Upload
agung-suwandaru
View
122
Download
3
Embed Size (px)
DESCRIPTION
foundation to white hat hacker
Citation preview
INTRODUCTION TOETHICAL HACKING
Are hackers good or bad?
Foundation of Information Security
1. The Components 2. People, Process and Technology
Recent Headlines
Number of breaches per threat action category over time
Number of breaches per threat actor category over time
Percent of breaches per threat actor motive over time
Hacker Classes
Hacking vs Ethical Hacking
• Identifiying vulnerabilities to ensure system security
• Simmulating techniques to veirify vulnerabilities
• Exploiting system vulnerabilities to gain unauthorized access
• Modifiying system or application feature
Ethical Hacking answers following questions
• What can intruder see?
• What can intruder do?
• Does anyone notice intruders’ attempts?
• All components are adequately protected?
• Does the information security measures are in compliance?
Hacking Phases
Operating System Attacks
MisconfigurationAttacks
Application LevelAttacks
Shrink Wrap Code Attacks
Types of Attacks
THANK YOU