SlideShare a Scribd company logo
Powerpoint TemplatesPowerpoint Templates
Page 1
ETHICA
L
HACKIN
G
Powerpoint Templates
CoNTEN
T
Overview of Hacking
Types of Hacker
Why do Hackers hack
Hacker’s Language
Hackers’ language
•
•
•
•
•
•
•
•
•
•
•
•
•
?
What is Ethical Hacking
Why do we need Ethical Hacking
Methodology of Ethical Hacking
History of cryptography
Ethical Hacking Tools
Skills of an Ethical Hacker
Page 2 2
Powerpoint Templates
oVERVIEW oF
HACKING
Hack
•
–
• Hacker
– The person who hacks
• Cracker
– System destroyer
Page 3 3
To getting into someone’s computer system without
permission in order to find out information or do something
illegal
Powerpoint Templates
TYPES oF
HACKER White Hat Hackers:
A White Hat who specializes in penetration testing and in
another testing methodologies to ensure the security of
organization's information systems.
 Black Hat Hackers:
A Black Hat is the villain or bad guy, especially in a western
black hat inmovie in which such a character would wear a
contrast to the hero's white hat.
Gray Hat Hackers:
A Grey Hat,
whose
in the hacking community, refers to a skilled
hacker activities fall somewhere between white and
black hat hackers on a variety of spectra.
Page 4 3
Powerpoint Templates
WHY Do PEoPLE HACK
To make security stronger ( Ethical
Hacking )
Just for fun
Show off
Hack other systems secretly
Notify many people their thought
Steal important information
Destroy enemy’s computer network
during the war.
Page 5
Powerpoint Templates
HACKER’
S
LANGuAGE
|| -> n
|/| -> m
s -> z
z -> s
f -> ph
ph -> f
x -> ck
ck -> x
1
3
4
7
9
0
$
->
->
->
->
->
->
->
i or
e
a
t
g
o
s
l
| -> i or l
Page 6
Powerpoint Templates
HACKER’S
LANGuAGE
TRANSLATIoN
• Ex:
–1 d1d n0t h4ck th1s p4g3,
th1s wh3n 1 h4ck3d 1n
1t w4s l1k3
–I did not hack this
when I hacked in
page, it was like this
Page 7
Powerpoint Templates
What is Ethical hacking
•
•
•
•
It is Legal
Permission is obtained from the target
Part of an overall security program
Identify vulnerabilities visible from Internet at particular
point of time
Ethical hackers possesses same skills, mindset and tools•
of a hacker
manner
Also Called
but the attacks are done in a non-destructive
• – Attack & Penetration Testing
Page 8
Powerpoint Templates
Why Do
WE
nEED Ethical hacking
Social
Engineering
Automated
Organizational Attacks
Attacks
Restricted
Data
Accidental
Breaches in
Security Denial of
Viruses, Trojan Service (DoS)
Horses,
and Worms
Protection from possible External Attacks
Page 9
MEthoDology oF hacking
Phase 1-Reconna ssance
Phase 2-Scanning
Phase 3-Gaining Access
Phase 4-Maintaining Access
Phase 5-Coveri ng Tracks
Powerpoint Templates
i
Powerpoint Templates
1. Footprinting
This is the first
stage in the methodology of hacking. As given in
the analogy, this is the stage in which the hacker
collects information about the company which the
personal is going to hack.
Page 11
Powerpoint Templates
2. scanning
Scanning is the second phase in the hacking
methodology in which the hacker tries to make a
ablue print of the target network. It is similar to
thief going through your neighborhood and
checking every door and window on each house to
see which ones are open and which ones are
locked.
Page 12
Powerpoint Templates
EnuMERation
Enumeration is the ability of a hacker to convince
some servers to give
make
them information that is
vital to them to
to
an attack. By doing this
hacker aims
found
find what resources and shares
can be in the system
Page 13
Powerpoint Templates
3. gaining accEss
This is the actual hacking phase in which the
hacker gains access to the system. The hacker
will make use of all the information he collected in
the pre-attacking phases.
Page 14
Powerpoint Templates
4. Maintaining access
Now the hacker is inside the system by some
means by password guessing or exploiting some
of its vulnerabilities. This means that he is now in
a position to upload some files and download
some of them.
Page 15
Powerpoint Templates
5. covering tracks
Now we come to the final step in the hacking. There
is a saying that “everybody knows a good hacker
but nobody knows a great hacker”. This means that
a good hacker can always clear tracks or any record
that they may
he was here.
be present in the network to prove that
Page 16
Powerpoint Templates
History of cryptograpHy
• Cryptanalysis studies the process of breaking
encryption algorithms
• When a new encryption algorithm is
todeveloped,
break it
cryptanalysts study it and try
– Or prove that it is impractical to break it
(taking much time and many resources)
17
Page 17
Powerpoint Templates 19
steganograpHy
• The process of hiding data in plain view in
pictures, graphics, or text
– Example: changing colors slightly to
encode individual bits in an image
Page 19
Powerpoint Templates
syMMetric cryptograpHy
algoritHMs
Symmetric algorithms have one key that
encrypts and decrypts data
Advantages
•
•
–
–
Symmetric algorithms are fast
They are difficult to break
is used
if a large key size
– Only one key needed
20
Page 20
Powerpoint Templates
syMMetric cryptograpHy
• One key encrypts and decrypts data
• Cleartext with Key makes Ciphertext
• Ciphertext with Key makes Cleartext
21
Page 21
Winning Lotto
#s:
aWDHOP#@-w9
aWDHOP#@-w9Winning Lotto
#s:
Powerpoin Templa es
ETHICAL HACKING
TOOLS
• Samspade
Samspade is a simple tool which provides us information
about a particular host. This tool is very much helpful in finding
the addresses, phone numbers etc
• Email Tracker and Visual Route
We often used to receive many spam messages in our mailbox. We
don’t
helps
Every
know where it comes from. Email tracker is software which
us to find from which server the mail does actually came from.
message we receive will have a header associated with it. The
email tracker uses this header information for find the location.
t t
Page 22
Powerpoin Templa es
SKILLS Of AN ETHICAL
HACKEr
• Routers -
protocols
Microsoft
knowledge of routers, routing
and access control lists.
- skills in operation ,•
configuration and management.
Linux - knowledge of Linux/Unix; security
setting, configuration, and services.
•
• Firewalls - configuration, & operation
intrusion detection systems.
of
t t
Page 24
Powerpoin Templa es
Cyber Security
Cyber security is the technology and
process that is designed to protect
networks and devices from attack,
damage, or unauthorized access.
t t
Page 25 23
Powerpoin Templa es
Advantages
• Production of business.
• Increased productivity.
• Inspires customers confidence
• Stops your website from crashing.
• protection towerds customers and
client's data.
t t
Page 26 23
Powerpoin Templa es
Disadvantages
• Costs are high
t t
Page 27 23
Powerpoin Templa es
why cyber security ?
Confidentiality, Integrity and Availability
Have served as the industry standard
for computer security from the time of
first mainframes.
t t
Page 28 23
Powerpoin Templa es
How cyber security works ?
t t
Page 29 23
Powerpoin Templa es
Page 26
THANK YOU
t t
Know hacking, but no hacking

