It security &_ethical_hacking


Published on

Education sure Ethical hacking presentation

Published in: Education
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • -
  • -
  • -
  • It security &_ethical_hacking

    1. 1. Introduction to IT Security & Ethical Hacking INTRODUCTION
    2. 2. CURRENT ONLINE THREATS <ul><li>Have you ever been threatened of </li></ul><ul><li>Theft of passwords. </li></ul><ul><li>E-mail based extortion. </li></ul><ul><li>Launch of malicious programs </li></ul><ul><li>Corporate espionage. </li></ul><ul><li>Website based launch of malicious code cheating & frauds. </li></ul><ul><li>E-mail spamming. </li></ul><ul><li>E-mail bombing. </li></ul>
    3. 3. <ul><li>If your answer to any of the above questions is “ YES” , then you must take this Training. </li></ul>
    4. 4. THE NEED OF THE HOUR? This is very similar to asking the question: “ Why do you have door locks in your houses?” “ Why do you have a safe for valuables?” “ Why do you have a watchman?” “ Why do you have police?” TO PROTECT VALUABLE INFORMATION
    5. 5. SURETY!!! You can attain Total Computer Security! The best way to do so is to apply Richards' Laws Of Computer Security (ca. 1992): A.     Don't buy a computer B.      If you do buy a computer, don't turn it on.
    6. 6. WORLD CLASS HACKERS <ul><li>Dutch Gulf War Hackers </li></ul><ul><ul><li>tried to sell stolen documents to Iraq </li></ul></ul><ul><li>Rome Labs Hackers </li></ul><ul><ul><li>UK teens looking for UFOs and cyber trophies </li></ul></ul><ul><li>Masters of Downloading </li></ul><ul><ul><li>member of an Indian terrorist organization tried to buy </li></ul></ul><ul><ul><li>stolen material from Chameleon and others for $1,000 </li></ul></ul><ul><li>Solar Sunrise </li></ul><ul><ul><li>Iraq? Nope - Californian teens and Israeli mentor </li></ul></ul><ul><li>Moonlight Maze – now Storm Cloud </li></ul><ul><ul><li>ongoing for past 3 years </li></ul></ul><ul><li>Russian Hackers – State Sponsored???? </li></ul>
    9. 9. COMMON CYBER CRIMES <ul><li>Theft of Passwords and invasion of privacy </li></ul><ul><ul><li>Using Social Engineering </li></ul></ul><ul><ul><li>Using Key loggers </li></ul></ul><ul><ul><li>Using Trojans </li></ul></ul><ul><ul><li>Using Phishing Attacks </li></ul></ul><ul><li>Mobile Attacks </li></ul><ul><ul><li>SMS Spoofing </li></ul></ul><ul><ul><li>Caller ID Spoofing </li></ul></ul><ul><ul><li>Blue Jacking </li></ul></ul><ul><li>E-mail Attacks </li></ul><ul><li>Banking and Credit Cards </li></ul>
    10. 10. Key Protection for Home Safety Password protection for Document Safety Login protection for Operating System Safety PASSWORD PROTECTION
    11. 11. THEFT OF PASSWORD Password Stealing can be done by using following techniques: <ul><li>Social Engineering </li></ul><ul><li>Keyloggers </li></ul><ul><li>Trojans </li></ul><ul><li>Phishing </li></ul>
    12. 12. TRUTH
    13. 13. Social Engineering Attack
    14. 14. SOCIAL ENGINEERING <ul><li>Practice of deceiving an individual to gain access to personal </li></ul><ul><li>information through use of : </li></ul><ul><li>Authority </li></ul><ul><li>Trust </li></ul><ul><li>Reciprocation </li></ul><ul><li>Sense of Urgency </li></ul>Results <ul><li>Delete or change files </li></ul><ul><li>Erase your Hard Drives </li></ul><ul><li>Release Confidential Information </li></ul><ul><li>Change Security Settings </li></ul>
