SlideShare a Scribd company logo
POWERPOINT
PRESENTATION
TOPIC: CYBER CRIME AND ETHICAL
HACKING
Presented By:
oANKIT KUMAR
o (ankitkumarjha108@gmail.com)
o (www.facebook.com/Ankitkumar108)
Content Overview:
 Definitions (Cyber Crime & Ethical Hacking)
 Cyber Crime (History & Category)
 Facts related to Cyber Crime
 Some Alarming Facts of Cyber Crime
 Cyber Crime in form of Hacking
 Process involved in Hacking
 Type of Hackers
 Some of world’s most famous Hackers
 Ethical Hacking
 Ethical Hacking process
 Advantage and Disadvantage
 What to do if a Computer is Hacked
 Security Tips
 Our Conclusion and Suggestion
Definitions:
CYBER CRIME:
 Crime committed using a
computer and the internet
to steal a person’s
identity or illegal
imports or malicious
programs. Cybercrime is
nothing but where the
computer used as an
object or subject of
crime.
ETHICAL HACKING
 A type of hacking in
which hacker
systematically attempts
to penetrate a computer
system or network on
behalf of its owners for
the purpose of finding
security vulnerabilities t
hat a
malicious hacker could
potentially exploit.
Cyber Crime:
History:
 The first recorded cyber
crime took place in the year
1820.
 The first spam email took
place in 1978 when it was
sent over the Arpanet.
 The first Virus was installed
on an Apple Computer in
1982.
Category:
 HACKING
 CHILD PORNOGRAPHY
 DENIAL OF SERVICE
ATTACK
 VIRUS DISSEMINITION
 COMPUTER VANDALISM
 CYBER TERRORISM
 SOFTWARE PIRACY
Facts related to Cyber Crime:
Types of Cyber attacks (By %age):
 Financial fraud: 11%
 Sabotage of data/networks: 17%
 Theft of proprietary information: 20%
 System penetration from the outside: 25%
 Denial of service: 27%
 Unauthorized access by insiders: 71%
 Employee abuse of internet privileges: 79%
 Viruses: 85%
A Report of ASSOCHAM:
These Facts Are Alarming !!!
Cyber Crimes in form of HACKING:
Hacking:
 The Process of
attempting to gain or
successfully
gaining, unauthorized
access to computer
resources is called
Hacking.
.
Hacking Growth Rate:
Processes involved in Hacking:
Type of Hackers:
 Black Hat:
Violates computer security
for little reason beyond
maliciousness or for personal
gain.
 White Hat:
Breaks security for non-
malicious reasons.
 Grey Hat:
Hacker lies between a black
hat and a white hat hacker.
Some of world’s most famous Hackers:
 EDWARD SNOWDEN:
( Hacked and leaked classified
information from the U.S.
National Security Agency in
2013. Most Wanted Criminal
declared by FBI.)
 ANKIT FADIA:
(A well known Ethic Hacker.
Wrote his first book on
hacking at age of 14.Till now
he has written more than 21
books.)
 JONATHAN JAMES:
(Also known as C0mrade on the
Internet. At age of 15, he hacked a
number of networks, including
those belonging to Bell South,
Miami-Dade, U.S. Defense, and
NASA. Committed suicide in
2008.)
 JULIAN ASSANGE:
(Founder and CEO of
WikiLeaks, An organisation of
hackers known for their hacking
techniques to steel classified
datas of govt. officials.)
 KEVIN MITNICK:
(U.S. Department of Justice
called him the “most wanted
computer criminal in U.S.
history.” His story is so wild that
it was the basis for two featured
films.)
 ALBERT GONZALEZ:
(He paved his way to Internet
fame when he collected over 170
million credit card and ATM card
numbers over a period of 2 years.
Yep. That’s equal to a little
over half the population of the
United States.)
Ethical Hacking:
Working Principle:
“TO CATCH A THIEF ,
THINK LIKE A THIEF…….”
Programmer v/s Hacker:
Ethical Hacking Process:
Executing
Plans
Evaluating Results
Formulating
Plans
Advantage & Disadvantage:
 Advantages:
 Prevents website defacements.
 An evolving technique, advancing day by
day.
 Helps in finding and removing loopholes
in cyber security.
 Can be used to recover lost information
where the computer password has been
lost.
 Teaches you that no technology is 100%
secure.
 To test how good security is on your own
network.
 They call it white hat computer hacking.
 Disadvantages:
 All depends upon the
trustworthiness of the ethical
hacker.
 Hiring professionals is expensive.
 He / She may betray you.
 Criminals can use it to their
advantage.
 It can harm someone's privacy
 It's Illegal
What to do if a Computer is Hacked ???
 Shutdown or turn off the Computer .
 Separate the System from the Network.
 Restore the System with Backup, or Re-install all the
programs.
 Restart the System, connect it with Network and again
Restart it.
 Now Computer is Ready to use.
Security Tips:
 Use antivirus software’s.
 Insert firewalls.
 Uninstall unnecessary software.
 Maintain backup.
 Check security settings and TURN ON Updates.
 Stay anonymous - choose a genderless screen name.
 Never give your full name or address to strangers.
 Learn ‘Etiquette' - follow it and expect it from others.
 Don't respond to harassing or negative messages (flames).
 Get out of uncomfortable or hostile situations quickly.
 Save offending messages.
 Learn more about Internet privacy.
Our Conclusion and Suggestion:
 Remember, a Computer is 100% safe only when it is Turned Off.
 The Technology is getting advanced day by day.
 If you are a System administrator, you should have at least basic knowledge about Tricks and
Techniques related to Computer and Cyber security.
 Keep yourself updated from all Cyber related news.
 Technology is like a fish. The longer it stays on the shelf, the less desirable it becomes.
 Technology is destructive only in the hands of people who do not realize that they are one
and the same process as the universe : (ALLAN WATTS).
Any Questions ????
THANK YOU !!!!!