More Related Content

What's hot

Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Suryansh Srivastava
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
GulnurAzat
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
Ren Tuazon
 
The Internet of Things (IoT) and cybersecurity: A secure-by-design approach
The Internet of Things (IoT) and cybersecurity: A secure-by-design approachThe Internet of Things (IoT) and cybersecurity: A secure-by-design approach
The Internet of Things (IoT) and cybersecurity: A secure-by-design approach
Deloitte United States
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark web
Jisc
 
Hacking
Hacking Hacking
Hacking
Farkhanda Kiran
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
A Raheem Ansari
 
Botnets
BotnetsBotnets
Botnets
Kavisha Miyan
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
LearningwithRayYT
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
AmbikaMalgatti
 
Cia security model
Cia security modelCia security model
Cia security model
Imran Ahmed
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
Shravan Sanidhya
 
Social engineering
Social engineering Social engineering
Social engineering
Vîñàý Pãtêl
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji
 

What's hot (20)

Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
The Internet of Things (IoT) and cybersecurity: A secure-by-design approach
The Internet of Things (IoT) and cybersecurity: A secure-by-design approachThe Internet of Things (IoT) and cybersecurity: A secure-by-design approach
The Internet of Things (IoT) and cybersecurity: A secure-by-design approach
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark web
 
Hacking
Hacking Hacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Botnets
BotnetsBotnets
Botnets
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Cia security model
Cia security modelCia security model
Cia security model
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Social engineering
Social engineering Social engineering
Social engineering
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 

