SlideShare a Scribd company logo
Hacking
Group Members
Contents Hacking
Types of Hackers
Ethical Hacking
Case Study
Background
Own motivation
Investigation
Palenties
Conclusion
Cracking
Hacking
Hacking is the gaining of
access(wanted or unwanted) to a
computer and viewing, copying, or
creating data without the intention of
destroying data or harming the
computer.
Hacker
Hacker is programmer who
breaks into computer systems in
order to steal or change
information
Cracking
Process in which a person who gains
unauthorized access to a computer
with the intention of causing damage.
Cracker
Cracker is a programmer who
cracks (gains unauthorized
access to) computers, typically
to do malicious things .
"crackers are often mistakenly
called hackers"
Types of Hackers
White Hat Hackers
Black Hat Hackers
Grey Hat Hackers
ETHICAL HACKING
A LICENCE TO HACK
 Ethical hacking is the term that describes
hacking performed to help a company or individual
and identify potential threats on the computer or
network.
Ethical Hacker
 Ethical hacker Refers to a person who apply
hacking skills for defensive purposes
“If you know the enemy and know yourself,
you need not fear the result of a hundred
battles.” The Art of War
Ethical Hacking is Legal, so ethical hacker should
have to follow rules
Rules for Ethical Hacker
Hacker should have permission to probe the
network and attempt to identify potential security
risks.
Hacker should respect the individual's or company's
privacy and only go looking for security issues.
Hacker should let the company know of any security
vulnerabilities you locate in their software or
hardware if not already known by the company.
Need of Ethical Hacking
Ethical hacking is necessary to protect against
an attack, understanding where the systems
are vulnerable is necessary.
Ethical hacking helps companies first
understand their risk and then, manage them.
Ethical hacking can be one of the most
effective ways to fix security Problems
Case Study
AAPT -- HACKING
AAPT- Australian Associated Press
Telecommunications
Background
This case involved AAPT's company data
(including customers' personal information)
being accessed and stolen by Anonymous, an
international network of "hackers“ between 17
and 19 July 2012.
Anonymous subsequently published the data
on the internet.
The data was held on a server managed by
WebCentral Pty Ltd, a web-hosting business
unit of Melbourne IT.
Under the contract between AAPT and
WebCentral, WebCentral was required to fully
manage and maintain the server, except for
the custom application content and data,
which was the responsibility of AAPT.
Anonymous accessed the data though the
application (Cold Fusion) installed on the
server, which was a "customer-managed
application" and was AAPT's responsibility
under the contract.
AAPT was using an old version of Cold
Fusion, which was known to have
vulnerabilities.
When Melbourne IT (Australian domain
name registration Service ) became aware
of the attack , it notified AAPT, which
immediately disconnected from the
network and took steps to ensure the data
could not be further compromised.
Own motion investigation
Agencies didn’t get any Complaint about
this act, so they started Own Motion
Investigation
Results of Inverstigation
The Commissioner found AAPT failed to take
reasonable steps to secure the personal
information.
 the Commissioner examined the Cold Fusion
application to determine whether it was
suitable in the circumstances.
The Commissioner noted that AAPT used a
seven year-old version of Cold Fusion, which
was known to have vulnerabilities.
Cont...... Results of Inverstigation
While the security "patches" on the version
used by AAPT were upto-date, the failure to use
newer versions of the application that did not
have the vulnerabilities of the older version,
meant that AAPT had not taken reasonable
steps to protect the information.
The Commissioner noted that it was unclear
whether AAPT was aware of what personal
information was on the server, what Cold Fusion
applications were installed and the parts of the
server they related to or who was responsible
for the maintenance and management of the
application.
Cont...... Results of Inverstigation
The Commissioner identified several
deficiencies in the security of data provisions in
the contract between AAPT and WebCentral
including:
data was not assessed to determine whether
it included personal information and its
sensitivity
existing or emerging security risks were not
required to be identified and addressed.
vulnerability scanning and the effectiveness
of the Cold Fusion application was not required
to be undertaken.
Cont...... Results of Inverstigation
The Commissioner identified several
deficiencies in the security of data provisions in
the contract between AAPT and WebCentral
including:
data was not assessed to determine whether
it included personal information and its
sensitivity
existing or emerging security risks were not
required to be identified and addressed.
vulnerability scanning and the effectiveness
of the Cold Fusion application was not required
to be undertaken.
Ethical Issues
The Computer Fraud and Abuse Act of 1986
made it illegal to access a computer without
authorization and steal private information or
financial information.
It is responsibility of an orgranization to
protect the private information of it’s user.
AAPT failed to protect the users personal
information.
Penalties
The Commissioner recommended AAPT:
Take steps to ensure all IT applications held
internally or externally, which hold or use
personal information, are subject to vulnerability
assessment and testing and regular vulnerability
scanning.
conduct regular audits of AAPT's IT security
framework to ensure security measures are
working effectively, and that policies and
procedures relating to data security are
being complied with.
Cont... Penalties
 Undertake steps to ensure appropriate
classification of data it holds either internally or
externally, including whether it includes personal
information and the sensitivity of that
information.
 Review the terms of the contracts it has with IT
suppliers that hold or manage AAPT data to
ensure clarity around which party has
responsibility for identifying and addressing data
security issues (such as vulnerabilities associated
with old versions of IT applications).
As the case involved breaches of NPPs, the
Commissioner was unable to impose a penalty on
AAPT.
NPP2.1
An organisation may only use or disclose
personal information for the primary purpose of
collection under NPP2.1. As the publication of
the data was not for the primary purpose of the
collection, the Commissioner examined whether
the publication amounted to disclosure by AAPT.
As the data was made public through the
malicious actions of Anonymous, the
Commissioner found that the publication was not
a disclosure by AAPT.
Conclusion
If a hacker wants to get inside your
system, he/she will, and there is nothing
you can do about it. The only thing you can
do is make it harder for him to get in.
Always upgrade your system or
softwares regularly.
Ethical Hacking

