Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Ethical Hacking
1.
2. WHAT IS
SECURITY
Security is the degree of resistance to, or
protection from, harm.
It is the state of being free from danger or
threat.
3. Difference Between Security
and Protection
Security and protection are extremely close
concepts though not same.
Security measures are adopted to increase
the level of protection
The feeling of protection arises when one
has enough security measures
Security is a type of protection against
external threats.
4. Overview of
Hacking
Hack
• Examine something very minutely
• The rapid crafting of new program or the making
of changes to existing, usually complicated
software
Hacker
• The person who hacks
Cracker
• System intruder/ destroyer
5. History Of
Hacking
The first hacker was appeared in 1960’s at the
Massachusetts Institute Of Technology(MIT)
During the 1970’s, a different kind of hacker
appeared: Phone Phreaker or Phone Hacker
6. In the 1980’s, phreaks started to migrate to
computers, and the first Bulletin Board System (BBS)
appeared
During the 1990’s, when the use of internet
widespread around the world, hackers multiplied
7. Hacker and Ethical
Hacker
Hacker
system or network without• Access computer
authorization
• Breaks the law
Ethical Hacker
• Performs most of the same activities but with owner’s
permission
• Employed by companies to perform Penetration Tests
8. Types of Hacker
White HatHacker
• Good guys
• Don’t use their skill for illegal purpose
• Computer security experts and help to protect
from Black Hats.
Black HatHacker
• Bad guys
• Use their skill maliciously for personal gain
• Hack banks, steal credit cards and deface websites
Grey HatHacker
• It is a combination of White hat n Black Hat Hackers
• Goal of grey hat hackers is to provide national
security
9. Some
Tools
• Who is, ping
• Traceroot, nslookup
Footprinting
• nmap
• nessus
Scanning
• Netcat. tcpdump
• Telnet, firewalk
Enumeration
11. Recent news of Hacking
• Next generation patch management tool released- Secunia CSI
7.0
• Anonymity tool TOR gains more than 1.2 million users since
NSA PRISM Scandal
• Fearof NSA PRISM: IndianGovernment may ban US email
services for official Communication
• CISCO vulnerability allows remote attacker to take control of
Windows System
• FBI uses Anonymous Hackers to attack foreign Governments