Similar to Ethical hacking and cyber security intro

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Mukul Agarwal
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
baabtra.com - No. 1 supplier of quality freshers
 
Session Slide
Session SlideSession Slide
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
ankit sarode
 
Hacking
HackingHacking
Hacking
VipinYadav257
 
ethical hacking.pptx
ethical hacking.pptxethical hacking.pptx
ethical hacking.pptx
daxgame
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Nitheesh Adithyan
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
vamshimatangi
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Chetanmalviya8
 
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptxEthical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
GovandJamalSaeed
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass Protocol
Prasad Pawar
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Rishabha Garg
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
Pawan Patil
 
Ethical hacking.pptx
Ethical hacking.pptxEthical hacking.pptx
Ethical hacking.pptx
NilkanthPatel38
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
chrizjohn896
 
sourabh_sipPPT.pptx
sourabh_sipPPT.pptxsourabh_sipPPT.pptx
sourabh_sipPPT.pptx
SourabhRuhil4
 
An Introduction to Ethical Hacking
An Introduction to Ethical HackingAn Introduction to Ethical Hacking
An Introduction to Ethical Hacking
Vinny Vessel
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
 

Similar to Ethical hacking and cyber security intro (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Session Slide
Session SlideSession Slide
Session Slide
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Hacking
HackingHacking
Hacking
 
ethical hacking.pptx
ethical hacking.pptxethical hacking.pptx
ethical hacking.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptxEthical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass Protocol
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
 
Ethical hacking.pptx
Ethical hacking.pptxEthical hacking.pptx
Ethical hacking.pptx
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
sourabh_sipPPT.pptx
sourabh_sipPPT.pptxsourabh_sipPPT.pptx
sourabh_sipPPT.pptx
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
An Introduction to Ethical Hacking
An Introduction to Ethical HackingAn Introduction to Ethical Hacking
An Introduction to Ethical Hacking
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 

Recently uploaded

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 

Recently uploaded (20)

