SlideShare a Scribd company logo
1 of 15
CYBER SECURITY AND ETHICAL
HACKING:
A CASE STUDY
Presented by:-
Guided by:-
Abhishek Padul S . A
Jaipurkar
G S Mandal’s
Marathwada Institute of Technology
(Affiliated with Dr. Babasaheb Ambedkar Technological University, Lonere)
Department of Computer Science and Engineering
CONTENTS
 Introduction to cyber security.
 Need & Importance of Cyber Security.
 Types of Cyber Threats.
 Applications & uses.
 Advantages & Disadvantages.
 Introduction to Hacking & Ethical Hacking.
 Need & Importance of Ethical Hacking.
 Applications and uses.
 Implementational details.
 Advantages & Disadvantages.
INTRODUCTION TO CYBER SECURITY
 WHAT IS CYBER SECURITY?
 Technique of protection of computer systems and networks
 Practice of Avoiding digital attacks.
 It is also known as IT security.
NEED & IMPORTANCE OF CYBER SECURITY.
• Continues growth in cyber Space.
• Rapid use of online Environment.
• To avoid collapse digital infrastructure.
• Rising security spends in India.
• Ransomware attacks in the past.
TYPES OF THREATS & CYBER ATTACKS.
• System malware
• Phishing
• Ransomware
• Spy-ware
• SQL
• Security hackers
• Adware
APPLICATION OF CYBER SECURITY.
1] DD0S SECURITY:-
 If Attacker Engages Server, Mitigation Service Diverts Traffic to
other cloud server.
2] WEB FIREWALL:-
 Enables Auto Traffic Monitoring to Check and Remove Fake Traffic.
3] BOTS:-
 Identify Bots and Logs out there Session for Betterment of Normal
Users.
4] THREAT MANAGEMENT SYSTEM:-
 Overcome Digital Attacks & Inform About Vulnerabilities Issues.
Critical
infrastruc
ture
Security.
Applicatio
n
Security.
Network
Security.
Cloud
Security
IOT(inter
net of
Things)
Types
of
Cyber
Securit
y.
ADVANTAGES & DISADVANTAGES
 GIVES US PRIVACY.
 PROTECTION FROM VIRUSES AND HACKS.
 DEFENDS FROM CRITICAL CYBER ATTACKS.
# LACK OF KNOWLEDGE
# ITS VERY EXPENSIVE.
# NOT EASY TO USE.
WHAT IS HACKING ?
 It is act of compromising digital devices.
 Taking Unauthorized access to account & systems.
 Testing a System without an Authorized permission.
 Attacking the vulnerabilities and data breaching.
WHAT IS ETHICAL HACKING?
• It is an authorized attempt with legal permission.
• To gain unauthorized access to computer& various network.
• Also an practice to identify security vulnerabilities
• Practitioner is known as “white hat hacker”.
Need of
Ethical
Hacking
Increase
in Cyber
Attacks.
Flaws in
Software
security.
Data
Security.
Tracking
Vulnerab
ilities.
Safeguar
ding
Business
es.
Controlli
ng cyber
terroris
m
APPLICATION & USES.
• Web application hacking.
• System hacking.
• Social engineering.
• Hacking wireless network.
• Web server hacking.
ADVANTAGES & DISADVANTAGES.
 Take Preventive Actions Against Hackers.
 Finding Loop holes in System & Network.
 Increases Trust on org if Security is well maintained.
# Technique in wrong hand.
# New Technology lack of knowledge.
# Increases Companies cost.
 FUTURE SCOPE
It is estimated that job of an ethical is going to increase by 17.5% across
the world by year 2025.
Conclusion:
 Cyber Security & Ethical Hacking Helps in Strengthens computer & network
Security by Penetration Testing.
 To Avoid any Security Breach Situations
THANK YOU !

