SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Group 5 - Ethical Hacking & Cyber Security
Team Members –
Ankit
Gandharkar
Karishma
Maurya
Tejinder Singh
Sidhu
Shweta Shinde Supriya Chaurasia
Agenda
• What is cyber attack?
• What is cyber security?
• Why cyber security?
• Fundamental goals of cyber security
• What are cyber threats?
• Who is hacker & it’s types?
• What is ethical hacking?
• Roles and responsibilities of ethical hacker
• Skills of ethical hacker
• Phases of Ethical hacking
• Tips to avoid getting hacked
• Careers in ethical hacking & cyber security
What is Cyber Attack?
• A cyber attack is any type of offensive
maneuver that targets computer
information systems, infrastructures,
computer networks, or personal
computer devices. Usually, the
attacker seeks some type of benefit
from disrupting the victim’s network.
• An attacker is a person or process that
attempts to access data, functions or
other restricted areas of the system
without authorization, potentially
with malicious intent.
• Malware, Phishing, Man-in-the-
middle attack, Denial-of-service
attack, SQL injection etc. are the
common types of cyber attack.
What is Cyber Security?
• Cyber security is the practice of defending computers, servers, mobile
devices, electronic systems, networks, and data from malicious
attacks.
• It's also known as information technology security or electronic
information security.
• The term applies in a variety of contexts, from business to mobile
computing, and can be divided into a few common categories. Such as
Network security, Application security, Information security &
Operational security.
Why Cyber Security?
To build a computer system that
prevents hackers’ access and
safeguard system and information
from malicious attack.
To manage adequate preventive
measures in order to avoid security
breaches.
To safeguard user or customer
information available in business
transactions and visits.
To test networks at regular
intervals.
To create security awareness at all
levels in a business. 0
100
200
300
400
500
600
700
800
900
2010 2011 2012 2013 2014 2015 2016 2016 2017 2018
Total Malware Infection Growth Rate
Fundamental Goals of Cyber Security
Confidentiality
Integrity Availability
Cyber Threats
Malware
Virus, Trojans, Spyware,
Ransomware, Adware, &
Botnets
SQL
Injection
Phishing DDoS
Romance
Scams
Man in
the
middle
Dridex
Malware
Emotet
Malware
Who is Hacker?
“Hacker" is someone who explores
methods for breaching defenses &
exploiting weaknesses in a
computer system or network.
Hacking is the act of finding
possible entry points which exist in
a computer system or network and
entering into one of these. Hacking
is usually carried out to gain
unauthorized access to a computer
system or network for negative
purposes such as to harm or steal
the sensitive information from the
computer.
Types of Hackers
Black Hat Hackers
Black Hat hackers, also known
as crackers, are those who hack
in order to gain unauthorized
access to a system and harm its
operations or steal sensitive
information. Black Hat hacking is
always illegal because of its bad
intent which includes stealing
corporate data, violating privacy,
damaging the system, blocking
network communication, etc.
White Hat Hackers
White Hat hackers are also known
as Ethical Hackers. They never
intent to harm a system, rather
they try to find out weaknesses in
a computer or a network system
as a part of penetration testing
and vulnerability assessments.
Ethical hacking is not illegal and it
is one of the demanding jobs
available in the IT industry.
Grey Hat Hackers
Grey hat hackers are a blend of
both black hat and white hat
hackers. They act without
malicious intent but for their fun,
they exploit a security weakness in
a computer system or network
without the owner’s permission or
knowledge. Their intent is to bring
the weakness to the attention of
the owners and getting
appreciation.
What is Ethical Hacking?
• Ethical Hacking is an authorized practice of bypassing system security to
identify potential data breaches and threats in a network. This information
is then used by the organization to improve the system security, to minimize
or eliminate any potential attacks.
• The company that owns the system or network allows Cyber Security
experts to perform such activities in order to test the system’s defenses.
Thus, unlike malicious hacking, this process is planned, approved, and more
importantly, legal.
• Ethical hackers duplicate the techniques and methods followed by malicious
hackers in order to find out the system discrepancies, replicating all the
latter’s steps to find out how a system attack occurred or may occur.
1 2 3 4 5 6
RECONNAISSANCE CLEARING TRACKSGAINING ACCESS
PHASES OF ETHICAL HACKING
Tips to avoid getting hacked
Don’t open a file from an unknown sender
Don’t use same password everywhere
Use anti-virus software
Try not login to your accounts on public networks
Don’t visit fishy websites
Don’t keep a copy of plain text login
Update, Update, Update
Ethical Hacking & Cyber Security Careers
• Network Security Engineer
• Cyber Security Analyst
• Security Architect
• Cyber Security Manager
• Chief Information Security Officer (CISO)
• Certified Ethical Hacker (CEH)
References
• https://www.kaspersky.co.in/resource-center/definitions/what-is-cyber-
security
• https://www.simplilearn.com/what-is-ethical-hacking-
articletps://www.simplilearn.com/top-cyber-security-jobs-india-article
• https://www.safetydetectives.com/blog/ransomware-statistics/
• https://www.rfwireless-world.com/Terminology/Advantages-and-
Disadvantages-of-Ethical-Hacking.html
• https://purplesec.us/protect-business-cyber-attacks/
• https://www.news18.com/news/tech/1852-cyber-attacks-hit-india-each-
minute-last-year-mumbai-delhi-most-affected-2295963.html
• https://www.youtube.com/
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION Yash Shukla
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...Qazi Anwar
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking PresentationAmbikaMalgatti
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical HackingDivyank Jindal
 
Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking PresentationAmanUllah115928
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingAkshay Kale
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide Tauhidul islam
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 

Was ist angesagt? (20)

HACKING
HACKINGHACKING
HACKING
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking Presentation
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 

Ähnlich wie Ethical hacking & cyber security

Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineeringSweta Kumari Barnwal
 
Introduction of ethical hacking.........
Introduction of ethical hacking.........Introduction of ethical hacking.........
Introduction of ethical hacking.........AalyanAbid
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptSHAHID ANSARI
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptSHAHID ANSARI
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Securitypenetration Tester
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxNargis Parveen
 
What is Ethical Hacking?.pptx
What is Ethical Hacking?.pptxWhat is Ethical Hacking?.pptx
What is Ethical Hacking?.pptxStrongboxAcademy
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical HackingMasih Karimi
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxprosunghosh7
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Umesh Mahawar
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxJanani S
 
Ethical Hacking Presentation.pptx
Ethical Hacking Presentation.pptxEthical Hacking Presentation.pptx
Ethical Hacking Presentation.pptxShiblySadik12
 

Ähnlich wie Ethical hacking & cyber security (20)

Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Introduction of ethical hacking.........
Introduction of ethical hacking.........Introduction of ethical hacking.........
Introduction of ethical hacking.........
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
Intro
IntroIntro
Intro
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Hacking
HackingHacking
Hacking
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
What is Ethical Hacking?.pptx
What is Ethical Hacking?.pptxWhat is Ethical Hacking?.pptx
What is Ethical Hacking?.pptx
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical Hacking
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptx
 
Ethical Hacking Presentation.pptx
Ethical Hacking Presentation.pptxEthical Hacking Presentation.pptx
Ethical Hacking Presentation.pptx
 

Kürzlich hochgeladen

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Kürzlich hochgeladen (20)

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Ethical hacking & cyber security

