14
INFORMATION SECURITY & ETHICAL HACKING - Jophine Pranjal Antony

INFORMATION SECURITY & ETHICAL HACKING

  • Upload
    pakuna

  • View
    78

  • Download
    3

Embed Size (px)

DESCRIPTION

INFORMATION SECURITY & ETHICAL HACKING. - Jophine Pranjal Antony. Information Security. Securing valuable information stored as soft copy is called information security. Types: Data Security Computer Security LAN Security Internet Security. What is hacking?. - PowerPoint PPT Presentation

Citation preview

Page 1: INFORMATION SECURITY & ETHICAL HACKING

INFORMATION SECURITY &

ETHICAL HACKING

- Jophine Pranjal Antony

Page 2: INFORMATION SECURITY & ETHICAL HACKING

Information Security Securing valuable information

stored as soft copy is called information

security.

Types:

Data SecurityComputer SecurityLAN SecurityInternet Security

Page 3: INFORMATION SECURITY & ETHICAL HACKING

What is hacking?Unauthorized use or attempts to circumvent or bypass the security mechanism of an information system like a computer / server / network.

HACKED!!!

Page 4: INFORMATION SECURITY & ETHICAL HACKING

Basic ThreatsTheft of passwordemail based threatsLaunch of malicious programs

(Trojans)

Be

Careful...

Page 5: INFORMATION SECURITY & ETHICAL HACKING

Concept of HackingWhite hat hacking (penetration

testing)Black hat hackingGrey hat hacking

Don’t get

trapped

Page 6: INFORMATION SECURITY & ETHICAL HACKING

Anatomy of HackingEither break username and

password orBomb the server with exploits

(weakness)

Please!!! wake

up

Page 7: INFORMATION SECURITY & ETHICAL HACKING

SAM FileSecurity Accounts Manager (SAM)

%systemroot%\system32\config

Passwords are not stored in SAM file rather than their hashes are. If you are logged in as administrator even then direct manipulation to this file is not possible. For authentication purpose the entered password is hashed and then compared.

Page 8: INFORMATION SECURITY & ETHICAL HACKING

Virus & WormsA VIRUS is a malicious piece of

code which cause an unexpected, harmful and negative effect on the victim’s system.

A WORM is similar to a VIRUS, but has additional ability to reside in the memory of infected computer, duplicate itself & spreads copies of itself via email, chat or the network.

Page 9: INFORMATION SECURITY & ETHICAL HACKING

Spyware & Trojan HorseSpyware is a software which gathers information

about the victim & passes on that information to the attacker, without even taking the victim’s consent.Tools: spy check, spyware info, spy stopper.

Trojan Horse is a piece of software which appears to perform a certain action but, in fact performs, another!

“It is an unauthorized program contained within a legitimate program. This performs function unknown by the user.”

Page 10: INFORMATION SECURITY & ETHICAL HACKING

Key LoggerIt is a spy software which monitors all

keystrokes made on the victim’s computer.Types:

1. Hardware key logger2. Software key logger.

Prevention:A typical key logger automatically loads itself

into memory, each time the computer boots.“So one should search all the start up files of

the system and remove it if any suspicious file or application is found”.

Page 11: INFORMATION SECURITY & ETHICAL HACKING

Password Cracking

Password guessingDictionary based attacksBrute Force AttacksDefault PasswordSocial Engineering

Page 12: INFORMATION SECURITY & ETHICAL HACKING

Tips for Strong PasswordDon’t use personal information for

password.Don’t use words in dictionary including

foreign languages.Use combination of uppercase and

lowercase letters, numbers and symbols.Don’t substitute number for letters to make

words.Eg. s0ph1st1cated

Use longer passwords. CONT…

Page 13: INFORMATION SECURITY & ETHICAL HACKING

Tips for Strong PasswordDon’t passwords that you see in security

articles, even if they are exceptionally complex.

Select passwords which can only be understood by you. For others it should look like random combination of characters.Eg: mfc!rB&G (“my favorite colors (!) are Blue & Green”)

Select password which you can type faster.

Page 14: INFORMATION SECURITY & ETHICAL HACKING

Thank YouCourtesy: Appin HomeTech