Top Banner
20
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: What is ethical hacking
Page 2: What is ethical hacking

Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in

How secure are you……?

Page 3: What is ethical hacking

Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in

Agenda• What is Information Security and Ethical Hacking• Career options in Information Security and Ethical Hacking

Page 4: What is ethical hacking

Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in

Did you know In 1980 a computer cracked a 3-character

password within one minute. In 1999 a team of computers cracked a 56-

character password within one day. In 2004 a computer virus infected 1 million

computers within one hour.

Page 5: What is ethical hacking

Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in

What is Ethical HackingEthical hacking, often performed by white hats or skilled computer experts, is the use of programming skills to determine vulnerabilities in computer systems. While the non-ethical hacker or black hat exploits these vulnerabilities for mischief, personal gain or other reasons, the ethical hacker evaluates them, points them out, and may suggest changes to systems that make them less likely to be penetrated by black hats.

Page 6: What is ethical hacking

Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in

Types of Hackers• Black Hat Hackers• Gray Hat Hackers• White Hat Hackers

Page 7: What is ethical hacking

Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in

Types of Hacking• Website Hacking• Email Hacking• Network Hacking• Password Hacking• Online banking Hacking• Computer Hacking

Page 8: What is ethical hacking

Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in

Malwares• Virus and Worms• Logic Bombs• Spywares• Trojan Horse• Bots

Page 9: What is ethical hacking

Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in

Protect yourself from Malwares• Antivirus software and keep it upto date• Email attachment should be scanned• Download files should be scanned• External drives should be scanned• Security patches should be applied• Symptoms of virus infection must not be

overlooked

Page 10: What is ethical hacking

Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in

Hacking Attacks• Social Engineering Attack– Impersonation– Shoulder surfing– Popup windows

• Phishing– Fake pages– Email Scams

• DOS Attack (Denial of Service)

Page 11: What is ethical hacking

Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in

Fake GMAIL Page

Page 12: What is ethical hacking

Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in

Phishing Email - Example

Page 13: What is ethical hacking

Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in

Phishing Email - Example

Page 14: What is ethical hacking

Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in

Phishing Email - Example

Page 15: What is ethical hacking

Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in

Nigerian Phishing Email Scam

Page 16: What is ethical hacking

Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in

Offer Letter Fraud

Page 17: What is ethical hacking

Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in

A World of OpportunitiesThe Asia-Pacific region is anticipated to account for the majority of Information security solutions marketby 2012. In this world of Opportunities you will see almost every sector emphasizing on information Security. Banking Sector Aviation Industry Corporate Sector Educational Institutions

Government Sector Cyber Crime Investigation cells Global Security agencies Information system Security association National Information Security Testing, Evaluation and certification centres

Page 18: What is ethical hacking

Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in

Career options that you haveCyber Security ProfessionalInformation Security ProfessionalIS ExecutiveInformation System AuditorSecurity AdvisorsSoftware DevelopersIT SpecialistsIT System ExecutivesIT ConsultantsJunior ProgrammerAssistant Software EngineerR&D ExecutiveSecurity ConsultantSystem EngineerNetwork Engineer… and many more

Page 19: What is ethical hacking

Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in

What do we do?• Education• Online Reputation Management• Fraud Investigations • Reference checks• Antivirus solutions• Network Penetration Testing

Page 20: What is ethical hacking

Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.www.technopundits.in

Building your future

Accelerating your career growth

[email protected] 9962006587