SlideShare a Scribd company logo
ETHICAL HACKING AND
NETWORK DEFENSE
~ S. Janani, Assistant Professor/CSE
Kamaraj College of Engineering and Technology
Unit Contents
 Understanding the importance of security
 Concept of ethical hacking and essential
Terminologies- Threat, Attack, Vulnerabilities,
Target of Evaluation, Exploit
 Phases involved in hacking
Introduction
 Ethical Hacking
 Hackers
 Why Hacking
 Types of Hackers
 What should do after hacked
 Hacking stages
 Need of Ethical Hacking
 Skills required for Ethical Hacking
Ethical Hacking
 Ethical Hacking is an authorized practice of
bypassing system security to identify potential
data breaches and threats in a network
 Evaluate target systems security and report
back to the owners about the bugs found
 Neither damage the system nor steal
information
Hackers
 A person who enjoys learning details of a
programming language or system
 A person who enjoys actually doing
programming rather theorizing about it
 A person capable of appreciating someone
else’s hacking
 A person who picks up programming quickly
 A person who is expert at a particular
programming language or system
Why hacking
 Just for fun
 Show off
 Hack others system secretly
 Notify many people their thought
 Steal important information
 Destroy enemy’s computer network during the
war
Types of hackers
 Black hat hacker
 White hat hacker
 Grey hat hacker
 Black hat hacker
 Extraordinary computing skills resorting to malicious or
destructive activities
 Use their knowledge and skill for their own personal gain
and probably hurting others
 White hat hacker
 Professing hacker skills and using them for defensive
purposes
 Use their knowledge and skill for the good of others and for
the common good
 Grey hat hacker
 Who work both offensively and defensively at various times
What should do after hacked
 Shut down or turn off the system
 Separate the system form network
 Restore the system with the backup or reinstall
all the programs
 Intimate the professional
Hacking stages
 Foot printing
 Scanning
 Gaining Access
 Maintaining Access
 Foot printing
 Whatis lookup
 NS lookup
 IP lookup
• Scanning
 Port scanning
 Network scanning
 Fingerprinting
 Fire walking
• Gaining Access
 Password attacks
 Social Engineering
 Viruses
• Maintaining Access
 OS backdoors
 Trojan
 Clears Tracks
Need of Ethical Hacking
 Protection form possible external attacks
Skills required for Ethical
Hacking
 Microsoft
 Linux
 Firewall
 Routers
 Mainframes
 Network protocol
 Project Management
Understanding the importance of
security
 Security relates to the protection of valuable
assets against unavailability, loss, misuse,
disclosure or damage.
 In this context, valuable assets are the information
recorded on, processed by, stored in, shared by,
transmitted from or retrieved from any medium.
 The information must be protected against harm
from threats leading to different types of impacts,
such as loss, inaccessibility, alteration or wrongful
disclosure
 Threats include errors and omissions, fraud,
accidents, and intentional damage.
How Cyber Crimes Affect
Information Security
 According to Cisco, the number of connected
devices could increase to 50 billion by 2020
 Since these connected devices contain a huge
volume of data that need to be protected,
cybercrime could become a major threat to every
business in the world
 Although cybersecurity initiatives are being
undertaken by national and international
governments, ultimately it is organizations that are
responsible for protecting their own data
 As a result, businesses are now focusing on
developing secure systems that enhance
information security
Need for Information Security
1) To prevent data breaches
A data breach resulting in the loss of critical
business information is quite common. Due to a
large amount of data stored on company
servers, businesses often become the main
target of cyber-criminals if the network is
unprotected. The breaches involving business
secrets, confidential health information, and
intellectual property can greatly impact the
overall health of a business
2) To check for compromised credentials and
broken authentication
Data breaches and other cyber attacks are
usually a result of lax authentication, weak
passwords, and poor certificate or key
management. Companies often struggle with
assigning permissions to appropriate users or
departments, resulting in identity theft.
3) To avoid account hijacking
Phishing, fraud, and software exploitations are
still very common. Companies relying on cloud
services are especially at risk because they are
an easy target for cybercriminals, who can
eavesdrop on activities, modify data and
manipulate transactions. These third-party
applications can be used by attackers to launch
other attacks as well
4) To mitigate cyber threats from malicious
insiders
An existing or former employee, a cunning
business partner, a system administrator or an
intruder can destroy the whole information
infrastructure or manipulate data for their own
purpose. Therefore, it is the responsibility of an
organization to take effective measures to
control the encryption process and keys.
Effective monitoring, logging, and auditing
activities are extremely important to keep
everything under control
Types of Information Security
Controls
There are three different types of information
security controls used to protect data.
 Physical Control: Physical controls are the
simplest form of information security. These
are the things that can actually be touch and
seen, such as password-protected locks to
avoid unauthorized entry to a secure server
room, alarm systems, fences and more
 Administrative Control: These controls mainly
involve manual efforts to ensure data security. These
include enforcing policies, standards, guidelines and
following procedures to ensure business continuity
and data protection. Some of the examples of
administrative controls include disaster recovery
plans, internet usage policies and termination
procedures.
 Technical Control: These controls are considered the
most effective of all because they make use of the
latest technologies and systems to limit access to
information. Some of the examples of technical
controls include firewalls, anti-virus software, file
permissions, access control lists and cutting-edge
data security technologies that are hard to penetrate.
Concept of ethical hacking
 same software tools and techniques as
malicious hackers to find the security
weakness in computer networks and systems
 apply the necessary fix or patch to prevent the
malicious hacker from gaining access to the
data
 never-ending cycle as new weaknesses are
constantly being discovered in computer
systems and patches are created by the
software vendors to mitigate the risk of attack.
 Ethical hackers are usually security professionals
or network penetration testers who use their
hacking skills and toolsets for defensive and
protective purposes
 The term cracker describes a hacker who uses
their hacking skills and toolset for destructive or
offensive purposes such as disseminating viruses
or performing denial-of service (DoS) attacks to
compromise or bring down systems and networks
 these hackers are sometimes paid to damage
corporate reputations or steal or reveal credit card
information, while slowing business processes
and compromising the integrity of the organization

