ethical hacking by- nagendra saini

Post on 22-Nov-2014

690 Views

Category:

Technology

6 Downloads

Preview:

Click to see full reader

DESCRIPTION

it's just a presentation on ethical hacking..(Y)

TRANSCRIPT

ETHICAL HACKING

PRESENTED BY :- NAGENDRA KUMAR

ROLL NO :- 11EBKIT205

CONTENT

Overview of Hacking Hacking VS Cracking Why do hackers hack? Qualities of Hackers Types of Hacker Ethical Hacking – Process Advantages and Disadvantages How can protect the system? What should do after hacked?

OVERVIEW OF HACKING

It is Legal

Permission is obtained from the target

Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner

Also Called – Attack & Penetration Testing.

HACKING VS CRACKING

Hacker The person who hack .

Cracker System destroyer.

HACKING WITH MALICIOUS INTENTION IS CRACKING

The basic difference is hackers do not do anything disastrous.

Cracking yield more devastating results. Cracking is crime. Cyber crime are the results of cracking ,not hacking

WHY DO PEOPLE HACK??

To make security stronger ( Ethical Hacking )

Just for fun

Show off

Hack other systems secretly & Steal important information

WHAT ARE THE VARIOUS QUALITIES A HACKER

SHOULD POSSES

Good coder

well knowledgeable person both hard ware as well as soft ware

Should have knowledge on security system

Trusted person

TYPES OF HACKER

BLACK HAT HACK

ER

WHITE HAT HACK

ER

GRAYHAT

HACKER

HACKING - PROCESS

Foot Printing

Scanning

Gaining Access

Maintaining Access

FOOT PRINTING

Who is Lookup

NS lookup

IP Lookup

SCANNING

Port scanning

Network scanning

Finger Printing

Fire walking

SCANNING

GAINING ACCESS

Password Attacks

Social Engineering

Viruses

MAINTAINING ACCESS

Os Back-Doors

Trojans

Clearing tracks

ADVANTAGES & DISADVANTAGES

Advantages Provides security to banking and financial

establishments Prevents website defacements An evolving technique To catch a thief you have to think like a thiefDisadvantages All depends upon the trustworthiness of the

ethical hacker Hiring professionals is expensive.

HOW CAN WE PROTECT THE SYSTEM?

Patch security hole often

Encrypt important data

Remove unused program

Setup log-host

Backup the system often

Setup firewall

WHAT SHOULD DO AFTER HACKED?

Shutdown the system

Separate the system from network

Restore the system with the backup Or reinstall all programs

HACKING GROWTH RATE

It is clear from the graph it is increasing day by day.

THANK YOU

top related