SlideShare una empresa de Scribd logo
1 de 20
How secure are you……?




www.technopundits.in    Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Agenda
• What is Information Security and Ethical Hacking
• Career options in Information Security and Ethical Hacking




www.technopundits.in                               Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Did you know
 In 1980 a computer cracked a 3-character
  password within one minute.
 In 1999 a team of computers cracked a 56-
  character password within one day.
 In 2004 a computer virus infected 1 million
  computers within one hour.




www.technopundits.in            Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
What is Ethical Hacking
Ethical hacking, often performed by white hats or skilled
computer experts, is the use of programming skills to
determine vulnerabilities in computer systems. While the
non-ethical hacker or black hat exploits these
vulnerabilities for mischief, personal gain or other
reasons, the ethical hacker evaluates them, points them
out, and may suggest changes to systems that make
them less likely to be penetrated by black hats.



www.technopundits.in               Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Types of Hackers
• Black Hat Hackers
• Gray Hat Hackers
• White Hat Hackers




www.technopundits.in   Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Types of Hacking
•   Website Hacking
•   Email Hacking
•   Network Hacking
•   Password Hacking
•   Online banking Hacking
•   Computer Hacking



www.technopundits.in         Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Malwares
•   Virus and Worms
•   Logic Bombs
•   Spywares
•   Trojan Horse
•   Bots




www.technopundits.in   Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Protect yourself from Malwares
•   Antivirus software and keep it upto date
•   Email attachment should be scanned
•   Download files should be scanned
•   External drives should be scanned
•   Security patches should be applied
•   Symptoms of virus infection must not be overlooked



www.technopundits.in             Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Hacking Attacks
• Social Engineering Attack
  – Impersonation
  – Shoulder surfing
  – Popup windows
• Phishing
  – Fake pages
  – Email Scams
• DOS Attack (Denial of Service)


www.technopundits.in           Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Fake GMAIL Page




www.technopundits.in   Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Phishing Email - Example




www.technopundits.in       Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Phishing Email - Example




www.technopundits.in       Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Phishing Email - Example




www.technopundits.in       Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Nigerian Phishing Email Scam




www.technopundits.in    Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Offer Letter Fraud




www.technopundits.in   Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
A World of Opportunities
The Asia-Pacific region is anticipated to account for the majority of
Information security solutions market
by 2012. In this world of Opportunities you will see almost every sector
emphasizing on information Security.
   Banking Sector
   Aviation Industry
   Corporate Sector
   Educational Institutions
       Government Sector
       Cyber Crime Investigation cells
       Global Security agencies
       Information system Security association
       National Information Security Testing, Evaluation and certification centres



www.technopundits.in                                        Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Career options that you have
                Cyber Security Professional
                Information Security Professional
                IS Executive
                Information System Auditor
                Security Advisors
                Software Developers
                IT Specialists
                IT System Executives
                IT Consultants
                Junior Programmer
                Assistant Software Engineer
                R&D Executive
                Security Consultant
                System Engineer
                Network Engineer
                … and many more




www.technopundits.in                         Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
What do we do?
•   Education
•   Online Reputation Management
•   Fraud Investigations
•   Reference checks
•   Antivirus solutions
•   Network Penetration Testing



www.technopundits.in           Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Accelerating your career growth
          Building your future

  contact@technopundits.in                        9962006587


www.technopundits.in         Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.

Más contenido relacionado

La actualidad más candente

Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
tangytangling
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
Jayaseelan Vejayon
 

La actualidad más candente (20)

2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
IoT & Robotics Overview
IoT & Robotics OverviewIoT & Robotics Overview
IoT & Robotics Overview
 
Computerworld Conference (2002)
Computerworld Conference (2002)Computerworld Conference (2002)
Computerworld Conference (2002)
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Hackers
HackersHackers
Hackers
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Cyber security basics
Cyber security basics Cyber security basics
Cyber security basics
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Threats & Cyber Protection Measures
Threats & Cyber Protection MeasuresThreats & Cyber Protection Measures
Threats & Cyber Protection Measures
 
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st ModuleBasic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Module
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
 
Hacking and its terms
Hacking and its termsHacking and its terms
Hacking and its terms
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
 
A Look Into Cyber Security
A Look Into Cyber SecurityA Look Into Cyber Security
A Look Into Cyber Security
 

