SlideShare a Scribd company logo
Introduction to IT Security & Ethical Hacking INTRODUCTION
CURRENT ONLINE THREATS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
THE NEED OF THE HOUR? This is very similar to asking the question: “  Why do you have door locks in your houses?” “  Why do you have a safe for valuables?” “  Why do you have a watchman?” “  Why do you have police?”  TO PROTECT VALUABLE INFORMATION
SURETY!!! You can attain Total Computer Security! The best way to do so is to apply  Richards' Laws Of Computer Security  (ca. 1992): A.      Don't buy a computer B.       If you do buy a computer, don't turn it on.
WORLD CLASS HACKERS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WORLD STATSTICS 1
WORLD STATSTICS 2
COMMON CYBER CRIMES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Protection for Home Safety Password protection  for Document Safety Login protection  for Operating System Safety PASSWORD PROTECTION
THEFT OF PASSWORD  Password Stealing  can be done by using following techniques: ,[object Object],[object Object],[object Object],[object Object]
TRUTH
Social Engineering Attack
SOCIAL ENGINEERING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Results ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],KEY LOGGERS
KEY LOGGERS (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
TROJAN had a heated argument over one girl, When the girl, asked to choose or Choose Rahul Mukesh Radha Rahul Mukesh Radha Mukesh
TROJAN (Cont.) sent a spoofed e-card the Trojan was installed on his computer. Rahul now had complete control over Mukesh’s computer and proceeded to harass him thoroughly.  ( which appeared to have come from Radha’s mail account ) The e-card actually contained a Trojan. opened the card Rahul Mukesh Radha Mukesh
TROJAN (Cont.) ,[object Object],[object Object],[object Object]
Types of Trojans ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Phishing Attack
PHISHING ATTACK ,[object Object],[object Object]
WORLD STATSTICS 2
WORLD STSTSTICS
EXAMPLE OF YAHOO PHISHING
EXAMPLE OF ORKUT PAGE
 
Mobile Hacking
SMS SPOOFING
CALL SPOOFING
NEW AGE CYBER CRIME How secure are India's call centres?           Is information security becoming a casualty in India's booming call centres as they drive down costs to keep themselves competitive for foreign clients?  [BBC NEWS NETWORK ] http://news.bbc.co.uk/1/hi/world/south_asia/4619859.stm
 
E-MAIL BASED CRIMES   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SPREADING TROJAN, VIRUS  & WORMS   Sends spoofed  E-mail:  [email_address] Computer A Receives E-mail from: [email_address] Computer B Computer B opens the attachment thinking it’s a security patch software Trojan Spyware Virus Worms Computer Crashed
E-MAIL BOMBING Sent mail Loads of E-mails Blast!!!!
THREATNING E-MAILS   With attachment (morphed pornographic photographs of Poorva ) an E-mail message The mail message said that if Poorva were not to pay Rs. 10,000 at a specified place every month, the photographs would be uploaded to the Net and then a copy sent to her fiancé Scared, Poorva at first complied with the wishes of the blackmailer and paid the first Rs. 10, 000 Trusting the reasonableness of her fiancé she told him the truth. Together they approached the police. Investigation turned up the culprit   Poorva Poorva’s fiancé   Blackmailer Poorva’s supposed friend who wanted that Poorva and her fiancé should break up so that she would get her chance with him
CREDIT CARDS
IT SECURITY ????????? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Situation
The Situation
The Situation
The Situation
The Situation
The Situation
The Situation
LEVEL 1 CONTENTS!!! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
LEVEL 2 CONTENTS!!! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
LEVEL 3 CONTENTS!!! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Course USP’s ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“  Unique learning methodology and strong course will solve the  man power problems in the sector of Information Security”
[object Object],[object Object],[object Object],[object Object],Certified person will be able to….
[object Object],[object Object],[object Object],[object Object],Certified person will be able to….
[object Object],[object Object],[object Object],[object Object],[object Object],Certified person will be able to….
[object Object],Training Methodology
Visit www.educationsure.com   Contact for Training enquiries:-  Mr. P.Satish kumar info @educationsure.com   Mobile Number:- +91-9841833455 EducationSure 7/4,Telephone colony ,1 st  main road Madhavaram milk colony chennai-52

