SlideShare uma empresa Scribd logo
1 de 19
Group 5 - Ethical Hacking & Cyber Security
Team Members –
Ankit
Gandharkar
Karishma
Maurya
Tejinder Singh
Sidhu
Shweta Shinde Supriya Chaurasia
Agenda
• What is cyber attack?
• What is cyber security?
• Why cyber security?
• Fundamental goals of cyber security
• What are cyber threats?
• Who is hacker & it’s types?
• What is ethical hacking?
• Roles and responsibilities of ethical hacker
• Skills of ethical hacker
• Phases of Ethical hacking
• Tips to avoid getting hacked
• Careers in ethical hacking & cyber security
What is Cyber Attack?
• A cyber attack is any type of offensive
maneuver that targets computer
information systems, infrastructures,
computer networks, or personal
computer devices. Usually, the
attacker seeks some type of benefit
from disrupting the victim’s network.
• An attacker is a person or process that
attempts to access data, functions or
other restricted areas of the system
without authorization, potentially
with malicious intent.
• Malware, Phishing, Man-in-the-
middle attack, Denial-of-service
attack, SQL injection etc. are the
common types of cyber attack.
What is Cyber Security?
• Cyber security is the practice of defending computers, servers, mobile
devices, electronic systems, networks, and data from malicious
attacks.
• It's also known as information technology security or electronic
information security.
• The term applies in a variety of contexts, from business to mobile
computing, and can be divided into a few common categories. Such as
Network security, Application security, Information security &
Operational security.
Why Cyber Security?
To build a computer system that
prevents hackers’ access and
safeguard system and information
from malicious attack.
To manage adequate preventive
measures in order to avoid security
breaches.
To safeguard user or customer
information available in business
transactions and visits.
To test networks at regular
intervals.
To create security awareness at all
levels in a business. 0
100
200
300
400
500
600
700
800
900
2010 2011 2012 2013 2014 2015 2016 2016 2017 2018
Total Malware Infection Growth Rate
Fundamental Goals of Cyber Security
Confidentiality
Integrity Availability
Cyber Threats
Malware
Virus, Trojans, Spyware,
Ransomware, Adware, &
Botnets
SQL
Injection
Phishing DDoS
Romance
Scams
Man in
the
middle
Dridex
Malware
Emotet
Malware
Who is Hacker?
“Hacker" is someone who explores
methods for breaching defenses &
exploiting weaknesses in a
computer system or network.
Hacking is the act of finding
possible entry points which exist in
a computer system or network and
entering into one of these. Hacking
is usually carried out to gain
unauthorized access to a computer
system or network for negative
purposes such as to harm or steal
the sensitive information from the
computer.
Types of Hackers
Black Hat Hackers
Black Hat hackers, also known
as crackers, are those who hack
in order to gain unauthorized
access to a system and harm its
operations or steal sensitive
information. Black Hat hacking is
always illegal because of its bad
intent which includes stealing
corporate data, violating privacy,
damaging the system, blocking
network communication, etc.
White Hat Hackers
White Hat hackers are also known
as Ethical Hackers. They never
intent to harm a system, rather
they try to find out weaknesses in
a computer or a network system
as a part of penetration testing
and vulnerability assessments.
Ethical hacking is not illegal and it
is one of the demanding jobs
available in the IT industry.
Grey Hat Hackers
Grey hat hackers are a blend of
both black hat and white hat
hackers. They act without
malicious intent but for their fun,
they exploit a security weakness in
a computer system or network
without the owner’s permission or
knowledge. Their intent is to bring
the weakness to the attention of
the owners and getting
appreciation.
What is Ethical Hacking?
• Ethical Hacking is an authorized practice of bypassing system security to
identify potential data breaches and threats in a network. This information
is then used by the organization to improve the system security, to minimize
or eliminate any potential attacks.
• The company that owns the system or network allows Cyber Security
experts to perform such activities in order to test the system’s defenses.
Thus, unlike malicious hacking, this process is planned, approved, and more
importantly, legal.
• Ethical hackers duplicate the techniques and methods followed by malicious
hackers in order to find out the system discrepancies, replicating all the
latter’s steps to find out how a system attack occurred or may occur.
1 2 3 4 5 6
RECONNAISSANCE CLEARING TRACKSGAINING ACCESS
PHASES OF ETHICAL HACKING
Tips to avoid getting hacked
Don’t open a file from an unknown sender
Don’t use same password everywhere
Use anti-virus software
Try not login to your accounts on public networks
Don’t visit fishy websites
Don’t keep a copy of plain text login
Update, Update, Update
Ethical Hacking & Cyber Security Careers
• Network Security Engineer
• Cyber Security Analyst
• Security Architect
• Cyber Security Manager
• Chief Information Security Officer (CISO)
• Certified Ethical Hacker (CEH)
References
• https://www.kaspersky.co.in/resource-center/definitions/what-is-cyber-
security
• https://www.simplilearn.com/what-is-ethical-hacking-
articletps://www.simplilearn.com/top-cyber-security-jobs-india-article
• https://www.safetydetectives.com/blog/ransomware-statistics/
• https://www.rfwireless-world.com/Terminology/Advantages-and-
Disadvantages-of-Ethical-Hacking.html
• https://purplesec.us/protect-business-cyber-attacks/
• https://www.news18.com/news/tech/1852-cyber-attacks-hit-india-each-
minute-last-year-mumbai-delhi-most-affected-2295963.html
• https://www.youtube.com/
THANK YOU

