CYBER SECURITY AND
ETHICAL HACKING
By Riya Nair
Contents
 Introduction
 Cyber Security
 Ethical hacking
 Types of Hacker
 Digital Forensics
 Scope of Cyber Security
 Conclusion
 Interactive session
Introduction
 With the game up for cyber threats and hackers, organizations and their employees
should take a step ahead to deal with them. As we like to connect everything to the
internet, this also increases the chances of vulnerabilities, breaches, and flaws.
 Attackers are now using more sophisticated techniques to target the systems.
Individuals, small-scale businesses, or large organizations are all being impacted. So, all
these firms, whether IT or non-IT firms, have understood the importance of Cyber
Security and focusing on adopting all possible measures to deal with cyber threats.
Cyber Security
 Cyber Security is the process and techniques involved in protecting sensitive data, computer
systems, networks, and software applications from cyber attacks. The Cyber attacks are general
terminology that covers a large number of topics, but some of the popular are:
• Tampering systems and data stored within
• Exploitation of resources
• Unauthorized access to the targeted system and accessing sensitive information
• Disrupting the normal functioning of the business and its processes
• Using ransomware attacks to encrypt data and extort money from victims
Ethical Hacking
Ethical Hacking is defined as any form of hacking that is authorized
by the owner of the target system. It can also refer to the process of
taking active security measures to defend systems from hackers
with malicious intentions on data privacy.
TYPES OF HACKER
WHITE HAT HACKER
 Perform Ethical Hacking
 Have Knowledge on Hacking and Hacker tool set
 Locate security weakness and implement countermeasures
 Also known as penetration tester
 Securing and protecting IT system
BLACK HAT HACKER
 Perform unethical hacking
 Are Criminals hackers and crackers
 Use their skill for malicious purpose
 Focus on cracking and data stealing
GREY HAT HACKER
 Are hybrid between white and black hat hacker
 Sometimes hack illegally or not
 gray hat hacking is considered illegal
 Hired by officials both gets benifited
Digital Forensics
 Digital forensics is the branch of forensic science that deals with the identification and recovery of
digital evidence from the crime scene
 BRANCHES:
 Mobile forensics
 Computer forensics
 Database forensics
 Network forensics
Lets talk about its scopes
 Cyber security analyst
 Network security engineer
 CISO
 Security Architecture
 Malware Analyst
 Penetration Tester
 Computer Forensic Analyst
 IT Security Expertise
 CEH
Conclusion
 As cyber attackers continue to exploit gaps and introduce new threats and vulnerabilities,
teachers, parents and students must also equip themselves
 Cyber security is one of the most important aspects of the fast-paced growing digital
world.
ANY QUESTIONS??
Good job you covered the basics!!
THANK YOU

CYBER SECURITY AND ETHICAL HACKING.pptx

  • 1.
    CYBER SECURITY AND ETHICALHACKING By Riya Nair
  • 2.
    Contents  Introduction  CyberSecurity  Ethical hacking  Types of Hacker  Digital Forensics  Scope of Cyber Security  Conclusion  Interactive session
  • 3.
    Introduction  With thegame up for cyber threats and hackers, organizations and their employees should take a step ahead to deal with them. As we like to connect everything to the internet, this also increases the chances of vulnerabilities, breaches, and flaws.  Attackers are now using more sophisticated techniques to target the systems. Individuals, small-scale businesses, or large organizations are all being impacted. So, all these firms, whether IT or non-IT firms, have understood the importance of Cyber Security and focusing on adopting all possible measures to deal with cyber threats.
  • 4.
    Cyber Security  CyberSecurity is the process and techniques involved in protecting sensitive data, computer systems, networks, and software applications from cyber attacks. The Cyber attacks are general terminology that covers a large number of topics, but some of the popular are: • Tampering systems and data stored within • Exploitation of resources • Unauthorized access to the targeted system and accessing sensitive information • Disrupting the normal functioning of the business and its processes • Using ransomware attacks to encrypt data and extort money from victims
  • 5.
    Ethical Hacking Ethical Hackingis defined as any form of hacking that is authorized by the owner of the target system. It can also refer to the process of taking active security measures to defend systems from hackers with malicious intentions on data privacy.
  • 6.
  • 7.
    WHITE HAT HACKER Perform Ethical Hacking  Have Knowledge on Hacking and Hacker tool set  Locate security weakness and implement countermeasures  Also known as penetration tester  Securing and protecting IT system
  • 8.
    BLACK HAT HACKER Perform unethical hacking  Are Criminals hackers and crackers  Use their skill for malicious purpose  Focus on cracking and data stealing
  • 9.
    GREY HAT HACKER Are hybrid between white and black hat hacker  Sometimes hack illegally or not  gray hat hacking is considered illegal  Hired by officials both gets benifited
  • 10.
    Digital Forensics  Digitalforensics is the branch of forensic science that deals with the identification and recovery of digital evidence from the crime scene  BRANCHES:  Mobile forensics  Computer forensics  Database forensics  Network forensics
  • 11.
    Lets talk aboutits scopes  Cyber security analyst  Network security engineer  CISO  Security Architecture  Malware Analyst  Penetration Tester  Computer Forensic Analyst  IT Security Expertise  CEH
  • 12.
    Conclusion  As cyberattackers continue to exploit gaps and introduce new threats and vulnerabilities, teachers, parents and students must also equip themselves  Cyber security is one of the most important aspects of the fast-paced growing digital world.
  • 13.
    ANY QUESTIONS?? Good jobyou covered the basics!!
  • 14.