SlideShare a Scribd company logo
1 of 12
WHAT IS
SECURITY
Security is the degree of resistance to, or
protection from, harm.
It is the state of being free from danger or
threat.
Difference Between Security
and Protection
Security and protection are extremely close
concepts though not same.
Security measures are adopted to increase
the level of protection
The feeling of protection arises when one
has enough security measures
Security is a type of protection against
external threats.
Overview of
Hacking
 Hack
• Examine something very minutely
• The rapid crafting of new program or the making
of changes to existing, usually complicated
software
 Hacker
• The person who hacks
 Cracker
• System intruder/ destroyer
History Of
Hacking
The first hacker was appeared in 1960’s at the
Massachusetts Institute Of Technology(MIT)
During the 1970’s, a different kind of hacker
appeared: Phone Phreaker or Phone Hacker
 In the 1980’s, phreaks started to migrate to
computers, and the first Bulletin Board System (BBS)
appeared
During the 1990’s, when the use of internet
widespread around the world, hackers multiplied
Hacker and Ethical
Hacker
 Hacker
system or network without• Access computer
authorization
• Breaks the law
 Ethical Hacker
• Performs most of the same activities but with owner’s
permission
• Employed by companies to perform Penetration Tests
Types of Hacker
 White HatHacker
• Good guys
• Don’t use their skill for illegal purpose
• Computer security experts and help to protect
from Black Hats.
Black HatHacker
• Bad guys
• Use their skill maliciously for personal gain
• Hack banks, steal credit cards and deface websites
 Grey HatHacker
• It is a combination of White hat n Black Hat Hackers
• Goal of grey hat hackers is to provide national
security
Some
Tools
• Who is, ping
• Traceroot, nslookup
Footprinting
• nmap
• nessus
Scanning
• Netcat. tcpdump
• Telnet, firewalk
Enumeration
Some Famous
Hacker
Ian Murphy Kevin Mitnick Johan Helsinguis
Linus Torvald MarkAbene Robert Morris
Recent news of Hacking
• Next generation patch management tool released- Secunia CSI
7.0
• Anonymity tool TOR gains more than 1.2 million users since
NSA PRISM Scandal
• Fearof NSA PRISM: IndianGovernment may ban US email
services for official Communication
• CISCO vulnerability allows remote attacker to take control of
Windows System
• FBI uses Anonymous Hackers to attack foreign Governments
Ethical Hacking

More Related Content

What's hot

Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingVikram Khanna
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute forcevishalgohel12195
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking pptRohit Yadav
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking PowerpointRen Tuazon
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware AnalysisAndrew McNicol
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking PresentationAmbikaMalgatti
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?btpsec
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking pptNitesh Dubey
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best PracticesEvolve IP
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security toolsVicky Fernandes
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information SecurityDr Naim R Kidwai
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation Priya Saluja
 

What's hot (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute force
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 

Similar to Ethical Hacking

Similar to Ethical Hacking (20)

Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
hacking
hackinghacking
hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Hacking
HackingHacking
Hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

More from Rishab garg

Entrepreneur and entrepreneurship
Entrepreneur and entrepreneurshipEntrepreneur and entrepreneurship
Entrepreneur and entrepreneurshipRishab garg
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awarenessRishab garg
 
Ethical Hacking and Network Defense
Ethical Hacking and Network Defense Ethical Hacking and Network Defense
Ethical Hacking and Network Defense Rishab garg
 
Archaeology sources and materials
Archaeology sources and materialsArchaeology sources and materials
Archaeology sources and materialsRishab garg
 
Tsunami the killer waves made by rishab ,ppt
Tsunami the killer waves made by rishab ,pptTsunami the killer waves made by rishab ,ppt
Tsunami the killer waves made by rishab ,pptRishab garg
 
Shaheed banda singh_bahadur_ji english
Shaheed banda singh_bahadur_ji englishShaheed banda singh_bahadur_ji english
Shaheed banda singh_bahadur_ji englishRishab garg
 
Kalpanachawla in Hindi
Kalpanachawla in HindiKalpanachawla in Hindi
Kalpanachawla in HindiRishab garg
 
Internet of-thing
Internet of-thingInternet of-thing
Internet of-thingRishab garg
 