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 

Ethical hacking and cyber security intro

  • 2. Powerpoint Templates CoNTEN T Overview of Hacking Types of Hacker Why do Hackers hack Hacker’s Language Hackers’ language • • • • • • • • • • • • • ? What is Ethical Hacking Why do we need Ethical Hacking Methodology of Ethical Hacking History of cryptography Ethical Hacking Tools Skills of an Ethical Hacker Page 2 2
  • 3. Powerpoint Templates oVERVIEW oF HACKING Hack • – • Hacker – The person who hacks • Cracker – System destroyer Page 3 3 To getting into someone’s computer system without permission in order to find out information or do something illegal
  • 4. Powerpoint Templates TYPES oF HACKER White Hat Hackers: A White Hat who specializes in penetration testing and in another testing methodologies to ensure the security of organization's information systems.  Black Hat Hackers: A Black Hat is the villain or bad guy, especially in a western black hat inmovie in which such a character would wear a contrast to the hero's white hat. Gray Hat Hackers: A Grey Hat, whose in the hacking community, refers to a skilled hacker activities fall somewhere between white and black hat hackers on a variety of spectra. Page 4 3
  • 5. Powerpoint Templates WHY Do PEoPLE HACK To make security stronger ( Ethical Hacking ) Just for fun Show off Hack other systems secretly Notify many people their thought Steal important information Destroy enemy’s computer network during the war. Page 5
  • 6. Powerpoint Templates HACKER’ S LANGuAGE || -> n |/| -> m s -> z z -> s f -> ph ph -> f x -> ck ck -> x 1 3 4 7 9 0 $ -> -> -> -> -> -> -> i or e a t g o s l | -> i or l Page 6
  • 7. Powerpoint Templates HACKER’S LANGuAGE TRANSLATIoN • Ex: –1 d1d n0t h4ck th1s p4g3, th1s wh3n 1 h4ck3d 1n 1t w4s l1k3 –I did not hack this when I hacked in page, it was like this Page 7
  • 8. Powerpoint Templates What is Ethical hacking • • • • It is Legal Permission is obtained from the target Part of an overall security program Identify vulnerabilities visible from Internet at particular point of time Ethical hackers possesses same skills, mindset and tools• of a hacker manner Also Called but the attacks are done in a non-destructive • – Attack & Penetration Testing Page 8
  • 9. Powerpoint Templates Why Do WE nEED Ethical hacking Social Engineering Automated Organizational Attacks Attacks Restricted Data Accidental Breaches in Security Denial of Viruses, Trojan Service (DoS) Horses, and Worms Protection from possible External Attacks Page 9
  • 10. MEthoDology oF hacking Phase 1-Reconna ssance Phase 2-Scanning Phase 3-Gaining Access Phase 4-Maintaining Access Phase 5-Coveri ng Tracks Powerpoint Templates i
  • 11. Powerpoint Templates 1. Footprinting This is the first stage in the methodology of hacking. As given in the analogy, this is the stage in which the hacker collects information about the company which the personal is going to hack. Page 11
  • 12. Powerpoint Templates 2. scanning Scanning is the second phase in the hacking methodology in which the hacker tries to make a ablue print of the target network. It is similar to thief going through your neighborhood and checking every door and window on each house to see which ones are open and which ones are locked. Page 12
  • 13. Powerpoint Templates EnuMERation Enumeration is the ability of a hacker to convince some servers to give make them information that is vital to them to to an attack. By doing this hacker aims found find what resources and shares can be in the system Page 13
  • 14. Powerpoint Templates 3. gaining accEss This is the actual hacking phase in which the hacker gains access to the system. The hacker will make use of all the information he collected in the pre-attacking phases. Page 14
  • 15. Powerpoint Templates 4. Maintaining access Now the hacker is inside the system by some means by password guessing or exploiting some of its vulnerabilities. This means that he is now in a position to upload some files and download some of them. Page 15
  • 16. Powerpoint Templates 5. covering tracks Now we come to the final step in the hacking. There is a saying that “everybody knows a good hacker but nobody knows a great hacker”. This means that a good hacker can always clear tracks or any record that they may he was here. be present in the network to prove that Page 16
  • 17. Powerpoint Templates History of cryptograpHy • Cryptanalysis studies the process of breaking encryption algorithms • When a new encryption algorithm is todeveloped, break it cryptanalysts study it and try – Or prove that it is impractical to break it (taking much time and many resources) 17 Page 17
  • 18. Powerpoint Templates 19 steganograpHy • The process of hiding data in plain view in pictures, graphics, or text – Example: changing colors slightly to encode individual bits in an image Page 19
  • 19. Powerpoint Templates syMMetric cryptograpHy algoritHMs Symmetric algorithms have one key that encrypts and decrypts data Advantages • • – – Symmetric algorithms are fast They are difficult to break is used if a large key size – Only one key needed 20 Page 20
  • 20. Powerpoint Templates syMMetric cryptograpHy • One key encrypts and decrypts data • Cleartext with Key makes Ciphertext • Ciphertext with Key makes Cleartext 21 Page 21 Winning Lotto #s: aWDHOP#@-w9 aWDHOP#@-w9Winning Lotto #s:
  • 21. Powerpoin Templa es ETHICAL HACKING TOOLS • Samspade Samspade is a simple tool which provides us information about a particular host. This tool is very much helpful in finding the addresses, phone numbers etc • Email Tracker and Visual Route We often used to receive many spam messages in our mailbox. We don’t helps Every know where it comes from. Email tracker is software which us to find from which server the mail does actually came from. message we receive will have a header associated with it. The email tracker uses this header information for find the location. t t Page 22
  • 22. Powerpoin Templa es SKILLS Of AN ETHICAL HACKEr • Routers - protocols Microsoft knowledge of routers, routing and access control lists. - skills in operation ,• configuration and management. Linux - knowledge of Linux/Unix; security setting, configuration, and services. • • Firewalls - configuration, & operation intrusion detection systems. of t t Page 24
  • 23. Powerpoin Templa es Cyber Security Cyber security is the technology and process that is designed to protect networks and devices from attack, damage, or unauthorized access. t t Page 25 23
  • 24. Powerpoin Templa es Advantages • Production of business. • Increased productivity. • Inspires customers confidence • Stops your website from crashing. • protection towerds customers and client's data. t t Page 26 23
  • 25. Powerpoin Templa es Disadvantages • Costs are high t t Page 27 23
  • 26. Powerpoin Templa es why cyber security ? Confidentiality, Integrity and Availability Have served as the industry standard for computer security from the time of first mainframes. t t Page 28 23
  • 27. Powerpoin Templa es How cyber security works ? t t Page 29 23
  • 28. Powerpoin Templa es Page 26 THANK YOU t t Know hacking, but no hacking