Mais conteúdo relacionado

Mais procurados

Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
 
What is Hacking? AND Types of Hackers
What is Hacking? AND Types of HackersWhat is Hacking? AND Types of Hackers
What is Hacking? AND Types of Hackersinfosavvy
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking PresentationAmbikaMalgatti
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingNeel Kamal
 
Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking PresentationAmanUllah115928
 
Web application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresWeb application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresAung Thu Rha Hein
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.Coder Tech
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing TechniquesRaza_Abidi
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentationMahmoud Ibra
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolschrizjohn896
 

Mais procurados (20)

Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
What is Hacking? AND Types of Hackers
What is Hacking? AND Types of HackersWhat is Hacking? AND Types of Hackers
What is Hacking? AND Types of Hackers
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Social engineering
Social engineering Social engineering
Social engineering
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking Presentation
 
cyber crime
cyber crimecyber crime
cyber crime
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Web application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresWeb application security: Threats & Countermeasures
Web application security: Threats & Countermeasures
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
 
Cybercrime ppt competition
Cybercrime ppt competitionCybercrime ppt competition
Cybercrime ppt competition
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 

Semelhante a Ethical hacking & cyber security

Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineeringSweta Kumari Barnwal
 
Introduction of ethical hacking.........
Introduction of ethical hacking.........Introduction of ethical hacking.........
Introduction of ethical hacking.........AalyanAbid
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptSHAHID ANSARI
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptSHAHID ANSARI
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Securitypenetration Tester
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxNargis Parveen
 
What is Ethical Hacking?.pptx
What is Ethical Hacking?.pptxWhat is Ethical Hacking?.pptx
What is Ethical Hacking?.pptxStrongboxAcademy
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical HackingMasih Karimi
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxprosunghosh7
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Umesh Mahawar
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxJanani S
 

Semelhante a Ethical hacking & cyber security (20)

Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Introduction of ethical hacking.........
Introduction of ethical hacking.........Introduction of ethical hacking.........
Introduction of ethical hacking.........
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
Intro
IntroIntro
Intro
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Hacking
HackingHacking
Hacking
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
What is Ethical Hacking?.pptx
What is Ethical Hacking?.pptxWhat is Ethical Hacking?.pptx
What is Ethical Hacking?.pptx
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical Hacking
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptx
 

