SlideShare ist ein Scribd-Unternehmen logo
1 von 20
How secure are you……?




www.technopundits.in    Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Agenda
• What is Information Security and Ethical Hacking
• Career options in Information Security and Ethical Hacking




www.technopundits.in                               Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Did you know
 In 1980 a computer cracked a 3-character
  password within one minute.
 In 1999 a team of computers cracked a 56-
  character password within one day.
 In 2004 a computer virus infected 1 million
  computers within one hour.




www.technopundits.in            Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
What is Ethical Hacking
Ethical hacking, often performed by white hats or skilled
computer experts, is the use of programming skills to
determine vulnerabilities in computer systems. While the
non-ethical hacker or black hat exploits these
vulnerabilities for mischief, personal gain or other
reasons, the ethical hacker evaluates them, points them
out, and may suggest changes to systems that make
them less likely to be penetrated by black hats.



www.technopundits.in               Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Types of Hackers
• Black Hat Hackers
• Gray Hat Hackers
• White Hat Hackers




www.technopundits.in   Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Types of Hacking
•   Website Hacking
•   Email Hacking
•   Network Hacking
•   Password Hacking
•   Online banking Hacking
•   Computer Hacking



www.technopundits.in         Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Malwares
•   Virus and Worms
•   Logic Bombs
•   Spywares
•   Trojan Horse
•   Bots




www.technopundits.in   Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Protect yourself from Malwares
•   Antivirus software and keep it upto date
•   Email attachment should be scanned
•   Download files should be scanned
•   External drives should be scanned
•   Security patches should be applied
•   Symptoms of virus infection must not be overlooked



www.technopundits.in             Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Hacking Attacks
• Social Engineering Attack
  – Impersonation
  – Shoulder surfing
  – Popup windows
• Phishing
  – Fake pages
  – Email Scams
• DOS Attack (Denial of Service)


www.technopundits.in           Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Fake GMAIL Page




www.technopundits.in   Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Phishing Email - Example




www.technopundits.in       Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Phishing Email - Example




www.technopundits.in       Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Phishing Email - Example




www.technopundits.in       Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Nigerian Phishing Email Scam




www.technopundits.in    Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Offer Letter Fraud




www.technopundits.in   Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
A World of Opportunities
The Asia-Pacific region is anticipated to account for the majority of
Information security solutions market
by 2012. In this world of Opportunities you will see almost every sector
emphasizing on information Security.
   Banking Sector
   Aviation Industry
   Corporate Sector
   Educational Institutions
       Government Sector
       Cyber Crime Investigation cells
       Global Security agencies
       Information system Security association
       National Information Security Testing, Evaluation and certification centres



www.technopundits.in                                        Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Career options that you have
                Cyber Security Professional
                Information Security Professional
                IS Executive
                Information System Auditor
                Security Advisors
                Software Developers
                IT Specialists
                IT System Executives
                IT Consultants
                Junior Programmer
                Assistant Software Engineer
                R&D Executive
                Security Consultant
                System Engineer
                Network Engineer
                … and many more




www.technopundits.in                         Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
What do we do?
•   Education
•   Online Reputation Management
•   Fraud Investigations
•   Reference checks
•   Antivirus solutions
•   Network Penetration Testing



www.technopundits.in           Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Accelerating your career growth
          Building your future

  contact@technopundits.in                        9962006587


www.technopundits.in         Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.

Weitere ähnliche Inhalte

Was ist angesagt?

2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get InterestingIBM Security
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide Tauhidul islam
 
IoT & Robotics Overview
IoT & Robotics OverviewIoT & Robotics Overview
IoT & Robotics OverviewKarthik Sarma
 
Computerworld Conference (2002)
Computerworld Conference (2002)Computerworld Conference (2002)
Computerworld Conference (2002)Skeeve Stevens
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hackingtangytangling
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
Threats & Cyber Protection Measures
Threats & Cyber Protection MeasuresThreats & Cyber Protection Measures
Threats & Cyber Protection MeasuresShiva Bissessar
 
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st ModuleBasic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Moduleankit sarode
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber securityInderjeet Singh
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsDinesh O Bareja
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeDeepak Kumar (D3)
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation Ajith Reddy
 
A Look Into Cyber Security
A Look Into Cyber SecurityA Look Into Cyber Security
A Look Into Cyber SecurityGTreasury
 

Was ist angesagt? (20)

2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
IoT & Robotics Overview
IoT & Robotics OverviewIoT & Robotics Overview
IoT & Robotics Overview
 
Computerworld Conference (2002)
Computerworld Conference (2002)Computerworld Conference (2002)
Computerworld Conference (2002)
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Hackers
HackersHackers
Hackers
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Cyber security basics
Cyber security basics Cyber security basics
Cyber security basics
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Threats & Cyber Protection Measures
Threats & Cyber Protection MeasuresThreats & Cyber Protection Measures
Threats & Cyber Protection Measures
 
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st ModuleBasic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Module
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
 
Hacking and its terms
Hacking and its termsHacking and its terms
Hacking and its terms
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
 
A Look Into Cyber Security
A Look Into Cyber SecurityA Look Into Cyber Security
A Look Into Cyber Security
 

Ähnlich wie What is ethical hacking

Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!Team Sistemi
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
Staying Safe and Secure Online
Staying Safe and Secure OnlineStaying Safe and Secure Online
Staying Safe and Secure Onlineevolutionaryit
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackinghcls
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
 
