Your SlideShare is downloading. ×
What is ethical hacking
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

What is ethical hacking

264
views

Published on

Published in: Education

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
264
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
10
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. How secure are you……?www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 2. Agenda• What is Information Security and Ethical Hacking• Career options in Information Security and Ethical Hackingwww.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 3. Did you know In 1980 a computer cracked a 3-character password within one minute. In 1999 a team of computers cracked a 56- character password within one day. In 2004 a computer virus infected 1 million computers within one hour.www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 4. What is Ethical HackingEthical hacking, often performed by white hats or skilledcomputer experts, is the use of programming skills todetermine vulnerabilities in computer systems. While thenon-ethical hacker or black hat exploits thesevulnerabilities for mischief, personal gain or otherreasons, the ethical hacker evaluates them, points themout, and may suggest changes to systems that makethem less likely to be penetrated by black hats.www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 5. Types of Hackers• Black Hat Hackers• Gray Hat Hackers• White Hat Hackerswww.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 6. Types of Hacking• Website Hacking• Email Hacking• Network Hacking• Password Hacking• Online banking Hacking• Computer Hackingwww.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 7. Malwares• Virus and Worms• Logic Bombs• Spywares• Trojan Horse• Botswww.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 8. Protect yourself from Malwares• Antivirus software and keep it upto date• Email attachment should be scanned• Download files should be scanned• External drives should be scanned• Security patches should be applied• Symptoms of virus infection must not be overlookedwww.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 9. Hacking Attacks• Social Engineering Attack – Impersonation – Shoulder surfing – Popup windows• Phishing – Fake pages – Email Scams• DOS Attack (Denial of Service)www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 10. Fake GMAIL Pagewww.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 11. Phishing Email - Examplewww.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 12. Phishing Email - Examplewww.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 13. Phishing Email - Examplewww.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 14. Nigerian Phishing Email Scamwww.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 15. Offer Letter Fraudwww.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 16. A World of OpportunitiesThe Asia-Pacific region is anticipated to account for the majority ofInformation security solutions marketby 2012. In this world of Opportunities you will see almost every sectoremphasizing on information Security. Banking Sector Aviation Industry Corporate Sector Educational Institutions  Government Sector  Cyber Crime Investigation cells  Global Security agencies  Information system Security association  National Information Security Testing, Evaluation and certification centreswww.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 17. Career options that you have Cyber Security Professional Information Security Professional IS Executive Information System Auditor Security Advisors Software Developers IT Specialists IT System Executives IT Consultants Junior Programmer Assistant Software Engineer R&D Executive Security Consultant System Engineer Network Engineer … and many morewww.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 18. What do we do?• Education• Online Reputation Management• Fraud Investigations• Reference checks• Antivirus solutions• Network Penetration Testingwww.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 19. Accelerating your career growth Building your future contact@technopundits.in 9962006587www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.