    15. 15. <ul><li>KEY LOGGERS: AN INTRODUCTION </li></ul><ul><li>Definition: </li></ul><ul><li>They are spy software which monitor all keystrokes made on the victim’s computer. </li></ul><ul><li>They are used to capture sensitive information like your passwords </li></ul><ul><li>Uses/ Misuses </li></ul><ul><ul><li>Spying Purposes </li></ul></ul><ul><ul><li>To Steal Passwords </li></ul></ul><ul><ul><li>To Steal Sensitive Data </li></ul></ul>KEY LOGGERS
    16. 16. KEY LOGGERS (Cont.) <ul><ul><li>PREVENTION FROM KEYLOGGERS </li></ul></ul><ul><ul><li>Installing a firewall will detect and disable keyloggers before than are installed or do anymore harm on your computer. </li></ul></ul><ul><ul><li>Install a good anti-virus program and Anti-spyware software. </li></ul></ul><ul><ul><li>avoid running programs you receive via email and instant messaging unless you know exactly what it is. </li></ul></ul><ul><ul><li>You need to use anti-keylogger software to detect and remove keyloggers. </li></ul></ul>
    17. 17. TROJAN had a heated argument over one girl, When the girl, asked to choose or Choose Rahul Mukesh Radha Rahul Mukesh Radha Mukesh
    18. 18. TROJAN (Cont.) sent a spoofed e-card the Trojan was installed on his computer. Rahul now had complete control over Mukesh’s computer and proceeded to harass him thoroughly. ( which appeared to have come from Radha’s mail account ) The e-card actually contained a Trojan. opened the card Rahul Mukesh Radha Mukesh
    19. 19. TROJAN (Cont.) <ul><li>Detection & Countermeasures </li></ul><ul><li>One can remove a Trojan using any normal Anti-Virus Software </li></ul><ul><li>There are other ways like port scanning , network security scanners etc which are highly technical and are covered in our advanced courses. </li></ul>
    20. 20. Types of Trojans <ul><li>Trojan horses are broken down in classification based on how they breach systems and the damage they cause. The seven main types of Trojan horses are: </li></ul><ul><li>Remote Access Trojans </li></ul><ul><li>Data Sending Trojans </li></ul><ul><li>Destructive Trojans </li></ul><ul><li>Proxy Trojans </li></ul><ul><li>FTP Trojans </li></ul><ul><li>Security Software Disabler Trojans </li></ul><ul><li>Denial-of-Service Attack (DoS) Trojans </li></ul>
    21. 21. Phishing Attack
    22. 22. PHISHING ATTACK <ul><li>Phishing is a method where information such as account numbers, usernames, and passwords is collected from users and then used to compromise their online accounts. </li></ul><ul><li>The second half of 2004 saw a dramatic rise in the quickly mounting and emerging threat of Phishing. </li></ul>
    23. 23. WORLD STATSTICS 2
    27. 28. Mobile Hacking
    28. 29. SMS SPOOFING
    29. 30. CALL SPOOFING
    30. 31. NEW AGE CYBER CRIME How secure are India's call centres?         Is information security becoming a casualty in India's booming call centres as they drive down costs to keep themselves competitive for foreign clients? [BBC NEWS NETWORK ]
    31. 33. E-MAIL BASED CRIMES <ul><li>The ease, speed and relative anonymity of E-mail has made it a powerful tool for criminals. Some of the major E-mail related crimes are: </li></ul><ul><li>E-mail Spoofing </li></ul><ul><li>Sending Malicious Codes </li></ul><ul><li>through E-mails </li></ul><ul><li>E-mail Bombing </li></ul><ul><li>Sending threatening E-mails </li></ul><ul><li>Defamatory E-mails </li></ul><ul><li>E-mail Frauds </li></ul>
    32. 34. SPREADING TROJAN, VIRUS & WORMS Sends spoofed E-mail: [email_address] Computer A Receives E-mail from: [email_address] Computer B Computer B opens the attachment thinking it’s a security patch software Trojan Spyware Virus Worms Computer Crashed
    33. 35. E-MAIL BOMBING Sent mail Loads of E-mails Blast!!!!