More Related Content

Similar to Ethical Hacking and Network Defence 1.pptx

CYBER SECURITY AND ETHICAL HACKING.pptx
CYBER SECURITY AND ETHICAL HACKING.pptxCYBER SECURITY AND ETHICAL HACKING.pptx
CYBER SECURITY AND ETHICAL HACKING.pptx
RiyaNair19
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
muskaangoel15
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
Akhilesh Patel
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
chakrekevin
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
BilalMehmood44
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Mohammad Affan
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
nazar60
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
asharshaikh8
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
sheikhparvez4
 
WK8.pptx
WK8.pptxWK8.pptx
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
JenetSilence
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Chetanmalviya8
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
srtwgwfwwgw
 
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
VOROR
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Nitesh Dubey
 
Ethical hacking
Ethical hacking Ethical hacking
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
Jazmine Brown
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
Uditha Bandara Wijerathna
 

Similar to Ethical Hacking and Network Defence 1.pptx (20)

CYBER SECURITY AND ETHICAL HACKING.pptx
CYBER SECURITY AND ETHICAL HACKING.pptxCYBER SECURITY AND ETHICAL HACKING.pptx
CYBER SECURITY AND ETHICAL HACKING.pptx
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
 
WK8.pptx
WK8.pptxWK8.pptx
WK8.pptx
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
 

More from Janani S

Career Domain 2022-23.pptx
Career Domain 2022-23.pptxCareer Domain 2022-23.pptx
Career Domain 2022-23.pptx
Janani S
 
Joy of Programming
Joy of ProgrammingJoy of Programming
Joy of Programming
Janani S
 
Getting QWERTYfied
Getting QWERTYfiedGetting QWERTYfied
Getting QWERTYfied
Janani S
 
Information theory
Information theoryInformation theory
Information theory
Janani S
 
Euclid algorithm and congruence matrix
Euclid algorithm and congruence matrixEuclid algorithm and congruence matrix
Euclid algorithm and congruence matrix
Janani S
 