More Related Content

What's hot

Web defacement
Web defacementWeb defacement
Web defacementstudent
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
Vishal Kumar
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hacking
eiti panchkula
 
basic knowhow hacking
basic knowhow hackingbasic knowhow hacking
basic knowhow hacking
Anant Shrivastava
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Neel Kamal
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
Divyank Jindal
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N GHafizra Mas
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
shreya_omar
 
Hacking 1
Hacking 1Hacking 1
Hacking 1
sonal bisla
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Aditya Vikram Singhania
 
Kinds of hackers
Kinds of hackersKinds of hackers
Kinds of hackers
Alex Havaianas
 
HACKING
HACKINGHACKING
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
mubeenm50
 
185
185185
Hacker
HackerHacker
Hacker
Ramasubbu .P
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
Shravan Sanidhya
 
Basic Introduction to hacking
Basic Introduction to hackingBasic Introduction to hacking
Basic Introduction to hacking
Sainath Volam
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
Sumit Satam
 

What's hot (20)

Web defacement
Web defacementWeb defacement
Web defacement
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hacking
 
basic knowhow hacking
basic knowhow hackingbasic knowhow hacking
basic knowhow hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Hacking 1
Hacking 1Hacking 1
Hacking 1
 
Hacking and Anti Hacking
Hacking and Anti HackingHacking and Anti Hacking
Hacking and Anti Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Kinds of hackers
Kinds of hackersKinds of hackers
Kinds of hackers
 
HACKING
HACKINGHACKING
HACKING
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
 
185
185185
185
 
Hacker
HackerHacker
Hacker
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Basic Introduction to hacking
Basic Introduction to hackingBasic Introduction to hacking
Basic Introduction to hacking
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 

Viewers also liked

Mission vishvas-resume template-12
Mission vishvas-resume template-12Mission vishvas-resume template-12
Mission vishvas-resume template-12mission_vishvas
 
Mission vishvas-resume template-2
Mission vishvas-resume template-2Mission vishvas-resume template-2
Mission vishvas-resume template-2mission_vishvas
 
Anger Management
Anger ManagementAnger Management
Anger Management
M R Jhalawad
 
Menyimak Untuk Memahami Teks Seni
Menyimak Untuk Memahami Teks SeniMenyimak Untuk Memahami Teks Seni
Menyimak Untuk Memahami Teks Seni
Pbp II
 
Cmmaao pmi-resume template-18-cmmaao-pmi
Cmmaao pmi-resume template-18-cmmaao-pmiCmmaao pmi-resume template-18-cmmaao-pmi
Cmmaao pmi-resume template-18-cmmaao-pmimission_vishvas
 