Cybersecurity Threats Web Developers Must Know.pptx
Cybersecurity Threats Web Developers Must Know.pptxCybersecurity Threats Web Developers Must Know.pptx
Cybersecurity Threats Web Developers Must Know.pptxMaster Infotech
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sectorCore Security
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Knowledge Group
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of ThingsBryan Len
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with aiBurhan Ahmed
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxInfosectrain3
 
The Secret Of Hacking Trial Pages
The Secret Of Hacking   Trial PagesThe Secret Of Hacking   Trial Pages
The Secret Of Hacking Trial Pagesleoimpact
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hackingsatish kumar
 
Phish training final
Phish training finalPhish training final
Phish training finalJen Ruhman
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 aMark Henshaw
 
2014 09-waysofthesoftwarepeople-ctia-20minutesv3-140910235341-phpapp02
2014 09-waysofthesoftwarepeople-ctia-20minutesv3-140910235341-phpapp022014 09-waysofthesoftwarepeople-ctia-20minutesv3-140910235341-phpapp02
2014 09-waysofthesoftwarepeople-ctia-20minutesv3-140910235341-phpapp02umair jawaid
 

Ähnlich wie What is ethical hacking (20)

Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Staying Safe and Secure Online
Staying Safe and Secure OnlineStaying Safe and Secure Online
Staying Safe and Secure Online
 
Secure Coding 2013
Secure Coding 2013 Secure Coding 2013
Secure Coding 2013
 
CYBER51-FYLER
CYBER51-FYLERCYBER51-FYLER
CYBER51-FYLER
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Cybersecurity Threats Web Developers Must Know.pptx
Cybersecurity Threats Web Developers Must Know.pptxCybersecurity Threats Web Developers Must Know.pptx
Cybersecurity Threats Web Developers Must Know.pptx
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sector
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
12990739.ppt
12990739.ppt12990739.ppt
12990739.ppt
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
 
The Secret Of Hacking Trial Pages
The Secret Of Hacking   Trial PagesThe Secret Of Hacking   Trial Pages
The Secret Of Hacking Trial Pages
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
Phish training final
Phish training finalPhish training final
Phish training final
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
 
2014 09-waysofthesoftwarepeople-ctia-20minutesv3-140910235341-phpapp02
2014 09-waysofthesoftwarepeople-ctia-20minutesv3-140910235341-phpapp022014 09-waysofthesoftwarepeople-ctia-20minutesv3-140910235341-phpapp02
2014 09-waysofthesoftwarepeople-ctia-20minutesv3-140910235341-phpapp02
 

Kürzlich hochgeladen

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 

Kürzlich hochgeladen (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 

What is ethical hacking

  • 1.
  • 2. How secure are you……? www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 3. Agenda • What is Information Security and Ethical Hacking • Career options in Information Security and Ethical Hacking www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 4. Did you know  In 1980 a computer cracked a 3-character password within one minute.  In 1999 a team of computers cracked a 56- character password within one day.  In 2004 a computer virus infected 1 million computers within one hour. www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 5. What is Ethical Hacking Ethical hacking, often performed by white hats or skilled computer experts, is the use of programming skills to determine vulnerabilities in computer systems. While the non-ethical hacker or black hat exploits these vulnerabilities for mischief, personal gain or other reasons, the ethical hacker evaluates them, points them out, and may suggest changes to systems that make them less likely to be penetrated by black hats. www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 6. Types of Hackers • Black Hat Hackers • Gray Hat Hackers • White Hat Hackers www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 7. Types of Hacking • Website Hacking • Email Hacking • Network Hacking • Password Hacking • Online banking Hacking • Computer Hacking www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 8. Malwares • Virus and Worms • Logic Bombs • Spywares • Trojan Horse • Bots www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 9. Protect yourself from Malwares • Antivirus software and keep it upto date • Email attachment should be scanned • Download files should be scanned • External drives should be scanned • Security patches should be applied • Symptoms of virus infection must not be overlooked www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 10. Hacking Attacks • Social Engineering Attack – Impersonation – Shoulder surfing – Popup windows • Phishing – Fake pages – Email Scams • DOS Attack (Denial of Service) www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 11. Fake GMAIL Page www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 12. Phishing Email - Example www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 13. Phishing Email - Example www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 14. Phishing Email - Example www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 15. Nigerian Phishing Email Scam www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 16. Offer Letter Fraud www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 17. A World of Opportunities The Asia-Pacific region is anticipated to account for the majority of Information security solutions market by 2012. In this world of Opportunities you will see almost every sector emphasizing on information Security.  Banking Sector  Aviation Industry  Corporate Sector  Educational Institutions  Government Sector  Cyber Crime Investigation cells  Global Security agencies  Information system Security association  National Information Security Testing, Evaluation and certification centres www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 18. Career options that you have Cyber Security Professional Information Security Professional IS Executive Information System Auditor Security Advisors Software Developers IT Specialists IT System Executives IT Consultants Junior Programmer Assistant Software Engineer R&D Executive Security Consultant System Engineer Network Engineer … and many more www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 19. What do we do? • Education • Online Reputation Management • Fraud Investigations • Reference checks • Antivirus solutions • Network Penetration Testing www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
  • 20. Accelerating your career growth Building your future contact@technopundits.in 9962006587 www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.