Fermat and euler theorem
Fermat and euler theoremFermat and euler theorem
Fermat and euler theorem
Janani S
 
Modular arithmetic
Modular arithmeticModular arithmetic
Modular arithmetic
Janani S
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
Janani S
 
Cool Coding
Cool CodingCool Coding
Cool Coding
Janani S
 
Unit iii
Unit iiiUnit iii
Unit iii
Janani S
 
Multicore and shared multi processor
Multicore and shared multi processorMulticore and shared multi processor
Multicore and shared multi processor
Janani S
 
Kf sensor1
Kf sensor1Kf sensor1
Kf sensor1
Janani S
 
Digital signature
Digital signatureDigital signature
Digital signature
Janani S
 
Distributed file system
Distributed file systemDistributed file system
Distributed file system
Janani S
 
Peer to peer services
Peer to peer servicesPeer to peer services
Peer to peer services
Janani S
 

More from Janani S (15)

Career Domain 2022-23.pptx
Career Domain 2022-23.pptxCareer Domain 2022-23.pptx
Career Domain 2022-23.pptx
 
Joy of Programming
Joy of ProgrammingJoy of Programming
Joy of Programming
 
Getting QWERTYfied
Getting QWERTYfiedGetting QWERTYfied
Getting QWERTYfied
 
Information theory
Information theoryInformation theory
Information theory
 
Euclid algorithm and congruence matrix
Euclid algorithm and congruence matrixEuclid algorithm and congruence matrix
Euclid algorithm and congruence matrix
 
Fermat and euler theorem
Fermat and euler theoremFermat and euler theorem
Fermat and euler theorem
 
Modular arithmetic
Modular arithmeticModular arithmetic
Modular arithmetic
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Cool Coding
Cool CodingCool Coding
Cool Coding
 
Unit iii
Unit iiiUnit iii
Unit iii
 
Multicore and shared multi processor
Multicore and shared multi processorMulticore and shared multi processor
Multicore and shared multi processor
 
Kf sensor1
Kf sensor1Kf sensor1
Kf sensor1
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Distributed file system
Distributed file systemDistributed file system
Distributed file system
 
Peer to peer services
Peer to peer servicesPeer to peer services
Peer to peer services
 

Recently uploaded

Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 

Recently uploaded (20)

Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 

Ethical Hacking and Network Defence 1.pptx

  • 1. ETHICAL HACKING AND NETWORK DEFENSE ~ S. Janani, Assistant Professor/CSE Kamaraj College of Engineering and Technology
  • 2. Unit Contents  Understanding the importance of security  Concept of ethical hacking and essential Terminologies- Threat, Attack, Vulnerabilities, Target of Evaluation, Exploit  Phases involved in hacking
  • 3. Introduction  Ethical Hacking  Hackers  Why Hacking  Types of Hackers  What should do after hacked  Hacking stages  Need of Ethical Hacking  Skills required for Ethical Hacking
  • 4. Ethical Hacking  Ethical Hacking is an authorized practice of bypassing system security to identify potential data breaches and threats in a network  Evaluate target systems security and report back to the owners about the bugs found  Neither damage the system nor steal information
  • 5. Hackers  A person who enjoys learning details of a programming language or system  A person who enjoys actually doing programming rather theorizing about it  A person capable of appreciating someone else’s hacking  A person who picks up programming quickly  A person who is expert at a particular programming language or system
  • 6. Why hacking  Just for fun  Show off  Hack others system secretly  Notify many people their thought  Steal important information  Destroy enemy’s computer network during the war
  • 7. Types of hackers  Black hat hacker  White hat hacker  Grey hat hacker
  • 8.  Black hat hacker  Extraordinary computing skills resorting to malicious or destructive activities  Use their knowledge and skill for their own personal gain and probably hurting others  White hat hacker  Professing hacker skills and using them for defensive purposes  Use their knowledge and skill for the good of others and for the common good  Grey hat hacker  Who work both offensively and defensively at various times
  • 9. What should do after hacked  Shut down or turn off the system  Separate the system form network  Restore the system with the backup or reinstall all the programs  Intimate the professional
  • 10. Hacking stages  Foot printing  Scanning  Gaining Access  Maintaining Access
  • 11.  Foot printing  Whatis lookup  NS lookup  IP lookup • Scanning  Port scanning  Network scanning  Fingerprinting  Fire walking • Gaining Access  Password attacks  Social Engineering  Viruses • Maintaining Access  OS backdoors  Trojan  Clears Tracks
  • 12. Need of Ethical Hacking  Protection form possible external attacks
  • 13. Skills required for Ethical Hacking  Microsoft  Linux  Firewall  Routers  Mainframes  Network protocol  Project Management
  • 14. Understanding the importance of security  Security relates to the protection of valuable assets against unavailability, loss, misuse, disclosure or damage.  In this context, valuable assets are the information recorded on, processed by, stored in, shared by, transmitted from or retrieved from any medium.  The information must be protected against harm from threats leading to different types of impacts, such as loss, inaccessibility, alteration or wrongful disclosure  Threats include errors and omissions, fraud, accidents, and intentional damage.
  • 15. How Cyber Crimes Affect Information Security  According to Cisco, the number of connected devices could increase to 50 billion by 2020  Since these connected devices contain a huge volume of data that need to be protected, cybercrime could become a major threat to every business in the world  Although cybersecurity initiatives are being undertaken by national and international governments, ultimately it is organizations that are responsible for protecting their own data  As a result, businesses are now focusing on developing secure systems that enhance information security
  • 16. Need for Information Security 1) To prevent data breaches A data breach resulting in the loss of critical business information is quite common. Due to a large amount of data stored on company servers, businesses often become the main target of cyber-criminals if the network is unprotected. The breaches involving business secrets, confidential health information, and intellectual property can greatly impact the overall health of a business
  • 17. 2) To check for compromised credentials and broken authentication Data breaches and other cyber attacks are usually a result of lax authentication, weak passwords, and poor certificate or key management. Companies often struggle with assigning permissions to appropriate users or departments, resulting in identity theft.
  • 18. 3) To avoid account hijacking Phishing, fraud, and software exploitations are still very common. Companies relying on cloud services are especially at risk because they are an easy target for cybercriminals, who can eavesdrop on activities, modify data and manipulate transactions. These third-party applications can be used by attackers to launch other attacks as well
  • 19. 4) To mitigate cyber threats from malicious insiders An existing or former employee, a cunning business partner, a system administrator or an intruder can destroy the whole information infrastructure or manipulate data for their own purpose. Therefore, it is the responsibility of an organization to take effective measures to control the encryption process and keys. Effective monitoring, logging, and auditing activities are extremely important to keep everything under control
  • 20. Types of Information Security Controls There are three different types of information security controls used to protect data.  Physical Control: Physical controls are the simplest form of information security. These are the things that can actually be touch and seen, such as password-protected locks to avoid unauthorized entry to a secure server room, alarm systems, fences and more
  • 21.  Administrative Control: These controls mainly involve manual efforts to ensure data security. These include enforcing policies, standards, guidelines and following procedures to ensure business continuity and data protection. Some of the examples of administrative controls include disaster recovery plans, internet usage policies and termination procedures.  Technical Control: These controls are considered the most effective of all because they make use of the latest technologies and systems to limit access to information. Some of the examples of technical controls include firewalls, anti-virus software, file permissions, access control lists and cutting-edge data security technologies that are hard to penetrate.
  • 22. Concept of ethical hacking  same software tools and techniques as malicious hackers to find the security weakness in computer networks and systems  apply the necessary fix or patch to prevent the malicious hacker from gaining access to the data  never-ending cycle as new weaknesses are constantly being discovered in computer systems and patches are created by the software vendors to mitigate the risk of attack.
  • 23.  Ethical hackers are usually security professionals or network penetration testers who use their hacking skills and toolsets for defensive and protective purposes  The term cracker describes a hacker who uses their hacking skills and toolset for destructive or offensive purposes such as disseminating viruses or performing denial-of service (DoS) attacks to compromise or bring down systems and networks  these hackers are sometimes paid to damage corporate reputations or steal or reveal credit card information, while slowing business processes and compromising the integrity of the organization