    34. 36. THREATNING E-MAILS With attachment (morphed pornographic photographs of Poorva ) an E-mail message The mail message said that if Poorva were not to pay Rs. 10,000 at a specified place every month, the photographs would be uploaded to the Net and then a copy sent to her fiancé Scared, Poorva at first complied with the wishes of the blackmailer and paid the first Rs. 10, 000 Trusting the reasonableness of her fiancé she told him the truth. Together they approached the police. Investigation turned up the culprit Poorva Poorva’s fiancé Blackmailer Poorva’s supposed friend who wanted that Poorva and her fiancé should break up so that she would get her chance with him
    35. 37. CREDIT CARDS
    36. 38. IT SECURITY ????????? <ul><li>Every information user is a node where the information can leak out. </li></ul><ul><li>Thus Information security is essentially securing the information of any information user. </li></ul><ul><li>It includes the following in today’s terms: </li></ul><ul><ul><li>Data Security </li></ul></ul><ul><ul><li>Computer Security </li></ul></ul><ul><ul><li>LAN Security </li></ul></ul><ul><ul><li>Internet Security </li></ul></ul>
    37. 39. The Situation
    38. 40. The Situation
    39. 41. The Situation
    40. 42. The Situation
    41. 43. The Situation
    42. 44. The Situation
    43. 45. The Situation
    44. 46. LEVEL 1 CONTENTS!!! <ul><li>Windows/Linux Security </li></ul><ul><li>Network Security </li></ul><ul><li>Internet Security (E-Security) </li></ul><ul><li>E-mail Security </li></ul><ul><li>Data Security and Backups </li></ul><ul><li>Prevention from Attacks </li></ul><ul><li>Penetration Testing/Ethical Hacking </li></ul><ul><li>Computer Forensics </li></ul><ul><li>E-Commerce and Cryptography </li></ul><ul><li>Cyber Terrorism </li></ul><ul><li>Security Auditing </li></ul>
    45. 47. LEVEL 2 CONTENTS!!! <ul><li>Mobile Security </li></ul><ul><li>Router Security </li></ul><ul><li>Wireless LAN Security </li></ul><ul><li>VPN/VOIP Security </li></ul><ul><li>Advanced Attacks </li></ul><ul><li>C-programming </li></ul><ul><li>Shell Programming </li></ul><ul><li>Code Security </li></ul><ul><li>Hacking Softwares </li></ul>
    46. 48. LEVEL 3 CONTENTS!!! <ul><li>Information Security Management </li></ul><ul><ul><li>Policies </li></ul></ul><ul><ul><li>ISO 17799 Certification and Audit </li></ul></ul><ul><ul><li>Managing Security Awareness </li></ul></ul><ul><ul><li>Business Continuity and Disaster Recovery Planning </li></ul></ul><ul><ul><li>Security Management Practices </li></ul></ul><ul><li>Security Frameworks </li></ul><ul><li>Current Security Issues and Trends </li></ul><ul><li>Physical Security </li></ul><ul><li>Advanced Cryptography and Attacks </li></ul><ul><li>Browser Hacking </li></ul><ul><li>Advanced Computer Forensics </li></ul><ul><li>Cyber Laws </li></ul><ul><li>Using Security Auditor </li></ul>
    47. 49. Course USP’s <ul><li>Covers both sides of the coin Ethical Hacking and Security which is not offered in any other course </li></ul><ul><li>Hands on course with over 50 tools covered with demonstrations (audio-visual) </li></ul><ul><li>Covers Latest techniques and practices in the security industry along with CASE STUDIES </li></ul><ul><li>Created by Leading security professionals from IIT Delhi, IIT Roorkee, University of Texas at Austin U.S.A and Massachusetts Institute of Technology Boston U.S.A </li></ul><ul><li>Industry endorsed Course, Training methodology and Certification </li></ul><ul><li>Easily affordable as compared to other security courses </li></ul>“ Unique learning methodology and strong course will solve the man power problems in the sector of Information Security”
    48. 50. <ul><li>Secure your Desktop, LAN from crackers </li></ul><ul><li>Ethically hack Desktop, LAN </li></ul><ul><li>Develop a psychology to implement security </li></ul><ul><li>Understand Technical Attacks and take precautions </li></ul>Certified person will be able to….
    49. 51. <ul><li>Protect from dangers on internet </li></ul><ul><li>Secure your Sensitive Data using Cryptography and Steganography </li></ul><ul><li>Secure your E-mails and take precautions from E-mail Attacks </li></ul><ul><li>Perform Penetration Testing for your organization’s/home setup </li></ul>Certified person will be able to….
    50. 52. <ul><li>Find out vulnerabilities in a system </li></ul><ul><li>Create a security policy for your organization </li></ul><ul><li>Catch Cyber Criminals using forensics and other techniques </li></ul><ul><li>Understand latest threats in the world of hacking </li></ul><ul><li>And a lot more…. </li></ul>Certified person will be able to….
    51. 53. <ul><li>Key Innovations in Delivery </li></ul>Training Methodology
    52. 54. Visit Contact for Training enquiries:- Mr. P.Satish kumar info Mobile Number:- +91-9841833455 EducationSure 7/4,Telephone colony ,1 st main road Madhavaram milk colony chennai-52