Internet of things
Internet of thingsInternet of things
Internet of thingsRishab garg
 
Geothermal energy
Geothermal energyGeothermal energy
Geothermal energyRishab garg
 
Ppt on Partnership.
Ppt on Partnership.Ppt on Partnership.
Ppt on Partnership.Rishab garg
 

More from Rishab garg (16)

Entrepreneur and entrepreneurship
Entrepreneur and entrepreneurshipEntrepreneur and entrepreneurship
Entrepreneur and entrepreneurship
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awareness
 
Solar system
Solar systemSolar system
Solar system
 
Solar system
Solar systemSolar system
Solar system
 
Ethical Hacking and Network Defense
Ethical Hacking and Network Defense Ethical Hacking and Network Defense
Ethical Hacking and Network Defense
 
Archaeology sources and materials
Archaeology sources and materialsArchaeology sources and materials
Archaeology sources and materials
 
Tsunami the killer waves made by rishab ,ppt
Tsunami the killer waves made by rishab ,pptTsunami the killer waves made by rishab ,ppt
Tsunami the killer waves made by rishab ,ppt
 
Shaheed banda singh_bahadur_ji english
Shaheed banda singh_bahadur_ji englishShaheed banda singh_bahadur_ji english
Shaheed banda singh_bahadur_ji english
 
My school
My schoolMy school
My school
 
Kalpanachawla in Hindi
Kalpanachawla in HindiKalpanachawla in Hindi
Kalpanachawla in Hindi
 
Kalpanachawla
KalpanachawlaKalpanachawla
Kalpanachawla
 
Internet of-thing
Internet of-thingInternet of-thing
Internet of-thing
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Geothermal energy
Geothermal energyGeothermal energy
Geothermal energy
 
Food resources
Food resourcesFood resources
Food resources
 
Ppt on Partnership.
Ppt on Partnership.Ppt on Partnership.
Ppt on Partnership.
 

Recently uploaded

How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Ethical Hacking

  • 1.
  • 2. WHAT IS SECURITY Security is the degree of resistance to, or protection from, harm. It is the state of being free from danger or threat.
  • 3. Difference Between Security and Protection Security and protection are extremely close concepts though not same. Security measures are adopted to increase the level of protection The feeling of protection arises when one has enough security measures Security is a type of protection against external threats.
  • 4. Overview of Hacking  Hack • Examine something very minutely • The rapid crafting of new program or the making of changes to existing, usually complicated software  Hacker • The person who hacks  Cracker • System intruder/ destroyer
  • 5. History Of Hacking The first hacker was appeared in 1960’s at the Massachusetts Institute Of Technology(MIT) During the 1970’s, a different kind of hacker appeared: Phone Phreaker or Phone Hacker
  • 6.  In the 1980’s, phreaks started to migrate to computers, and the first Bulletin Board System (BBS) appeared During the 1990’s, when the use of internet widespread around the world, hackers multiplied
  • 7. Hacker and Ethical Hacker  Hacker system or network without• Access computer authorization • Breaks the law  Ethical Hacker • Performs most of the same activities but with owner’s permission • Employed by companies to perform Penetration Tests
  • 8. Types of Hacker  White HatHacker • Good guys • Don’t use their skill for illegal purpose • Computer security experts and help to protect from Black Hats. Black HatHacker • Bad guys • Use their skill maliciously for personal gain • Hack banks, steal credit cards and deface websites  Grey HatHacker • It is a combination of White hat n Black Hat Hackers • Goal of grey hat hackers is to provide national security
  • 9. Some Tools • Who is, ping • Traceroot, nslookup Footprinting • nmap • nessus Scanning • Netcat. tcpdump • Telnet, firewalk Enumeration
  • 10. Some Famous Hacker Ian Murphy Kevin Mitnick Johan Helsinguis Linus Torvald MarkAbene Robert Morris
  • 11. Recent news of Hacking • Next generation patch management tool released- Secunia CSI 7.0 • Anonymity tool TOR gains more than 1.2 million users since NSA PRISM Scandal • Fearof NSA PRISM: IndianGovernment may ban US email services for official Communication • CISCO vulnerability allows remote attacker to take control of Windows System • FBI uses Anonymous Hackers to attack foreign Governments