More Related Content

What's hot

Hacking
HackingHacking
Hacking
Ranjan Som
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Zahid Rajeel
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
Ashish Chandurkar
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
Aitezaz Mohsin
 
Hacking
HackingHacking
Hacking
Asma Khan
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
Rishab Gupta
 
Hacking
HackingHacking
Hacking
Sitwat Rao
 
Hackers
HackersHackers
Hackers
Mahmoud Saeed
 
Hacking
HackingHacking
Hacking
Virus
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
Srikanth VNV
 
Hacking
HackingHacking
Hacking
vkradhika
 
HACKING
HACKINGHACKING
HACKING
D's Surti
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
Rashed Sayyed
 
my new HACKING
my new HACKINGmy new HACKING
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
nayakslideshare
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
Ayush Upadhyay
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
mubeenm50
 
Kinds of hackers
Kinds of hackersKinds of hackers
Kinds of hackers
Alex Havaianas
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
himanshujoshi238
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
Dinesh O Bareja
 

What's hot (20)

Hacking
HackingHacking
Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Hacking
HackingHacking
Hacking
 
Hackers
HackersHackers
Hackers
 
Hacking
HackingHacking
Hacking
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
Hacking
HackingHacking
Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
 
Kinds of hackers
Kinds of hackersKinds of hackers
Kinds of hackers
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 

Similar to Cyber Crime and Ethical Hacking

What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?
Daniel Agudo Garcia
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Hacking
HackingHacking
Hacking
NishaPariyar
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Muhammad Hamza
 
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
Subhoneel Datta
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
TanviModi14
 
CYBER CRIME
CYBER CRIME CYBER CRIME
CYBER CRIME
Raaz Shukla
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
Ashokkumar Gnanasekar
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
Gautam708801
 
Hacking
Hacking Hacking
Hacking
Farkhanda Kiran
 
Hacking
HackingHacking
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
zahid_ned
 
Ict lec#9
Ict lec#9Ict lec#9
Ict lec#9
amberkhan59
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
Esteban
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
zing12345
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
Sweta Kumari Barnwal
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
Sweta Kumari Barnwal
 

Similar to Cyber Crime and Ethical Hacking (20)

What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
Hacking
HackingHacking
Hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
CYBER CRIME
CYBER CRIME CYBER CRIME
CYBER CRIME
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
Hacking
Hacking Hacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ict lec#9
Ict lec#9Ict lec#9
Ict lec#9
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 

Recently uploaded

APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 

Recently uploaded (20)

APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 

Cyber Crime and Ethical Hacking

  • 2. TOPIC: CYBER CRIME AND ETHICAL HACKING Presented By: oANKIT KUMAR o (ankitkumarjha108@gmail.com) o (www.facebook.com/Ankitkumar108)
  • 3. Content Overview:  Definitions (Cyber Crime & Ethical Hacking)  Cyber Crime (History & Category)  Facts related to Cyber Crime  Some Alarming Facts of Cyber Crime  Cyber Crime in form of Hacking  Process involved in Hacking  Type of Hackers  Some of world’s most famous Hackers  Ethical Hacking  Ethical Hacking process  Advantage and Disadvantage  What to do if a Computer is Hacked  Security Tips  Our Conclusion and Suggestion
  • 4. Definitions: CYBER CRIME:  Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs. Cybercrime is nothing but where the computer used as an object or subject of crime. ETHICAL HACKING  A type of hacking in which hacker systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities t hat a malicious hacker could potentially exploit.
  • 5. Cyber Crime: History:  The first recorded cyber crime took place in the year 1820.  The first spam email took place in 1978 when it was sent over the Arpanet.  The first Virus was installed on an Apple Computer in 1982. Category:  HACKING  CHILD PORNOGRAPHY  DENIAL OF SERVICE ATTACK  VIRUS DISSEMINITION  COMPUTER VANDALISM  CYBER TERRORISM  SOFTWARE PIRACY
  • 6. Facts related to Cyber Crime: Types of Cyber attacks (By %age):  Financial fraud: 11%  Sabotage of data/networks: 17%  Theft of proprietary information: 20%  System penetration from the outside: 25%  Denial of service: 27%  Unauthorized access by insiders: 71%  Employee abuse of internet privileges: 79%  Viruses: 85% A Report of ASSOCHAM:
  • 7. These Facts Are Alarming !!!
  • 8. Cyber Crimes in form of HACKING: Hacking:  The Process of attempting to gain or successfully gaining, unauthorized access to computer resources is called Hacking. . Hacking Growth Rate:
  • 10. Type of Hackers:  Black Hat: Violates computer security for little reason beyond maliciousness or for personal gain.  White Hat: Breaks security for non- malicious reasons.  Grey Hat: Hacker lies between a black hat and a white hat hacker.
  • 11. Some of world’s most famous Hackers:  EDWARD SNOWDEN: ( Hacked and leaked classified information from the U.S. National Security Agency in 2013. Most Wanted Criminal declared by FBI.)  ANKIT FADIA: (A well known Ethic Hacker. Wrote his first book on hacking at age of 14.Till now he has written more than 21 books.)  JONATHAN JAMES: (Also known as C0mrade on the Internet. At age of 15, he hacked a number of networks, including those belonging to Bell South, Miami-Dade, U.S. Defense, and NASA. Committed suicide in 2008.)  JULIAN ASSANGE: (Founder and CEO of WikiLeaks, An organisation of hackers known for their hacking techniques to steel classified datas of govt. officials.)  KEVIN MITNICK: (U.S. Department of Justice called him the “most wanted computer criminal in U.S. history.” His story is so wild that it was the basis for two featured films.)  ALBERT GONZALEZ: (He paved his way to Internet fame when he collected over 170 million credit card and ATM card numbers over a period of 2 years. Yep. That’s equal to a little over half the population of the United States.)
  • 12. Ethical Hacking: Working Principle: “TO CATCH A THIEF , THINK LIKE A THIEF…….” Programmer v/s Hacker:
  • 14. Advantage & Disadvantage:  Advantages:  Prevents website defacements.  An evolving technique, advancing day by day.  Helps in finding and removing loopholes in cyber security.  Can be used to recover lost information where the computer password has been lost.  Teaches you that no technology is 100% secure.  To test how good security is on your own network.  They call it white hat computer hacking.  Disadvantages:  All depends upon the trustworthiness of the ethical hacker.  Hiring professionals is expensive.  He / She may betray you.  Criminals can use it to their advantage.  It can harm someone's privacy  It's Illegal
  • 15. What to do if a Computer is Hacked ???  Shutdown or turn off the Computer .  Separate the System from the Network.  Restore the System with Backup, or Re-install all the programs.  Restart the System, connect it with Network and again Restart it.  Now Computer is Ready to use.
  • 16. Security Tips:  Use antivirus software’s.  Insert firewalls.  Uninstall unnecessary software.  Maintain backup.  Check security settings and TURN ON Updates.  Stay anonymous - choose a genderless screen name.  Never give your full name or address to strangers.  Learn ‘Etiquette' - follow it and expect it from others.  Don't respond to harassing or negative messages (flames).  Get out of uncomfortable or hostile situations quickly.  Save offending messages.  Learn more about Internet privacy.
  • 17. Our Conclusion and Suggestion:  Remember, a Computer is 100% safe only when it is Turned Off.  The Technology is getting advanced day by day.  If you are a System administrator, you should have at least basic knowledge about Tricks and Techniques related to Computer and Cyber security.  Keep yourself updated from all Cyber related news.  Technology is like a fish. The longer it stays on the shelf, the less desirable it becomes.  Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe : (ALLAN WATTS).