Ethical hacking ppt

Preview:

DESCRIPTION

A presentation on ethical hacking that covers some basic concepts on it and help audience understand it. But before presenting don't forget to reharse.

Citation preview

ETHICAL HACKING

HACKINGUnlike most computer crime / misuse areas which are clear cut in terms of actions and legalities , computer hacking is more difficult to define.There is no exact definition of hacking. Hacking means finding out weaknesses in an established system and exploiting them. Computer hacking always involves some degree of infringement on the privacy of others or damage to computer-based property such as files, web pages or software

WHO IS A HACKER?On hearing the word “HACKER” most of the peoples are scared. Most of them think of hacker as a computer vandals. But hackers are not computer criminals.Traditionally, hackers were computer geeks who know almost everything about computers both hardware and software and are widely respected for there knowledge.

People who break into someone’s system are called “CRACKERS”.

People who code and release viruses are not necessarily hackers, they are “VIRIiCODERS”.

TYPES OF HACKERS

• BLACK HAT HACKERS

• WHITE HAT HACKERS

• GRAY HAT HACKERS

THREE TOP SIGNS SHOWING THAT A PERSON IS NOT A REAL HACKER

He uses weird handles like avenger, skull, kewl etc.

He boasts about how much he knows, a sure sign of a person who lacks real knowledge.

He flames newbie's of people who ask questions, instead of helping them learn.

CYBER CRIMEWe can categorize Cyber crimes in two ways

The Computer as a Target :-using a computer to attack other computers e.g. Hacking, Virus/Worm attacks, DOS attack etc.The computer as a weapon :-using a computer to commit real world crimes.e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.

IT ACT 2000• In May 2000, both the houses of the Indian

Parliament passed the Information Technology Bill. The Bill received the assent of the President in August 2000 and came to be known as the Information Technology Act, 2000. Cyber laws are contained in the IT Act, 2000.

• This Act aims to provide the legal infrastructure for e-commerce in India. And the cyber laws have a major impact for e-businesses and the new economy in India. So, it is important to understand what are the various perspectives of the IT Act, 2000 and what it offers.

WHAT CAN BE HACKED?WINDOWSMOBILENETWORKWEBPASSWORDS

HACKING WINDOWS• Simple step just open the computer then

look for a round lithium round battery it will probably look like a silver coin. Remove the battery and after 30 seconds or so put it back. Some computers may also require you to reset the jumper, so look for a 3-pin jumper and reset it. If you move the jumper to pins two and three and leave it there for over five seconds, it will reset the CMOS.

CAREER IN ETHICAL HACKING

• In the past few years the demand of ethical hackers is increased in the industry. Undoubtly it is a highly paid job.

• You can become a “CERTIFIED ETHICAL HACKER”(CEH) or a “PENETRATION TESTER”

Some terms related to Hacking

• INTERNET WORMS Worms are often used to

infect large no. of broadband connected computers with remote control software.It works differently then a virus.It won’t attach to different programs but it will produce precise copies of itself

• ROOTKITS A rootkit is often a collection of

programs which are hidden deep into your computer system. They enable administrator level access to a computer or network. For installing a rootkit first of all a programmer has to gain user level access in a system

• ZOMBIES A zombie computer or a “DRONE” is

a computer that has been secretly compromised by hacking tools which allow third party to control the computer and its resources remotely.

• SPAM Used to be a junk or bulk email sent by

the spammer to various recipients aimed at advertising, scamming and sending viruses.

THANK YOU