  • 1.
  • 2. Group 5 - Ethical Hacking & Cyber Security Team Members – Ankit Gandharkar Karishma Maurya Tejinder Singh Sidhu Shweta Shinde Supriya Chaurasia
  • 3. Agenda • What is cyber attack? • What is cyber security? • Why cyber security? • Fundamental goals of cyber security • What are cyber threats? • Who is hacker & it’s types? • What is ethical hacking? • Roles and responsibilities of ethical hacker • Skills of ethical hacker • Phases of Ethical hacking • Tips to avoid getting hacked • Careers in ethical hacking & cyber security
  • 4. What is Cyber Attack? • A cyber attack is any type of offensive maneuver that targets computer information systems, infrastructures, computer networks, or personal computer devices. Usually, the attacker seeks some type of benefit from disrupting the victim’s network. • An attacker is a person or process that attempts to access data, functions or other restricted areas of the system without authorization, potentially with malicious intent. • Malware, Phishing, Man-in-the- middle attack, Denial-of-service attack, SQL injection etc. are the common types of cyber attack.
  • 5.
  • 6. What is Cyber Security? • Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. • It's also known as information technology security or electronic information security. • The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories. Such as Network security, Application security, Information security & Operational security.
  • 7. Why Cyber Security? To build a computer system that prevents hackers’ access and safeguard system and information from malicious attack. To manage adequate preventive measures in order to avoid security breaches. To safeguard user or customer information available in business transactions and visits. To test networks at regular intervals. To create security awareness at all levels in a business. 0 100 200 300 400 500 600 700 800 900 2010 2011 2012 2013 2014 2015 2016 2016 2017 2018 Total Malware Infection Growth Rate
  • 8. Fundamental Goals of Cyber Security Confidentiality Integrity Availability
  • 9. Cyber Threats Malware Virus, Trojans, Spyware, Ransomware, Adware, & Botnets SQL Injection Phishing DDoS Romance Scams Man in the middle Dridex Malware Emotet Malware
  • 10. Who is Hacker? “Hacker" is someone who explores methods for breaching defenses & exploiting weaknesses in a computer system or network. Hacking is the act of finding possible entry points which exist in a computer system or network and entering into one of these. Hacking is usually carried out to gain unauthorized access to a computer system or network for negative purposes such as to harm or steal the sensitive information from the computer.
  • 11. Types of Hackers Black Hat Hackers Black Hat hackers, also known as crackers, are those who hack in order to gain unauthorized access to a system and harm its operations or steal sensitive information. Black Hat hacking is always illegal because of its bad intent which includes stealing corporate data, violating privacy, damaging the system, blocking network communication, etc. White Hat Hackers White Hat hackers are also known as Ethical Hackers. They never intent to harm a system, rather they try to find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments. Ethical hacking is not illegal and it is one of the demanding jobs available in the IT industry. Grey Hat Hackers Grey hat hackers are a blend of both black hat and white hat hackers. They act without malicious intent but for their fun, they exploit a security weakness in a computer system or network without the owner’s permission or knowledge. Their intent is to bring the weakness to the attention of the owners and getting appreciation.
  • 12. What is Ethical Hacking? • Ethical Hacking is an authorized practice of bypassing system security to identify potential data breaches and threats in a network. This information is then used by the organization to improve the system security, to minimize or eliminate any potential attacks. • The company that owns the system or network allows Cyber Security experts to perform such activities in order to test the system’s defenses. Thus, unlike malicious hacking, this process is planned, approved, and more importantly, legal. • Ethical hackers duplicate the techniques and methods followed by malicious hackers in order to find out the system discrepancies, replicating all the latter’s steps to find out how a system attack occurred or may occur.
  • 13.
  • 14.
  • 15. 1 2 3 4 5 6 RECONNAISSANCE CLEARING TRACKSGAINING ACCESS PHASES OF ETHICAL HACKING
  • 16. Tips to avoid getting hacked Don’t open a file from an unknown sender Don’t use same password everywhere Use anti-virus software Try not login to your accounts on public networks Don’t visit fishy websites Don’t keep a copy of plain text login Update, Update, Update
  • 17. Ethical Hacking & Cyber Security Careers • Network Security Engineer • Cyber Security Analyst • Security Architect • Cyber Security Manager • Chief Information Security Officer (CISO) • Certified Ethical Hacker (CEH)
  • 18. References • https://www.kaspersky.co.in/resource-center/definitions/what-is-cyber- security • https://www.simplilearn.com/what-is-ethical-hacking- articletps://www.simplilearn.com/top-cyber-security-jobs-india-article • https://www.safetydetectives.com/blog/ransomware-statistics/ • https://www.rfwireless-world.com/Terminology/Advantages-and- Disadvantages-of-Ethical-Hacking.html • https://purplesec.us/protect-business-cyber-attacks/ • https://www.news18.com/news/tech/1852-cyber-attacks-hit-india-each- minute-last-year-mumbai-delhi-most-affected-2295963.html • https://www.youtube.com/