Cmmaao pmi-resume template-19
Cmmaao pmi-resume template-19Cmmaao pmi-resume template-19
Cmmaao pmi-resume template-19mission_vishvas
 
Cmmaao resource-assignment-matrix-pmi-pmp
Cmmaao resource-assignment-matrix-pmi-pmpCmmaao resource-assignment-matrix-pmi-pmp
Cmmaao resource-assignment-matrix-pmi-pmpmission_vishvas
 
Les tic en l educació obligatoria2
Les tic en l educació obligatoria2Les tic en l educació obligatoria2
Les tic en l educació obligatoria2
paufb
 
Mission vishvas-resume template-6
Mission vishvas-resume template-6Mission vishvas-resume template-6
Mission vishvas-resume template-6mission_vishvas
 
Journey to sef development
Journey to sef developmentJourney to sef development
Journey to sef development
M R Jhalawad
 
Cmmaao pmi-resume template-3
Cmmaao pmi-resume template-3Cmmaao pmi-resume template-3
Cmmaao pmi-resume template-3mission_vishvas
 
Cmmaao pmi-resume template-13
Cmmaao pmi-resume template-13Cmmaao pmi-resume template-13
Cmmaao pmi-resume template-13mission_vishvas
 
Manual fly ash brick making m achine price catalogue codoca .
Manual fly ash brick making m achine price catalogue codoca   .Manual fly ash brick making m achine price catalogue codoca   .
Manual fly ash brick making m achine price catalogue codoca .
mission_vishvas
 
Cmmaao assumptions-and-constraints-pmp-pmi
Cmmaao assumptions-and-constraints-pmp-pmiCmmaao assumptions-and-constraints-pmp-pmi
Cmmaao assumptions-and-constraints-pmp-pmimission_vishvas
 
Synthesis Presentation
Synthesis PresentationSynthesis Presentation
Synthesis PresentationJennifer To
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
Matvey Moseykov
 
Cmmaao pmi-resume template-9
Cmmaao pmi-resume template-9Cmmaao pmi-resume template-9
Cmmaao pmi-resume template-9mission_vishvas
 

Viewers also liked (20)

Mission vishvas-resume template-12
Mission vishvas-resume template-12Mission vishvas-resume template-12
Mission vishvas-resume template-12
 
Mission vishvas-resume template-2
Mission vishvas-resume template-2Mission vishvas-resume template-2
Mission vishvas-resume template-2
 
Anger Management
Anger ManagementAnger Management
Anger Management
 
Hardware sipzing
Hardware sipzingHardware sipzing
Hardware sipzing
 
Menyimak Untuk Memahami Teks Seni
Menyimak Untuk Memahami Teks SeniMenyimak Untuk Memahami Teks Seni
Menyimak Untuk Memahami Teks Seni
 
Cmmaao pmi-resume template-18-cmmaao-pmi
Cmmaao pmi-resume template-18-cmmaao-pmiCmmaao pmi-resume template-18-cmmaao-pmi
Cmmaao pmi-resume template-18-cmmaao-pmi
 
Cmmaao pmi-resume template-19
Cmmaao pmi-resume template-19Cmmaao pmi-resume template-19
Cmmaao pmi-resume template-19
 
Cmmaao resource-assignment-matrix-pmi-pmp
Cmmaao resource-assignment-matrix-pmi-pmpCmmaao resource-assignment-matrix-pmi-pmp
Cmmaao resource-assignment-matrix-pmi-pmp
 
Les tic en l educació obligatoria2
Les tic en l educació obligatoria2Les tic en l educació obligatoria2
Les tic en l educació obligatoria2
 
Resume template 7
Resume template 7Resume template 7
Resume template 7
 
Mission vishvas-resume template-6
Mission vishvas-resume template-6Mission vishvas-resume template-6
Mission vishvas-resume template-6
 
Journey to sef development
Journey to sef developmentJourney to sef development
Journey to sef development
 
Cmmaao pmi-resume template-3
Cmmaao pmi-resume template-3Cmmaao pmi-resume template-3
Cmmaao pmi-resume template-3
 
Cmmaao pmi-resume template-13
Cmmaao pmi-resume template-13Cmmaao pmi-resume template-13
Cmmaao pmi-resume template-13
 
Manual fly ash brick making m achine price catalogue codoca .
Manual fly ash brick making m achine price catalogue codoca   .Manual fly ash brick making m achine price catalogue codoca   .
Manual fly ash brick making m achine price catalogue codoca .
 
