online banking Hacking• Computer Hackingwww.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  7. 7. Malwares• Virus and Worms• Logic Bombs• Spywares• Trojan Horse• Botswww.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  8. 8. Protect yourself from Malwares• Antivirus software and keep it upto date• Email attachment should be scanned• Download files should be scanned• External drives should be scanned• Security patches should be applied• Symptoms of virus infection must not be overlookedwww.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  9. 9. Hacking Attacks• Social Engineering Attack – Impersonation – Shoulder surfing – Popup windows• Phishing – Fake pages – Email Scams• DOS Attack (Denial of Service)www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  10. 10. Fake GMAIL Pagewww.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  11. 11. Phishing Email - Examplewww.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  12. 12. Phishing Email - Examplewww.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  13. 13. Phishing Email - Examplewww.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  14. 14. Nigerian Phishing Email Scamwww.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  15. 15. Offer Letter Fraudwww.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  16. 16. A World of OpportunitiesThe Asia-Pacific region is anticipated to account for the majority ofInformation security solutions marketby 2012. In this world of Opportunities you will see almost every sectoremphasizing on information Security. Banking Sector Aviation Industry Corporate Sector Educational Institutions  Government Sector  Cyber Crime Investigation cells  Global Security agencies  Information system Security association  National Information Security Testing, Evaluation and certification centreswww.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  17. 17. Career options that you have Cyber Security Professional Information Security Professional IS Executive Information System Auditor Security Advisors Software Developers IT Specialists IT System Executives IT Consultants Junior Programmer Assistant Software Engineer R&D Executive Security Consultant System Engineer Network Engineer … and many morewww.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  18. 18. What do we do?• Education• Online Reputation Management• Fraud Investigations• Reference checks• Antivirus solutions• Network Penetration Testingwww.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  19. 19. Accelerating your career growth Building your future contact@technopundits.in 9962006587www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×