Introduction to IT Security & Ethical Hacking INTRODUCTION
CURRENT ONLINE THREATS Have you ever been threatened of Theft of passwords. E-mail based extortion. Launch of malicious programs  Corporate espionage. Website based launch of malicious code cheating & frauds. E-mail spamming. E-mail bombing.
If your answer to any of the above questions is  “ YES” , then you must take this Training.
THE NEED OF THE HOUR? This is very similar to asking the question: “  Why do you have door locks in your houses?” “  Why do you have a safe for valuables?” “  Why do you have a watchman?” “  Why do you have police?”  TO PROTECT VALUABLE INFORMATION
SURETY!!! You can attain Total Computer Security! The best way to do so is to apply  Richards' Laws Of Computer Security  (ca. 1992): A.      Don't buy a computer B.       If you do buy a computer, don't turn it on.
WORLD CLASS HACKERS Dutch Gulf War Hackers tried to sell stolen documents to Iraq Rome Labs Hackers UK teens looking for UFOs and cyber trophies Masters of Downloading member of an Indian terrorist organization tried to buy  stolen material from Chameleon and others for $1,000 Solar Sunrise Iraq? Nope - Californian teens and Israeli mentor Moonlight Maze  – now Storm Cloud ongoing for past 3 years Russian Hackers  –  State Sponsored????
WORLD STATSTICS 1
WORLD STATSTICS 2
COMMON CYBER CRIMES Theft of Passwords and invasion of privacy   Using Social Engineering Using Key loggers Using Trojans Using Phishing Attacks Mobile Attacks SMS Spoofing Caller ID Spoofing  Blue Jacking E-mail Attacks Banking and Credit Cards
Key Protection for Home Safety Password protection  for Document Safety Login protection  for Operating System Safety PASSWORD PROTECTION
THEFT OF PASSWORD  Password Stealing  can be done by using following techniques: Social Engineering Keyloggers Trojans Phishing
TRUTH
Social Engineering Attack
SOCIAL ENGINEERING Practice of deceiving an individual to gain access to personal information through use of : Authority Trust Reciprocation Sense of Urgency Results Delete or change files Erase your Hard Drives Release Confidential Information Change Security Settings
KEY LOGGERS: AN INTRODUCTION Definition:   They are spy software which monitor all keystrokes made on the victim’s computer.  They are used to capture sensitive information like your passwords Uses/ Misuses Spying Purposes To Steal Passwords  To Steal Sensitive Data KEY LOGGERS
KEY LOGGERS (Cont.) PREVENTION FROM KEYLOGGERS Installing a firewall will detect and disable keyloggers before than are installed or do anymore harm on your computer.   Install a good anti-virus program and Anti-spyware software. avoid running programs you receive via email and instant messaging unless you know exactly what it is. You need to use anti-keylogger software to detect and remove keyloggers.
TROJAN had a heated argument over one girl, When the girl, asked to choose or Choose Rahul Mukesh Radha Rahul Mukesh Radha Mukesh
TROJAN (Cont.) sent a spoofed e-card the Trojan was installed on his computer. Rahul now had complete control over Mukesh’s computer and proceeded to harass him thoroughly.  ( which appeared to have come from Radha’s mail account ) The e-card actually contained a Trojan. opened the card Rahul Mukesh Radha Mukesh
TROJAN (Cont.) Detection & Countermeasures One can remove a Trojan using any normal Anti-Virus Software There are other ways like port scanning , network security scanners etc which are highly technical and are covered in our advanced courses.
Types of Trojans Trojan horses are broken down in classification based on how they breach systems and the damage they cause. The seven main types of Trojan horses are: Remote Access Trojans Data Sending Trojans Destructive Trojans Proxy Trojans FTP Trojans Security Software Disabler Trojans Denial-of-Service Attack (DoS) Trojans
Phishing Attack
PHISHING ATTACK Phishing  is a method where information such as account numbers, usernames, and passwords is collected from users and then used to compromise their online accounts. The second half of 2004 saw a dramatic rise in the quickly mounting and emerging threat of  Phishing.