Resume template 1
Resume template 1Resume template 1
Resume template 1
 
Cmmaao assumptions-and-constraints-pmp-pmi
Cmmaao assumptions-and-constraints-pmp-pmiCmmaao assumptions-and-constraints-pmp-pmi
Cmmaao assumptions-and-constraints-pmp-pmi
 
Synthesis Presentation
Synthesis PresentationSynthesis Presentation
Synthesis Presentation
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
Cmmaao pmi-resume template-9
Cmmaao pmi-resume template-9Cmmaao pmi-resume template-9
Cmmaao pmi-resume template-9
 

Similar to Ethical Hacking

Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
Affine Analytics
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
mistryritesh
 
29386971 hacking
29386971 hacking29386971 hacking
29386971 hackingjoeymar143
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
Mohan Jadhav
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
UthsoNandy
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
cuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
salmonpybus
 
Easy security presentation 1
Easy security presentation 1Easy security presentation 1
Easy security presentation 1Michael Buschmann
 
Cat21:Development Mangement Information Systems
Cat21:Development Mangement Information SystemsCat21:Development Mangement Information Systems
Cat21:Development Mangement Information Systems
Simeon Ogao
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
edgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
fathwaitewalter
 
Information Security
Information SecurityInformation Security
Information Securitysteffiann88
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
IRJET Journal
 
Include at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inInclude at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words in
maribethy2y
 
Case Study.pdf
Case Study.pdfCase Study.pdf
Case Study.pdf
DamaineFranklinMScBE
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical Hacking
IRJET Journal
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
The Security of Things Forum
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
Belayet Hossain
 

Similar to Ethical Hacking (20)

Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
29386971 hacking
29386971 hacking29386971 hacking
29386971 hacking
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Easy security presentation 1
Easy security presentation 1Easy security presentation 1
Easy security presentation 1
 
Cat21:Development Mangement Information Systems
Cat21:Development Mangement Information SystemsCat21:Development Mangement Information Systems
Cat21:Development Mangement Information Systems
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Information Security
Information SecurityInformation Security
Information Security
 
Ethical hacking1
Ethical hacking1Ethical hacking1
Ethical hacking1
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
 
Include at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inInclude at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words in
 
Case Study.pdf
Case Study.pdfCase Study.pdf
Case Study.pdf
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical Hacking
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
 

Recently uploaded

一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
JeyaPerumal1
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 

Recently uploaded (20)

