Más contenido relacionado
La actualidad más candente (20)
Similar a What is ethical hacking (20)
What is ethical hacking
- 2. How secure are you……?
www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
- 3. Agenda
• What is Information Security and Ethical Hacking
• Career options in Information Security and Ethical Hacking
www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
- 4. Did you know
In 1980 a computer cracked a 3-character
password within one minute.
In 1999 a team of computers cracked a 56-
character password within one day.
In 2004 a computer virus infected 1 million
computers within one hour.
www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
- 5. What is Ethical Hacking
Ethical hacking, often performed by white hats or skilled
computer experts, is the use of programming skills to
determine vulnerabilities in computer systems. While the
non-ethical hacker or black hat exploits these
vulnerabilities for mischief, personal gain or other
reasons, the ethical hacker evaluates them, points them
out, and may suggest changes to systems that make
them less likely to be penetrated by black hats.
www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
- 6. Types of Hackers
• Black Hat Hackers
• Gray Hat Hackers
• White Hat Hackers
www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
- 7. Types of Hacking
• Website Hacking
• Email Hacking
• Network Hacking
• Password Hacking
• Online banking Hacking
• Computer Hacking
www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
- 8. Malwares
• Virus and Worms
• Logic Bombs
• Spywares
• Trojan Horse
• Bots
www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
- 9. Protect yourself from Malwares
• Antivirus software and keep it upto date
• Email attachment should be scanned
• Download files should be scanned
• External drives should be scanned
• Security patches should be applied
• Symptoms of virus infection must not be overlooked
www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
- 10. Hacking Attacks
• Social Engineering Attack
– Impersonation
– Shoulder surfing
– Popup windows
• Phishing
– Fake pages
– Email Scams
• DOS Attack (Denial of Service)
www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
- 12. Phishing Email - Example
www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
- 13. Phishing Email - Example
www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
- 14. Phishing Email - Example
www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
- 15. Nigerian Phishing Email Scam
www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
- 17. A World of Opportunities
The Asia-Pacific region is anticipated to account for the majority of
Information security solutions market
by 2012. In this world of Opportunities you will see almost every sector
emphasizing on information Security.
Banking Sector
Aviation Industry
Corporate Sector
Educational Institutions
Government Sector
Cyber Crime Investigation cells
Global Security agencies
Information system Security association
National Information Security Testing, Evaluation and certification centres
www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
- 18. Career options that you have
Cyber Security Professional
Information Security Professional
IS Executive
Information System Auditor
Security Advisors
Software Developers
IT Specialists
IT System Executives
IT Consultants
Junior Programmer
Assistant Software Engineer
R&D Executive
Security Consultant
System Engineer
Network Engineer
… and many more
www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
- 19. What do we do?
• Education
• Online Reputation Management
• Fraud Investigations
• Reference checks
• Antivirus solutions
• Network Penetration Testing
www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
- 20. Accelerating your career growth
Building your future
contact@technopundits.in 9962006587
www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.