More Related Content

What's hot

Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
Subhoneel Datta
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
ankit sarode
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Keith Brooks
 
What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
Sibghatullah Khattak
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should Follow
Mercury Solutions Limited
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
RamchandraRegmi
 
Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayChandra Prakash
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
vishakha bhagwat
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
himanshujoshi238
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical Hacking
Nitish Kasar
 
the best hacking ppt
the best hacking pptthe best hacking ppt
the best hacking ppt
fuckubitches
 
Hacking Tutorial in Telugu
Hacking Tutorial in TeluguHacking Tutorial in Telugu
Hacking Tutorial in Telugu
Sravani Reddy
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
VipinYadav257
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
Tauhidul islam
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
 

What's hot (20)

Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should Follow
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyay
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical Hacking
 
the best hacking ppt
the best hacking pptthe best hacking ppt
the best hacking ppt
 
Hacking Tutorial in Telugu
Hacking Tutorial in TeluguHacking Tutorial in Telugu
Hacking Tutorial in Telugu
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 

Viewers also liked

Computer hacking
Computer hackingComputer hacking
Computer hacking
Arjun Tomar
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Neel Kamal
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
jeshin jose
 
Ethical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSEthical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFS
Sifs India
 
Day3 Backup
Day3 BackupDay3 Backup
Day3 Backup
Jai4uk
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and Hacking
Parth Makadiya
 
How to remove shortcut virus from pendrive using cmd easily
How to remove shortcut virus from pendrive using cmd easilyHow to remove shortcut virus from pendrive using cmd easily
How to remove shortcut virus from pendrive using cmd easily
Tan
 
System Security in Ethical Hacking
System Security in Ethical HackingSystem Security in Ethical Hacking
System Security in Ethical Hacking
Vanipriya Sakthivel
 
Puppy Pendrive
Puppy PendrivePuppy Pendrive
Puppy Pendrive
Mohan R
 
Ethical hacking
Ethical hackingEthical hacking
Website Hacking and Preventive Measures
Website Hacking and Preventive MeasuresWebsite Hacking and Preventive Measures
Website Hacking and Preventive Measures
Shubham Takode
 
How to become a hacker
How to become a hackerHow to become a hacker
How to become a hacker
Pejman Dashtinejad
 
Cyber security and ethical hacking 7
Cyber security and ethical hacking 7Cyber security and ethical hacking 7
Cyber security and ethical hacking 7
Mehedi Hasan
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
Lokender Yadav
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
Talwant Singh
 
Installation of windows 7 || how to boot pendrive or cd/dvd
Installation of windows 7 || how to boot pendrive or cd/dvdInstallation of windows 7 || how to boot pendrive or cd/dvd
Installation of windows 7 || how to boot pendrive or cd/dvd
gourav kottawar
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
Rebecca Jones
 

Viewers also liked (20)

Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Ethical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSEthical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFS
 
Day3 Backup
Day3 BackupDay3 Backup
Day3 Backup
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and Hacking
 
How to remove shortcut virus from pendrive using cmd easily
How to remove shortcut virus from pendrive using cmd easilyHow to remove shortcut virus from pendrive using cmd easily
How to remove shortcut virus from pendrive using cmd easily
 
System Security in Ethical Hacking
System Security in Ethical HackingSystem Security in Ethical Hacking
System Security in Ethical Hacking
 
Puppy Pendrive
Puppy PendrivePuppy Pendrive
Puppy Pendrive
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Website Hacking and Preventive Measures
Website Hacking and Preventive MeasuresWebsite Hacking and Preventive Measures
Website Hacking and Preventive Measures
 
How to become a hacker
How to become a hackerHow to become a hacker
How to become a hacker
 
How to Become a Hacker?
How to Become a Hacker?How to Become a Hacker?
How to Become a Hacker?
 