一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 

Ethical Hacking

  • 1.
  • 3. Contents Hacking Types of Hackers Ethical Hacking Case Study Background Own motivation Investigation Palenties Conclusion Cracking
  • 4. Hacking Hacking is the gaining of access(wanted or unwanted) to a computer and viewing, copying, or creating data without the intention of destroying data or harming the computer. Hacker Hacker is programmer who breaks into computer systems in order to steal or change information
  • 5. Cracking Process in which a person who gains unauthorized access to a computer with the intention of causing damage. Cracker Cracker is a programmer who cracks (gains unauthorized access to) computers, typically to do malicious things . "crackers are often mistakenly called hackers"
  • 6. Types of Hackers White Hat Hackers Black Hat Hackers Grey Hat Hackers
  • 7. ETHICAL HACKING A LICENCE TO HACK  Ethical hacking is the term that describes hacking performed to help a company or individual and identify potential threats on the computer or network.
  • 8. Ethical Hacker  Ethical hacker Refers to a person who apply hacking skills for defensive purposes “If you know the enemy and know yourself, you need not fear the result of a hundred battles.” The Art of War
  • 9. Ethical Hacking is Legal, so ethical hacker should have to follow rules Rules for Ethical Hacker Hacker should have permission to probe the network and attempt to identify potential security risks. Hacker should respect the individual's or company's privacy and only go looking for security issues. Hacker should let the company know of any security vulnerabilities you locate in their software or hardware if not already known by the company.
  • 10. Need of Ethical Hacking Ethical hacking is necessary to protect against an attack, understanding where the systems are vulnerable is necessary. Ethical hacking helps companies first understand their risk and then, manage them. Ethical hacking can be one of the most effective ways to fix security Problems
  • 11. Case Study AAPT -- HACKING AAPT- Australian Associated Press Telecommunications
  • 12. Background This case involved AAPT's company data (including customers' personal information) being accessed and stolen by Anonymous, an international network of "hackers“ between 17 and 19 July 2012. Anonymous subsequently published the data on the internet. The data was held on a server managed by WebCentral Pty Ltd, a web-hosting business unit of Melbourne IT.
  • 13. Under the contract between AAPT and WebCentral, WebCentral was required to fully manage and maintain the server, except for the custom application content and data, which was the responsibility of AAPT. Anonymous accessed the data though the application (Cold Fusion) installed on the server, which was a "customer-managed application" and was AAPT's responsibility under the contract. AAPT was using an old version of Cold Fusion, which was known to have vulnerabilities.
  • 14. When Melbourne IT (Australian domain name registration Service ) became aware of the attack , it notified AAPT, which immediately disconnected from the network and took steps to ensure the data could not be further compromised.
  • 15. Own motion investigation Agencies didn’t get any Complaint about this act, so they started Own Motion Investigation
  • 16. Results of Inverstigation The Commissioner found AAPT failed to take reasonable steps to secure the personal information.  the Commissioner examined the Cold Fusion application to determine whether it was suitable in the circumstances. The Commissioner noted that AAPT used a seven year-old version of Cold Fusion, which was known to have vulnerabilities.
  • 17. Cont...... Results of Inverstigation While the security "patches" on the version used by AAPT were upto-date, the failure to use newer versions of the application that did not have the vulnerabilities of the older version, meant that AAPT had not taken reasonable steps to protect the information. The Commissioner noted that it was unclear whether AAPT was aware of what personal information was on the server, what Cold Fusion applications were installed and the parts of the server they related to or who was responsible for the maintenance and management of the application.
  • 18. Cont...... Results of Inverstigation The Commissioner identified several deficiencies in the security of data provisions in the contract between AAPT and WebCentral including: data was not assessed to determine whether it included personal information and its sensitivity existing or emerging security risks were not required to be identified and addressed. vulnerability scanning and the effectiveness of the Cold Fusion application was not required to be undertaken.
  • 19. Cont...... Results of Inverstigation The Commissioner identified several deficiencies in the security of data provisions in the contract between AAPT and WebCentral including: data was not assessed to determine whether it included personal information and its sensitivity existing or emerging security risks were not required to be identified and addressed. vulnerability scanning and the effectiveness of the Cold Fusion application was not required to be undertaken.
  • 20. Ethical Issues The Computer Fraud and Abuse Act of 1986 made it illegal to access a computer without authorization and steal private information or financial information. It is responsibility of an orgranization to protect the private information of it’s user. AAPT failed to protect the users personal information.
  • 21. Penalties The Commissioner recommended AAPT: Take steps to ensure all IT applications held internally or externally, which hold or use personal information, are subject to vulnerability assessment and testing and regular vulnerability scanning. conduct regular audits of AAPT's IT security framework to ensure security measures are working effectively, and that policies and procedures relating to data security are being complied with.
  • 22. Cont... Penalties  Undertake steps to ensure appropriate classification of data it holds either internally or externally, including whether it includes personal information and the sensitivity of that information.  Review the terms of the contracts it has with IT suppliers that hold or manage AAPT data to ensure clarity around which party has responsibility for identifying and addressing data security issues (such as vulnerabilities associated with old versions of IT applications). As the case involved breaches of NPPs, the Commissioner was unable to impose a penalty on AAPT.
  • 23. NPP2.1 An organisation may only use or disclose personal information for the primary purpose of collection under NPP2.1. As the publication of the data was not for the primary purpose of the collection, the Commissioner examined whether the publication amounted to disclosure by AAPT. As the data was made public through the malicious actions of Anonymous, the Commissioner found that the publication was not a disclosure by AAPT.
  • 24. Conclusion If a hacker wants to get inside your system, he/she will, and there is nothing you can do about it. The only thing you can do is make it harder for him to get in. Always upgrade your system or softwares regularly.