13
INTRODUCTION TO ETHICAL HACKING

Introduction to ethical hacking

Embed Size (px)

DESCRIPTION

foundation to white hat hacker

Citation preview

Page 1: Introduction to ethical hacking

INTRODUCTION TOETHICAL HACKING

Page 2: Introduction to ethical hacking

Are hackers good or bad?

Page 3: Introduction to ethical hacking

Foundation of Information Security

1. The Components 2. People, Process and Technology

Page 4: Introduction to ethical hacking

Recent Headlines

Page 5: Introduction to ethical hacking
Page 6: Introduction to ethical hacking

Number of breaches per threat action category over time

Number of breaches per threat actor category over time

Percent of breaches per threat actor motive over time

Page 7: Introduction to ethical hacking
Page 8: Introduction to ethical hacking

Hacker Classes

Page 9: Introduction to ethical hacking

Hacking vs Ethical Hacking

• Identifiying vulnerabilities to ensure system security

• Simmulating techniques to veirify vulnerabilities

• Exploiting system vulnerabilities to gain unauthorized access

• Modifiying system or application feature

Page 10: Introduction to ethical hacking

Ethical Hacking answers following questions

• What can intruder see?

• What can intruder do?

• Does anyone notice intruders’ attempts?

• All components are adequately protected?

• Does the information security measures are in compliance?

Page 11: Introduction to ethical hacking

Hacking Phases

Page 12: Introduction to ethical hacking

Operating System Attacks

MisconfigurationAttacks

Application LevelAttacks

Shrink Wrap Code Attacks

Types of Attacks

Page 13: Introduction to ethical hacking

THANK YOU