Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in
How secure are you……?
Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in
Agenda• What is Information Security and Ethical Hacking• Career options in Information Security and Ethical Hacking
Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in
Did you know In 1980 a computer cracked a 3-character
password within one minute. In 1999 a team of computers cracked a 56-
character password within one day. In 2004 a computer virus infected 1 million
computers within one hour.
Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in
What is Ethical HackingEthical hacking, often performed by white hats or skilled computer experts, is the use of programming skills to determine vulnerabilities in computer systems. While the non-ethical hacker or black hat exploits these vulnerabilities for mischief, personal gain or other reasons, the ethical hacker evaluates them, points them out, and may suggest changes to systems that make them less likely to be penetrated by black hats.
Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in
Types of Hackers• Black Hat Hackers• Gray Hat Hackers• White Hat Hackers
Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in
Types of Hacking• Website Hacking• Email Hacking• Network Hacking• Password Hacking• Online banking Hacking• Computer Hacking
Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in
Malwares• Virus and Worms• Logic Bombs• Spywares• Trojan Horse• Bots
Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in
Protect yourself from Malwares• Antivirus software and keep it upto date• Email attachment should be scanned• Download files should be scanned• External drives should be scanned• Security patches should be applied• Symptoms of virus infection must not be
overlooked
Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in
Hacking Attacks• Social Engineering Attack– Impersonation– Shoulder surfing– Popup windows
• Phishing– Fake pages– Email Scams
• DOS Attack (Denial of Service)
Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in
Fake GMAIL Page
Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in
Phishing Email - Example
Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in
Phishing Email - Example
Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in
Phishing Email - Example
Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in
Nigerian Phishing Email Scam
Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in
Offer Letter Fraud
Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in
A World of OpportunitiesThe Asia-Pacific region is anticipated to account for the majority of Information security solutions marketby 2012. In this world of Opportunities you will see almost every sector emphasizing on information Security. Banking Sector Aviation Industry Corporate Sector Educational Institutions
Government Sector Cyber Crime Investigation cells Global Security agencies Information system Security association National Information Security Testing, Evaluation and certification centres
Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in
Career options that you haveCyber Security ProfessionalInformation Security ProfessionalIS ExecutiveInformation System AuditorSecurity AdvisorsSoftware DevelopersIT SpecialistsIT System ExecutivesIT ConsultantsJunior ProgrammerAssistant Software EngineerR&D ExecutiveSecurity ConsultantSystem EngineerNetwork Engineer… and many more
Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in
What do we do?• Education• Online Reputation Management• Fraud Investigations • Reference checks• Antivirus solutions• Network Penetration Testing
Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in
Building your future
Accelerating your career growth
[email protected] 9962006587