Your SlideShare is downloading. ×
Ethical hacking
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Ethical hacking

7,047

Published on

it contains all the data a person needs for ethical hacking

it contains all the data a person needs for ethical hacking

Published in: Education
3 Comments
7 Likes
Statistics
Notes
No Downloads
Views
Total Views
7,047
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
638
Comments
3
Likes
7
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Isas project
  • 2. Ethical Hacking Megha shah Merlyn Pooja Singh
  • 3. AGENDA
    • What is Ethical Hacking?
    • Who are ethical hackers?
    • History of hacking
    • Types of hackers
    • Ways to hack a system
    • Preventing hacking
    • Skills of an ethical hacker
  • 4. Ethical Hacking
    • Hacking refers to the re-configuring or re-programming of a system to function in ways not facilitated by the owner, adminstrator,or designer.
    • The greatest risk I.T. faces is security.
    • Hacking refers practice of breaking into systems.
  • 5. Who is hacker?
    • . Hackers  intelligent computer professionals learned and acquired knowledge of advanced operating techniques.
    • Try to gain knowledge in depth of systems /networks.
    • Hackers do not always intend to damage data.
    • They may share their knowledge with others.
  • 6. History of hacking
    • The term “hack” was first used by US university staff in mid-1960s .
    • When eBay was first attacked in February 2000 its server was bombarded with fake request for web pages & overloaded the site.
    • A group of teenagers once hacked into AOL and stole credit cards to buy video games.
    • In 1986, after many more break-ins congress passed “computer fraud and abuse act”.
  • 7. History of hacking
    • In 1989,german hackers arrested for breaking into US computer ; sold the information to Soviet KGB.
    • In 1998, teenager hacks into bell Atlantic phone system; disabled communication at airports disables runway lights.
    • In 2000, viruses named “I OVE YOU” & “LOVE BUG” damaged roughly up to 10 billions of computers.
  • 8. Types of hackers
    • Depending on the nature & activities hackers are categorized into different groups :
    • White hat : use their skills & knowledge for good purpose .Help in finding new security vulnerabilities and applications.
    • Black hat : engage in their activities with bad intention and perform illegal activities such as defacing websites and destroying data.
    • Grey hat : do not categorize their work as good or bad.
  • 9. Ways To Hack a System
    • VIRUSES & WORMS - they are self-replicating programs or codes fragments.
    • They attach themselves to other programs (viruses) or machines (worms).
    • They shut networks by flooding them.
    • ROUGE ACCESS POINT- they are unsecured wireless access point that outsiders can easily breech.
    • Are most often connected by well-meaning but ignorant employees.
  • 10. Ways To Hack a System
    • BACK DOORS- they are loop holes in any system.
    • With the aid of computerized searchers (bots) , hackers can probably find any weakness in network.
    • TROJAN HORSES- they enter system by attaching themselves to other programs
    • When Trojans are activated , this hacked software kicks off viruses in the system.
  • 11. Ways To Hack a System
    • Denial Of Services- this attacks gives hackers a way to bring down the network without internal access.
    • It floods the access router with bogus traffic
    • (i.e. e-mail or TCP ,packets).
    • Phreaks- they use computer to break into telecommunications network.
    • Script kiddies- they have inadequate technical information & use available information to break into system.
  • 12. Preventing Hacking
    • Anti-virus: the most popular method of protection among personal computers.
    • Mc Afee.com Corp.- provides antivirus software that scans hard drive’s for infected files.
    • Norton Internet Security- Norton anti virus 2008 secures system from Trojans.
    • Firewalls: used for computer networks & users using continuous online connections.
  • 13. Preventing Hacking
    • Other software options- other options are used to protect larger networks systems.
    • IDS- Intrusion Detection System is considered one of best protection method
    • Content Filtering Software- advanced antivirus software that reads compressed files .Allows IT mangers get filtering to block threatening e-mail.
    • Sand Boxing- helps to read malicious codes.
  • 14. Skills of an ethical hacker
    • Routers- knowledge of routers, routing protocols and access control lists.
    • Microsoft- skills in operation , configuration and management.
    • Linux- knowledge of Linux/Unix; security setting, configuration, and services.
    • Firewalls- configuration, & operation of intrusion detection systems.
  • 15. Skills of an ethical hacker
    • Network protocols- TCP/IP ; how they function and can be manipulated.
    • Project management- knowledge of leading, planning, organizing, and controlling a penetration tests systems.

×