Similar a What is ethical hacking

E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
Bryan Len
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Mark Henshaw
 

Similar a What is ethical hacking (20)

Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Staying Safe and Secure Online
Staying Safe and Secure OnlineStaying Safe and Secure Online
Staying Safe and Secure Online
 
Secure Coding 2013
Secure Coding 2013 Secure Coding 2013
Secure Coding 2013
 
CYBER51-FYLER
CYBER51-FYLERCYBER51-FYLER
CYBER51-FYLER
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Cybersecurity Threats Web Developers Must Know.pptx
Cybersecurity Threats Web Developers Must Know.pptxCybersecurity Threats Web Developers Must Know.pptx
Cybersecurity Threats Web Developers Must Know.pptx
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sector
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
12990739.ppt
12990739.ppt12990739.ppt
12990739.ppt
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
 
The Secret Of Hacking Trial Pages
The Secret Of Hacking   Trial PagesThe Secret Of Hacking   Trial Pages
The Secret Of Hacking Trial Pages
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
Phish training final
Phish training finalPhish training final
Phish training final
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
 
2014 09-waysofthesoftwarepeople-ctia-20minutesv3-140910235341-phpapp02
2014 09-waysofthesoftwarepeople-ctia-20minutesv3-140910235341-phpapp022014 09-waysofthesoftwarepeople-ctia-20minutesv3-140910235341-phpapp02
2014 09-waysofthesoftwarepeople-ctia-20minutesv3-140910235341-phpapp02
 

Último

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Último (20)

Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 

What is ethical hacking

  • 1.
  • 2. How secure are you……? www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 3. Agenda • What is Information Security and Ethical Hacking • Career options in Information Security and Ethical Hacking www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 4. Did you know  In 1980 a computer cracked a 3-character password within one minute.  In 1999 a team of computers cracked a 56- character password within one day.  In 2004 a computer virus infected 1 million computers within one hour. www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 5. What is Ethical Hacking Ethical hacking, often performed by white hats or skilled computer experts, is the use of programming skills to determine vulnerabilities in computer systems. While the non-ethical hacker or black hat exploits these vulnerabilities for mischief, personal gain or other reasons, the ethical hacker evaluates them, points them out, and may suggest changes to systems that make them less likely to be penetrated by black hats. www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 6. Types of Hackers • Black Hat Hackers • Gray Hat Hackers • White Hat Hackers www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 7. Types of Hacking • Website Hacking • Email Hacking • Network Hacking • Password Hacking • Online banking Hacking • Computer Hacking www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 8. Malwares • Virus and Worms • Logic Bombs • Spywares • Trojan Horse • Bots www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 9. Protect yourself from Malwares • Antivirus software and keep it upto date • Email attachment should be scanned • Download files should be scanned • External drives should be scanned • Security patches should be applied • Symptoms of virus infection must not be overlooked www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 10. Hacking Attacks • Social Engineering Attack – Impersonation – Shoulder surfing – Popup windows • Phishing – Fake pages – Email Scams • DOS Attack (Denial of Service) www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 11. Fake GMAIL Page www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 12. Phishing Email - Example www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 13. Phishing Email - Example www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 14. Phishing Email - Example www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 15. Nigerian Phishing Email Scam www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 16. Offer Letter Fraud www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 17. A World of Opportunities The Asia-Pacific region is anticipated to account for the majority of Information security solutions market by 2012. In this world of Opportunities you will see almost every sector emphasizing on information Security.  Banking Sector  Aviation Industry  Corporate Sector  Educational Institutions  Government Sector  Cyber Crime Investigation cells  Global Security agencies  Information system Security association  National Information Security Testing, Evaluation and certification centres www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 18. Career options that you have Cyber Security Professional Information Security Professional IS Executive Information System Auditor Security Advisors Software Developers IT Specialists IT System Executives IT Consultants Junior Programmer Assistant Software Engineer R&D Executive Security Consultant System Engineer Network Engineer … and many more www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 19. What do we do? • Education • Online Reputation Management • Fraud Investigations • Reference checks • Antivirus solutions • Network Penetration Testing www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 20. Accelerating your career growth Building your future contact@technopundits.in 9962006587 www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.