WORLD STATSTICS 2
WORLD STSTSTICS
EXAMPLE OF YAHOO PHISHING
EXAMPLE OF ORKUT PAGE
 
Mobile Hacking
SMS SPOOFING
CALL SPOOFING
NEW AGE CYBER CRIME How secure are India's call centres?           Is information security becoming a casualty in India's booming call centres as they drive down costs to keep themselves competitive for foreign clients?  [BBC NEWS NETWORK ] http://news.bbc.co.uk/1/hi/world/south_asia/4619859.stm
 
E-MAIL BASED CRIMES   The ease, speed and relative anonymity of E-mail has made it a powerful tool for criminals. Some of the major E-mail related crimes are:  E-mail Spoofing Sending Malicious Codes  through E-mails E-mail Bombing Sending threatening E-mails Defamatory E-mails E-mail Frauds
SPREADING TROJAN, VIRUS  & WORMS   Sends spoofed  E-mail:  [email_address] Computer A Receives E-mail from: [email_address] Computer B Computer B opens the attachment thinking it’s a security patch software Trojan Spyware Virus Worms Computer Crashed
E-MAIL BOMBING Sent mail Loads of E-mails Blast!!!!
THREATNING E-MAILS   With attachment (morphed pornographic photographs of Poorva ) an E-mail message The mail message said that if Poorva were not to pay Rs. 10,000 at a specified place every month, the photographs would be uploaded to the Net and then a copy sent to her fiancé Scared, Poorva at first complied with the wishes of the blackmailer and paid the first Rs. 10, 000 Trusting the reasonableness of her fiancé she told him the truth. Together they approached the police. Investigation turned up the culprit   Poorva Poorva’s fiancé   Blackmailer Poorva’s supposed friend who wanted that Poorva and her fiancé should break up so that she would get her chance with him
CREDIT CARDS
IT SECURITY ????????? Every information user is a node where the information can leak out. Thus Information security is essentially securing the information of any information user. It includes the following in today’s terms: Data Security Computer Security LAN Security Internet Security
The Situation
The Situation
The Situation
The Situation
The Situation
The Situation
The Situation
LEVEL 1 CONTENTS!!! Windows/Linux Security Network Security Internet Security (E-Security) E-mail Security Data Security and Backups Prevention from Attacks  Penetration Testing/Ethical Hacking Computer Forensics E-Commerce and Cryptography Cyber Terrorism Security Auditing
LEVEL 2 CONTENTS!!! Mobile Security Router Security Wireless LAN Security VPN/VOIP Security Advanced Attacks C-programming Shell Programming Code Security Hacking Softwares
LEVEL 3 CONTENTS!!! Information Security Management Policies ISO 17799 Certification and Audit Managing Security Awareness Business Continuity and Disaster Recovery Planning Security Management Practices Security Frameworks Current Security Issues and Trends Physical Security Advanced Cryptography and Attacks Browser Hacking Advanced Computer Forensics Cyber Laws  Using Security Auditor
Course USP’s Covers both sides of the coin  Ethical   Hacking and Security  which is not offered in any other course Hands on course with  over 50 tools  covered with demonstrations (audio-visual) Covers  Latest techniques and practices  in the security industry along with CASE STUDIES Created by  Leading security professionals  from IIT Delhi, IIT Roorkee, University of Texas at Austin U.S.A and Massachusetts Institute of Technology Boston U.S.A Industry endorsed  Course, Training methodology and Certification Easily affordable  as compared to other security courses “  Unique learning methodology and strong course will solve the  man power problems in the sector of Information Security”
Secure your Desktop, LAN from crackers Ethically hack Desktop, LAN Develop a psychology to implement security Understand Technical Attacks and take precautions Certified person will be able to….
Protect from dangers on internet Secure your Sensitive Data using Cryptography and Steganography Secure your E-mails and take precautions from E-mail Attacks Perform Penetration Testing for your organization’s/home setup Certified person will be able to….
Find out vulnerabilities in a system Create a security policy for your organization Catch Cyber Criminals using forensics and other techniques Understand latest threats in the world of hacking And a lot more…. Certified person will be able to….
Key Innovations in Delivery Training Methodology
Visit www.educationsure.com   Contact for Training enquiries:-  Mr. P.Satish kumar info @educationsure.com   Mobile Number:- +91-9841833455 EducationSure 7/4,Telephone colony ,1 st  main road Madhavaram milk colony chennai-52

It security &_ethical_hacking

  • 1.
