SlideShare ist ein Scribd-Unternehmen logo
1 von 54
Introduction to IT Security & Ethical Hacking INTRODUCTION
CURRENT ONLINE THREATS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
THE NEED OF THE HOUR? This is very similar to asking the question: “  Why do you have door locks in your houses?” “  Why do you have a safe for valuables?” “  Why do you have a watchman?” “  Why do you have police?”  TO PROTECT VALUABLE INFORMATION
SURETY!!! You can attain Total Computer Security! The best way to do so is to apply  Richards' Laws Of Computer Security  (ca. 1992): A.      Don't buy a computer B.       If you do buy a computer, don't turn it on.
WORLD CLASS HACKERS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WORLD STATSTICS 1
WORLD STATSTICS 2
COMMON CYBER CRIMES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Protection for Home Safety Password protection  for Document Safety Login protection  for Operating System Safety PASSWORD PROTECTION
THEFT OF PASSWORD  Password Stealing  can be done by using following techniques: ,[object Object],[object Object],[object Object],[object Object]
TRUTH
Social Engineering Attack
SOCIAL ENGINEERING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Results ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],KEY LOGGERS
KEY LOGGERS (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
TROJAN had a heated argument over one girl, When the girl, asked to choose or Choose Rahul Mukesh Radha Rahul Mukesh Radha Mukesh
TROJAN (Cont.) sent a spoofed e-card the Trojan was installed on his computer. Rahul now had complete control over Mukesh’s computer and proceeded to harass him thoroughly.  ( which appeared to have come from Radha’s mail account ) The e-card actually contained a Trojan. opened the card Rahul Mukesh Radha Mukesh
TROJAN (Cont.) ,[object Object],[object Object],[object Object]
Types of Trojans ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Phishing Attack
PHISHING ATTACK ,[object Object],[object Object]
WORLD STATSTICS 2
WORLD STSTSTICS
EXAMPLE OF YAHOO PHISHING
EXAMPLE OF ORKUT PAGE
 
Mobile Hacking
SMS SPOOFING
CALL SPOOFING
NEW AGE CYBER CRIME How secure are India's call centres?           Is information security becoming a casualty in India's booming call centres as they drive down costs to keep themselves competitive for foreign clients?  [BBC NEWS NETWORK ] http://news.bbc.co.uk/1/hi/world/south_asia/4619859.stm
 
E-MAIL BASED CRIMES   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SPREADING TROJAN, VIRUS  & WORMS   Sends spoofed  E-mail:  [email_address] Computer A Receives E-mail from: [email_address] Computer B Computer B opens the attachment thinking it’s a security patch software Trojan Spyware Virus Worms Computer Crashed
E-MAIL BOMBING Sent mail Loads of E-mails Blast!!!!
THREATNING E-MAILS   With attachment (morphed pornographic photographs of Poorva ) an E-mail message The mail message said that if Poorva were not to pay Rs. 10,000 at a specified place every month, the photographs would be uploaded to the Net and then a copy sent to her fiancé Scared, Poorva at first complied with the wishes of the blackmailer and paid the first Rs. 10, 000 Trusting the reasonableness of her fiancé she told him the truth. Together they approached the police. Investigation turned up the culprit   Poorva Poorva’s fiancé   Blackmailer Poorva’s supposed friend who wanted that Poorva and her fiancé should break up so that she would get her chance with him
CREDIT CARDS
IT SECURITY ????????? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Situation
The Situation
The Situation
The Situation
The Situation
The Situation
The Situation
LEVEL 1 CONTENTS!!! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
LEVEL 2 CONTENTS!!! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
LEVEL 3 CONTENTS!!! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Course USP’s ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“  Unique learning methodology and strong course will solve the  man power problems in the sector of Information Security”
[object Object],[object Object],[object Object],[object Object],Certified person will be able to….
[object Object],[object Object],[object Object],[object Object],Certified person will be able to….
[object Object],[object Object],[object Object],[object Object],[object Object],Certified person will be able to….
[object Object],Training Methodology
Visit www.educationsure.com   Contact for Training enquiries:-  Mr. P.Satish kumar info @educationsure.com   Mobile Number:- +91-9841833455 EducationSure 7/4,Telephone colony ,1 st  main road Madhavaram milk colony chennai-52

Weitere ähnliche Inhalte

Was ist angesagt?

Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyay
Chandra Prakash
 

Was ist angesagt? (20)

Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should Follow
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyay
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical Hacking
 
the best hacking ppt
the best hacking pptthe best hacking ppt
the best hacking ppt
 
Hacking Tutorial in Telugu
Hacking Tutorial in TeluguHacking Tutorial in Telugu
Hacking Tutorial in Telugu
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 

Andere mochten auch

Website Hacking and Preventive Measures
Website Hacking and Preventive MeasuresWebsite Hacking and Preventive Measures
Website Hacking and Preventive Measures
Shubham Takode
 

Andere mochten auch (20)

Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Ethical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSEthical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFS
 
Day3 Backup
Day3 BackupDay3 Backup
Day3 Backup
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and Hacking
 
How to remove shortcut virus from pendrive using cmd easily
How to remove shortcut virus from pendrive using cmd easilyHow to remove shortcut virus from pendrive using cmd easily
How to remove shortcut virus from pendrive using cmd easily
 
System Security in Ethical Hacking
System Security in Ethical HackingSystem Security in Ethical Hacking
System Security in Ethical Hacking
 
Puppy Pendrive
Puppy PendrivePuppy Pendrive
Puppy Pendrive
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Website Hacking and Preventive Measures
Website Hacking and Preventive MeasuresWebsite Hacking and Preventive Measures
Website Hacking and Preventive Measures
 
How to become a hacker
How to become a hackerHow to become a hacker
How to become a hacker
 
How to Become a Hacker?
How to Become a Hacker?How to Become a Hacker?
How to Become a Hacker?
 
Cyber security and ethical hacking 7
Cyber security and ethical hacking 7Cyber security and ethical hacking 7
Cyber security and ethical hacking 7
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Installation of windows 7 || how to boot pendrive or cd/dvd
Installation of windows 7 || how to boot pendrive or cd/dvdInstallation of windows 7 || how to boot pendrive or cd/dvd
Installation of windows 7 || how to boot pendrive or cd/dvd
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
 

Ähnlich wie It security &_ethical_hacking

E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
BbAOC
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
hm5314581
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
ciso_insights
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Mark Henshaw
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
Arifa Ali
 

Ähnlich wie It security &_ethical_hacking (20)

E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 
Ethical hacking Book Review
Ethical hacking Book ReviewEthical hacking Book Review
Ethical hacking Book Review
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 

Kürzlich hochgeladen

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 

It security &_ethical_hacking

  • 1. Introduction to IT Security & Ethical Hacking INTRODUCTION
  • 2.
  • 3.
  • 4. THE NEED OF THE HOUR? This is very similar to asking the question: “ Why do you have door locks in your houses?” “ Why do you have a safe for valuables?” “ Why do you have a watchman?” “ Why do you have police?” TO PROTECT VALUABLE INFORMATION
  • 5. SURETY!!! You can attain Total Computer Security! The best way to do so is to apply Richards' Laws Of Computer Security (ca. 1992): A.     Don't buy a computer B.      If you do buy a computer, don't turn it on.
  • 6.
  • 9.
  • 10. Key Protection for Home Safety Password protection for Document Safety Login protection for Operating System Safety PASSWORD PROTECTION
  • 11.
  • 12. TRUTH
  • 14.
  • 15.
  • 16.
  • 17. TROJAN had a heated argument over one girl, When the girl, asked to choose or Choose Rahul Mukesh Radha Rahul Mukesh Radha Mukesh
  • 18. TROJAN (Cont.) sent a spoofed e-card the Trojan was installed on his computer. Rahul now had complete control over Mukesh’s computer and proceeded to harass him thoroughly. ( which appeared to have come from Radha’s mail account ) The e-card actually contained a Trojan. opened the card Rahul Mukesh Radha Mukesh
  • 19.
  • 20.
  • 22.
  • 25. EXAMPLE OF YAHOO PHISHING
  • 27.  
  • 31. NEW AGE CYBER CRIME How secure are India's call centres?         Is information security becoming a casualty in India's booming call centres as they drive down costs to keep themselves competitive for foreign clients? [BBC NEWS NETWORK ] http://news.bbc.co.uk/1/hi/world/south_asia/4619859.stm
  • 32.  
  • 33.
  • 34. SPREADING TROJAN, VIRUS & WORMS Sends spoofed E-mail: [email_address] Computer A Receives E-mail from: [email_address] Computer B Computer B opens the attachment thinking it’s a security patch software Trojan Spyware Virus Worms Computer Crashed
  • 35. E-MAIL BOMBING Sent mail Loads of E-mails Blast!!!!
  • 36. THREATNING E-MAILS With attachment (morphed pornographic photographs of Poorva ) an E-mail message The mail message said that if Poorva were not to pay Rs. 10,000 at a specified place every month, the photographs would be uploaded to the Net and then a copy sent to her fiancé Scared, Poorva at first complied with the wishes of the blackmailer and paid the first Rs. 10, 000 Trusting the reasonableness of her fiancé she told him the truth. Together they approached the police. Investigation turned up the culprit Poorva Poorva’s fiancé Blackmailer Poorva’s supposed friend who wanted that Poorva and her fiancé should break up so that she would get her chance with him
  • 38.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54. Visit www.educationsure.com Contact for Training enquiries:- Mr. P.Satish kumar info @educationsure.com Mobile Number:- +91-9841833455 EducationSure 7/4,Telephone colony ,1 st main road Madhavaram milk colony chennai-52

Hinweis der Redaktion

  1. -
  2. -
  3. -