More Related Content

Similar to seminar ppt.pptx

Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppthm5314581
 
BALWANT BESRA.pptx
BALWANT BESRA.pptxBALWANT BESRA.pptx
BALWANT BESRA.pptxBalwantBesra
 
BALWANT BESRA.pptx
BALWANT BESRA.pptxBALWANT BESRA.pptx
BALWANT BESRA.pptxBalwantBesra
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptxdhumaletiku
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptxMalu704065
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxtanyamudgal4
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxRoshni814224
 
Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of ComputerFaizan Janjua
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Harsh Bhanushali
 
Ethical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptxEthical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptxNarangYadav
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityAvantika University
 

Similar to seminar ppt.pptx (20)

Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 
BALWANT BESRA.pptx
BALWANT BESRA.pptxBALWANT BESRA.pptx
BALWANT BESRA.pptx
 
BALWANT BESRA.pptx
BALWANT BESRA.pptxBALWANT BESRA.pptx
BALWANT BESRA.pptx
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Persentation
PersentationPersentation
Persentation
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptx
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptx
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of Computer
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptx
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
 
Ethical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptxEthical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 

Recently uploaded

Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 

Recently uploaded (20)

Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

seminar ppt.pptx

  • 1. CYBER SECURITY AND ETHICAL HACKING: A CASE STUDY Presented by:- Guided by:- Abhishek Padul S . A Jaipurkar G S Mandal’s Marathwada Institute of Technology (Affiliated with Dr. Babasaheb Ambedkar Technological University, Lonere) Department of Computer Science and Engineering
  • 2. CONTENTS  Introduction to cyber security.  Need & Importance of Cyber Security.  Types of Cyber Threats.  Applications & uses.  Advantages & Disadvantages.  Introduction to Hacking & Ethical Hacking.  Need & Importance of Ethical Hacking.  Applications and uses.  Implementational details.  Advantages & Disadvantages.
  • 3. INTRODUCTION TO CYBER SECURITY  WHAT IS CYBER SECURITY?  Technique of protection of computer systems and networks  Practice of Avoiding digital attacks.  It is also known as IT security.
  • 4. NEED & IMPORTANCE OF CYBER SECURITY. • Continues growth in cyber Space. • Rapid use of online Environment. • To avoid collapse digital infrastructure. • Rising security spends in India. • Ransomware attacks in the past.
  • 5. TYPES OF THREATS & CYBER ATTACKS. • System malware • Phishing • Ransomware • Spy-ware • SQL • Security hackers • Adware
  • 6. APPLICATION OF CYBER SECURITY. 1] DD0S SECURITY:-  If Attacker Engages Server, Mitigation Service Diverts Traffic to other cloud server. 2] WEB FIREWALL:-  Enables Auto Traffic Monitoring to Check and Remove Fake Traffic. 3] BOTS:-  Identify Bots and Logs out there Session for Betterment of Normal Users. 4] THREAT MANAGEMENT SYSTEM:-  Overcome Digital Attacks & Inform About Vulnerabilities Issues.
  • 8. ADVANTAGES & DISADVANTAGES  GIVES US PRIVACY.  PROTECTION FROM VIRUSES AND HACKS.  DEFENDS FROM CRITICAL CYBER ATTACKS. # LACK OF KNOWLEDGE # ITS VERY EXPENSIVE. # NOT EASY TO USE.
  • 9. WHAT IS HACKING ?  It is act of compromising digital devices.  Taking Unauthorized access to account & systems.  Testing a System without an Authorized permission.  Attacking the vulnerabilities and data breaching.
  • 10. WHAT IS ETHICAL HACKING? • It is an authorized attempt with legal permission. • To gain unauthorized access to computer& various network. • Also an practice to identify security vulnerabilities • Practitioner is known as “white hat hacker”.
  • 11. Need of Ethical Hacking Increase in Cyber Attacks. Flaws in Software security. Data Security. Tracking Vulnerab ilities. Safeguar ding Business es. Controlli ng cyber terroris m
  • 12. APPLICATION & USES. • Web application hacking. • System hacking. • Social engineering. • Hacking wireless network. • Web server hacking.
  • 13.
  • 14. ADVANTAGES & DISADVANTAGES.  Take Preventive Actions Against Hackers.  Finding Loop holes in System & Network.  Increases Trust on org if Security is well maintained. # Technique in wrong hand. # New Technology lack of knowledge. # Increases Companies cost.
  • 15.  FUTURE SCOPE It is estimated that job of an ethical is going to increase by 17.5% across the world by year 2025. Conclusion:  Cyber Security & Ethical Hacking Helps in Strengthens computer & network Security by Penetration Testing.  To Avoid any Security Breach Situations THANK YOU !