    Introduction to ITSecurity & Ethical Hacking INTRODUCTION
  • 2.
    CURRENT ONLINE THREATSHave you ever been threatened of Theft of passwords. E-mail based extortion. Launch of malicious programs Corporate espionage. Website based launch of malicious code cheating & frauds. E-mail spamming. E-mail bombing.
  • 3.
    If your answerto any of the above questions is “ YES” , then you must take this Training.
  • 4.
    THE NEED OFTHE HOUR? This is very similar to asking the question: “ Why do you have door locks in your houses?” “ Why do you have a safe for valuables?” “ Why do you have a watchman?” “ Why do you have police?” TO PROTECT VALUABLE INFORMATION
  • 5.
    SURETY!!! You canattain Total Computer Security! The best way to do so is to apply Richards' Laws Of Computer Security (ca. 1992): A.     Don't buy a computer B.      If you do buy a computer, don't turn it on.
  • 6.
    WORLD CLASS HACKERSDutch Gulf War Hackers tried to sell stolen documents to Iraq Rome Labs Hackers UK teens looking for UFOs and cyber trophies Masters of Downloading member of an Indian terrorist organization tried to buy stolen material from Chameleon and others for $1,000 Solar Sunrise Iraq? Nope - Californian teens and Israeli mentor Moonlight Maze – now Storm Cloud ongoing for past 3 years Russian Hackers – State Sponsored????
  • 7.
  • 8.
  • 9.
    COMMON CYBER CRIMESTheft of Passwords and invasion of privacy Using Social Engineering Using Key loggers Using Trojans Using Phishing Attacks Mobile Attacks SMS Spoofing Caller ID Spoofing Blue Jacking E-mail Attacks Banking and Credit Cards
  • 10.
    Key Protection forHome Safety Password protection for Document Safety Login protection for Operating System Safety PASSWORD PROTECTION
  • 11.
    THEFT OF PASSWORD Password Stealing can be done by using following techniques: Social Engineering Keyloggers Trojans Phishing
  • 12.
  • 13.
  • 14.
    SOCIAL ENGINEERING Practiceof deceiving an individual to gain access to personal information through use of : Authority Trust Reciprocation Sense of Urgency Results Delete or change files Erase your Hard Drives Release Confidential Information Change Security Settings
  • 15.
    KEY LOGGERS: ANINTRODUCTION Definition: They are spy software which monitor all keystrokes made on the victim’s computer. They are used to capture sensitive information like your passwords Uses/ Misuses Spying Purposes To Steal Passwords To Steal Sensitive Data KEY LOGGERS
  • 16.
    KEY LOGGERS (Cont.)PREVENTION FROM KEYLOGGERS Installing a firewall will detect and disable keyloggers before than are installed or do anymore harm on your computer. Install a good anti-virus program and Anti-spyware software. avoid running programs you receive via email and instant messaging unless you know exactly what it is. You need to use anti-keylogger software to detect and remove keyloggers.
  • 17.
    TROJAN had aheated argument over one girl, When the girl, asked to choose or Choose Rahul Mukesh Radha Rahul Mukesh Radha Mukesh
  • 18.
    TROJAN (Cont.) senta spoofed e-card the Trojan was installed on his computer. Rahul now had complete control over Mukesh’s computer and proceeded to harass him thoroughly. ( which appeared to have come from Radha’s mail account ) The e-card actually contained a Trojan. opened the card Rahul Mukesh Radha Mukesh
  • 19.
    TROJAN (Cont.) Detection& Countermeasures One can remove a Trojan using any normal Anti-Virus Software There are other ways like port scanning , network security scanners etc which are highly technical and are covered in our advanced courses.
  • 20.
    Types of TrojansTrojan horses are broken down in classification based on how they breach systems and the damage they cause. The seven main types of Trojan horses are: Remote Access Trojans Data Sending Trojans Destructive Trojans Proxy Trojans FTP Trojans Security Software Disabler Trojans Denial-of-Service Attack (DoS) Trojans
  • 21.
  • 22.
