Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

National information security education & awareness program

1,301 views

Published on

This PPT is owned by Neel Kamal . He is the owner and admin of www.thehackbook.com

Published in: Education, Technology
  • Be the first to comment

National information security education & awareness program

  1. 1. National Information Security Education & Awareness program<br />Linux User Group of BIT Mesra<br />Sponsored by www.thehackbook.com<br />Introduction To Ethical Hacking<br /> By Neel kamal<br />
  2. 2. Hacker<br />
  3. 3. What is Hacking<br />Hacking is the art of finding a solution to real life problems<br />
  4. 4. Who is Hacker<br />Hackers are developers.<br />Hackers are those geeks and scientists who provide IT solutions to real life problems.<br />Hackers think beyond the boundaris<br />e.g : Newton , Einstein , J.C Bose<br />
  5. 5. Examples<br />Social Networking site for plants.<br />Sending sms to smart phone whenever a post man delivers the letter in the letter box.<br />Sending sms to near & dear ones whenever you reach the destination.<br />
  6. 6. Hackers<br />Development of Science <><> Hackers<br />
  7. 7. Misconception<br />What about those who break into systems?<br />Are they hacker?<br />The answer is no.<br />
  8. 8. Who is Responsible for misconception<br />Media  is the root cause of all this misconception.<br />Lack of Awareness among common students and people.<br />
  9. 9. Cracker<br />One who breaks into systems illegally are crackers.<br />They are bad guys or gals<br />
  10. 10. Case studies (Mumbai India)<br />Lady living in one-room apartment.<br />Lady had the habit of chatting on internet with strangers.<br />An attacker from Russia installed Trojan in her system.<br />With the help of Trojan he switched her web camera on.<br />And make it live on internet and invaded her privacy.<br />
  11. 11. case studies cont.<br />It continued for 3-4 months.<br />When she went for job interview she her boss immediately exclaimed that she would definitely get the job as he enjoyed her on pornographic website on a regular basis.<br />The attacker was never caught<br />
  12. 12. Impacts<br />Privacy Invasion<br />Harassment and mental torture<br />The lady almost became paranoid and never want to use internet again.<br />
  13. 13. Hacker vs Cracker<br /><ul><li> Qualities of hacker: </li></ul> Lots of knowledge<br /> Good Guy<br /> Strong Ethics<br /> Helps in catching cyber criminals<br />
  14. 14. Hacker vs Cracker<br />Qualities of cracker<br /> Lots of knowledge<br /> Bad ethics<br /> Cyber criminals<br />
  15. 15. Skills of Hacker<br />Learn Programming languages ( C, C++)<br />Learn scripting languages ( JSP, Python, PHP )<br />Good knowledge of database and query languages (SQL, YQL, FQL, etc)<br />Learn Networking (TCP/IP)<br />Learn to work in Unix<br />Start playing with web api’s<br />
  16. 16. Options for 12th students<br /><ul><li>There is no any substitute of BE/B.tech
  17. 17. Should not go for CEH or certification courses in Ethical Hacking and penetration Testing </li></li></ul><li> career options<br />Indian universities don’t provide under grad degree in Information Security.<br />One can opt for CS/IT/ECE in Indian universities<br />
  18. 18. Thank You<br /> The End<br />

×