Cyber security and ethical hacking 7
Cyber security and ethical hacking 7Cyber security and ethical hacking 7
Cyber security and ethical hacking 7
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Installation of windows 7 || how to boot pendrive or cd/dvd
Installation of windows 7 || how to boot pendrive or cd/dvdInstallation of windows 7 || how to boot pendrive or cd/dvd
Installation of windows 7 || how to boot pendrive or cd/dvd
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
 

Similar to It security &_ethical_hacking

E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Sanjeev Kumar Jaiswal
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
Dr. Hemant Kumar Singh
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-bBbAOC
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
hm5314581
 
Ethical hacking Book Review
Ethical hacking Book ReviewEthical hacking Book Review
Ethical hacking Book Review
Tirtha Mal
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professionalciso_insights
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
CUInnovationTeam
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
Shivam Lohiya
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 aMark Henshaw
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
AkshayKumar Kavar
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Md Mudassir
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
BWUBTS19022
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
TanviModi14
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
Jetking
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
zahid_ned
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
Arifa Ali
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
Abdul Manaf Vellakodath
 

Similar to It security &_ethical_hacking (20)

E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 
Ethical hacking Book Review
Ethical hacking Book ReviewEthical hacking Book Review
Ethical hacking Book Review
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 

Recently uploaded

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 

Recently uploaded (20)

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 

It security &_ethical_hacking

  • 1. Introduction to IT Security & Ethical Hacking INTRODUCTION
  • 2.
  • 3.
  • 4. THE NEED OF THE HOUR? This is very similar to asking the question: “ Why do you have door locks in your houses?” “ Why do you have a safe for valuables?” “ Why do you have a watchman?” “ Why do you have police?” TO PROTECT VALUABLE INFORMATION
  • 5. SURETY!!! You can attain Total Computer Security! The best way to do so is to apply Richards' Laws Of Computer Security (ca. 1992): A.     Don't buy a computer B.      If you do buy a computer, don't turn it on.
  • 6.
  • 9.
  • 10. Key Protection for Home Safety Password protection for Document Safety Login protection for Operating System Safety PASSWORD PROTECTION
  • 11.
  • 12. TRUTH
  • 14.
  • 15.
  • 16.
  • 17. TROJAN had a heated argument over one girl, When the girl, asked to choose or Choose Rahul Mukesh Radha Rahul Mukesh Radha Mukesh
  • 18. TROJAN (Cont.) sent a spoofed e-card the Trojan was installed on his computer. Rahul now had complete control over Mukesh’s computer and proceeded to harass him thoroughly. ( which appeared to have come from Radha’s mail account ) The e-card actually contained a Trojan. opened the card Rahul Mukesh Radha Mukesh
  • 19.
  • 20.
  • 22.
  • 25. EXAMPLE OF YAHOO PHISHING
  • 27.  
  • 31. NEW AGE CYBER CRIME How secure are India's call centres?         Is information security becoming a casualty in India's booming call centres as they drive down costs to keep themselves competitive for foreign clients? [BBC NEWS NETWORK ] http://news.bbc.co.uk/1/hi/world/south_asia/4619859.stm
  • 32.  
  • 33.
  • 34. SPREADING TROJAN, VIRUS & WORMS Sends spoofed E-mail: [email_address] Computer A Receives E-mail from: [email_address] Computer B Computer B opens the attachment thinking it’s a security patch software Trojan Spyware Virus Worms Computer Crashed
  • 35. E-MAIL BOMBING Sent mail Loads of E-mails Blast!!!!
  • 36. THREATNING E-MAILS With attachment (morphed pornographic photographs of Poorva ) an E-mail message The mail message said that if Poorva were not to pay Rs. 10,000 at a specified place every month, the photographs would be uploaded to the Net and then a copy sent to her fiancé Scared, Poorva at first complied with the wishes of the blackmailer and paid the first Rs. 10, 000 Trusting the reasonableness of her fiancé she told him the truth. Together they approached the police. Investigation turned up the culprit Poorva Poorva’s fiancé Blackmailer Poorva’s supposed friend who wanted that Poorva and her fiancé should break up so that she would get her chance with him
  • 38.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54. Visit www.educationsure.com Contact for Training enquiries:- Mr. P.Satish kumar info @educationsure.com Mobile Number:- +91-9841833455 EducationSure 7/4,Telephone colony ,1 st main road Madhavaram milk colony chennai-52

Editor's Notes

  1. -
  2. -
  3. -