    PHISHING ATTACK Phishing is a method where information such as account numbers, usernames, and passwords is collected from users and then used to compromise their online accounts. The second half of 2004 saw a dramatic rise in the quickly mounting and emerging threat of Phishing.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
    NEW AGE CYBERCRIME How secure are India's call centres?         Is information security becoming a casualty in India's booming call centres as they drive down costs to keep themselves competitive for foreign clients? [BBC NEWS NETWORK ] http://news.bbc.co.uk/1/hi/world/south_asia/4619859.stm
  • 32.
  • 33.
    E-MAIL BASED CRIMES The ease, speed and relative anonymity of E-mail has made it a powerful tool for criminals. Some of the major E-mail related crimes are: E-mail Spoofing Sending Malicious Codes through E-mails E-mail Bombing Sending threatening E-mails Defamatory E-mails E-mail Frauds
  • 34.
    SPREADING TROJAN, VIRUS & WORMS Sends spoofed E-mail: [email_address] Computer A Receives E-mail from: [email_address] Computer B Computer B opens the attachment thinking it’s a security patch software Trojan Spyware Virus Worms Computer Crashed
  • 35.
    E-MAIL BOMBING Sentmail Loads of E-mails Blast!!!!
  • 36.
    THREATNING E-MAILS With attachment (morphed pornographic photographs of Poorva ) an E-mail message The mail message said that if Poorva were not to pay Rs. 10,000 at a specified place every month, the photographs would be uploaded to the Net and then a copy sent to her fiancé Scared, Poorva at first complied with the wishes of the blackmailer and paid the first Rs. 10, 000 Trusting the reasonableness of her fiancé she told him the truth. Together they approached the police. Investigation turned up the culprit Poorva Poorva’s fiancé Blackmailer Poorva’s supposed friend who wanted that Poorva and her fiancé should break up so that she would get her chance with him
  • 37.
  • 38.
    IT SECURITY ?????????Every information user is a node where the information can leak out. Thus Information security is essentially securing the information of any information user. It includes the following in today’s terms: Data Security Computer Security LAN Security Internet Security
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
    LEVEL 1 CONTENTS!!!Windows/Linux Security Network Security Internet Security (E-Security) E-mail Security Data Security and Backups Prevention from Attacks Penetration Testing/Ethical Hacking Computer Forensics E-Commerce and Cryptography Cyber Terrorism Security Auditing
  • 47.
    LEVEL 2 CONTENTS!!!Mobile Security Router Security Wireless LAN Security VPN/VOIP Security Advanced Attacks C-programming Shell Programming Code Security Hacking Softwares
  • 48.
    LEVEL 3 CONTENTS!!!Information Security Management Policies ISO 17799 Certification and Audit Managing Security Awareness Business Continuity and Disaster Recovery Planning Security Management Practices Security Frameworks Current Security Issues and Trends Physical Security Advanced Cryptography and Attacks Browser Hacking Advanced Computer Forensics Cyber Laws Using Security Auditor
  • 49.
    Course USP’s Coversboth sides of the coin Ethical Hacking and Security which is not offered in any other course Hands on course with over 50 tools covered with demonstrations (audio-visual) Covers Latest techniques and practices in the security industry along with CASE STUDIES Created by Leading security professionals from IIT Delhi, IIT Roorkee, University of Texas at Austin U.S.A and Massachusetts Institute of Technology Boston U.S.A Industry endorsed Course, Training methodology and Certification Easily affordable as compared to other security courses “ Unique learning methodology and strong course will solve the man power problems in the sector of Information Security”
  • 50.
    Secure your Desktop,LAN from crackers Ethically hack Desktop, LAN Develop a psychology to implement security Understand Technical Attacks and take precautions Certified person will be able to….
  • 51.
    Protect from dangerson internet Secure your Sensitive Data using Cryptography and Steganography Secure your E-mails and take precautions from E-mail Attacks Perform Penetration Testing for your organization’s/home setup Certified person will be able to….
  • 52.
    Find out vulnerabilitiesin a system Create a security policy for your organization Catch Cyber Criminals using forensics and other techniques Understand latest threats in the world of hacking And a lot more…. Certified person will be able to….
  • 53.
    Key Innovations inDelivery Training Methodology
  • 54.
    Visit www.educationsure.com Contact for Training enquiries:- Mr. P.Satish kumar info @educationsure.com Mobile Number:- +91-9841833455 EducationSure 7/4,Telephone colony ,1 st main road Madhavaram milk colony chennai-52

Editor's Notes