2. Group 5 - Ethical Hacking & Cyber Security
Team Members –
Ankit
Gandharkar
Karishma
Maurya
Tejinder Singh
Sidhu
Shweta Shinde Supriya Chaurasia
3. Agenda
• What is cyber attack?
• What is cyber security?
• Why cyber security?
• Fundamental goals of cyber security
• What are cyber threats?
• Who is hacker & it’s types?
• What is ethical hacking?
• Roles and responsibilities of ethical hacker
• Skills of ethical hacker
• Phases of Ethical hacking
• Tips to avoid getting hacked
• Careers in ethical hacking & cyber security
4. What is Cyber Attack?
• A cyber attack is any type of offensive
maneuver that targets computer
information systems, infrastructures,
computer networks, or personal
computer devices. Usually, the
attacker seeks some type of benefit
from disrupting the victim’s network.
• An attacker is a person or process that
attempts to access data, functions or
other restricted areas of the system
without authorization, potentially
with malicious intent.
• Malware, Phishing, Man-in-the-
middle attack, Denial-of-service
attack, SQL injection etc. are the
common types of cyber attack.
5.
6. What is Cyber Security?
• Cyber security is the practice of defending computers, servers, mobile
devices, electronic systems, networks, and data from malicious
attacks.
• It's also known as information technology security or electronic
information security.
• The term applies in a variety of contexts, from business to mobile
computing, and can be divided into a few common categories. Such as
Network security, Application security, Information security &
Operational security.
7. Why Cyber Security?
To build a computer system that
prevents hackers’ access and
safeguard system and information
from malicious attack.
To manage adequate preventive
measures in order to avoid security
breaches.
To safeguard user or customer
information available in business
transactions and visits.
To test networks at regular
intervals.
To create security awareness at all
levels in a business. 0
100
200
300
400
500
600
700
800
900
2010 2011 2012 2013 2014 2015 2016 2016 2017 2018
Total Malware Infection Growth Rate
9. Cyber Threats
Malware
Virus, Trojans, Spyware,
Ransomware, Adware, &
Botnets
SQL
Injection
Phishing DDoS
Romance
Scams
Man in
the
middle
Dridex
Malware
Emotet
Malware
10. Who is Hacker?
“Hacker" is someone who explores
methods for breaching defenses &
exploiting weaknesses in a
computer system or network.
Hacking is the act of finding
possible entry points which exist in
a computer system or network and
entering into one of these. Hacking
is usually carried out to gain
unauthorized access to a computer
system or network for negative
purposes such as to harm or steal
the sensitive information from the
computer.
11. Types of Hackers
Black Hat Hackers
Black Hat hackers, also known
as crackers, are those who hack
in order to gain unauthorized
access to a system and harm its
operations or steal sensitive
information. Black Hat hacking is
always illegal because of its bad
intent which includes stealing
corporate data, violating privacy,
damaging the system, blocking
network communication, etc.
White Hat Hackers
White Hat hackers are also known
as Ethical Hackers. They never
intent to harm a system, rather
they try to find out weaknesses in
a computer or a network system
as a part of penetration testing
and vulnerability assessments.
Ethical hacking is not illegal and it
is one of the demanding jobs
available in the IT industry.
Grey Hat Hackers
Grey hat hackers are a blend of
both black hat and white hat
hackers. They act without
malicious intent but for their fun,
they exploit a security weakness in
a computer system or network
without the owner’s permission or
knowledge. Their intent is to bring
the weakness to the attention of
the owners and getting
appreciation.
12. What is Ethical Hacking?
• Ethical Hacking is an authorized practice of bypassing system security to
identify potential data breaches and threats in a network. This information
is then used by the organization to improve the system security, to minimize
or eliminate any potential attacks.
• The company that owns the system or network allows Cyber Security
experts to perform such activities in order to test the system’s defenses.
Thus, unlike malicious hacking, this process is planned, approved, and more
importantly, legal.
• Ethical hackers duplicate the techniques and methods followed by malicious
hackers in order to find out the system discrepancies, replicating all the
latter’s steps to find out how a system attack occurred or may occur.
16. Tips to avoid getting hacked
Don’t open a file from an unknown sender
Don’t use same password everywhere
Use anti-virus software
Try not login to your accounts on public networks
Don’t visit fishy websites
Don’t keep a copy of plain text login
Update, Update, Update