Último

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 

Último (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 

Ethical hacking & cyber security

  • 1.
  • 2. Group 5 - Ethical Hacking & Cyber Security Team Members – Ankit Gandharkar Karishma Maurya Tejinder Singh Sidhu Shweta Shinde Supriya Chaurasia
  • 3. Agenda • What is cyber attack? • What is cyber security? • Why cyber security? • Fundamental goals of cyber security • What are cyber threats? • Who is hacker & it’s types? • What is ethical hacking? • Roles and responsibilities of ethical hacker • Skills of ethical hacker • Phases of Ethical hacking • Tips to avoid getting hacked • Careers in ethical hacking & cyber security
  • 4. What is Cyber Attack? • A cyber attack is any type of offensive maneuver that targets computer information systems, infrastructures, computer networks, or personal computer devices. Usually, the attacker seeks some type of benefit from disrupting the victim’s network. • An attacker is a person or process that attempts to access data, functions or other restricted areas of the system without authorization, potentially with malicious intent. • Malware, Phishing, Man-in-the- middle attack, Denial-of-service attack, SQL injection etc. are the common types of cyber attack.
  • 5.
  • 6. What is Cyber Security? • Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. • It's also known as information technology security or electronic information security. • The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories. Such as Network security, Application security, Information security & Operational security.
  • 7. Why Cyber Security? To build a computer system that prevents hackers’ access and safeguard system and information from malicious attack. To manage adequate preventive measures in order to avoid security breaches. To safeguard user or customer information available in business transactions and visits. To test networks at regular intervals. To create security awareness at all levels in a business. 0 100 200 300 400 500 600 700 800 900 2010 2011 2012 2013 2014 2015 2016 2016 2017 2018 Total Malware Infection Growth Rate
  • 8. Fundamental Goals of Cyber Security Confidentiality Integrity Availability
  • 9. Cyber Threats Malware Virus, Trojans, Spyware, Ransomware, Adware, & Botnets SQL Injection Phishing DDoS Romance Scams Man in the middle Dridex Malware Emotet Malware
  • 10. Who is Hacker? “Hacker" is someone who explores methods for breaching defenses & exploiting weaknesses in a computer system or network. Hacking is the act of finding possible entry points which exist in a computer system or network and entering into one of these. Hacking is usually carried out to gain unauthorized access to a computer system or network for negative purposes such as to harm or steal the sensitive information from the computer.
  • 11. Types of Hackers Black Hat Hackers Black Hat hackers, also known as crackers, are those who hack in order to gain unauthorized access to a system and harm its operations or steal sensitive information. Black Hat hacking is always illegal because of its bad intent which includes stealing corporate data, violating privacy, damaging the system, blocking network communication, etc. White Hat Hackers White Hat hackers are also known as Ethical Hackers. They never intent to harm a system, rather they try to find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments. Ethical hacking is not illegal and it is one of the demanding jobs available in the IT industry. Grey Hat Hackers Grey hat hackers are a blend of both black hat and white hat hackers. They act without malicious intent but for their fun, they exploit a security weakness in a computer system or network without the owner’s permission or knowledge. Their intent is to bring the weakness to the attention of the owners and getting appreciation.
  • 12. What is Ethical Hacking? • Ethical Hacking is an authorized practice of bypassing system security to identify potential data breaches and threats in a network. This information is then used by the organization to improve the system security, to minimize or eliminate any potential attacks. • The company that owns the system or network allows Cyber Security experts to perform such activities in order to test the system’s defenses. Thus, unlike malicious hacking, this process is planned, approved, and more importantly, legal. • Ethical hackers duplicate the techniques and methods followed by malicious hackers in order to find out the system discrepancies, replicating all the latter’s steps to find out how a system attack occurred or may occur.
  • 13.
  • 14.
  • 15. 1 2 3 4 5 6 RECONNAISSANCE CLEARING TRACKSGAINING ACCESS PHASES OF ETHICAL HACKING
  • 16. Tips to avoid getting hacked Don’t open a file from an unknown sender Don’t use same password everywhere Use anti-virus software Try not login to your accounts on public networks Don’t visit fishy websites Don’t keep a copy of plain text login Update, Update, Update
  • 17. Ethical Hacking & Cyber Security Careers • Network Security Engineer • Cyber Security Analyst • Security Architect • Cyber Security Manager • Chief Information Security Officer (CISO) • Certified Ethical Hacker (CEH)
  • 18. References • https://www.kaspersky.co.in/resource-center/definitions/what-is-cyber- security • https://www.simplilearn.com/what-is-ethical-hacking- articletps://www.simplilearn.com/top-cyber-security-jobs-india-article • https://www.safetydetectives.com/blog/ransomware-statistics/ • https://www.rfwireless-world.com/Terminology/Advantages-and- Disadvantages-of-Ethical-Hacking.html • https://purplesec.us/protect-business-cyber-attacks/ • https://www.news18.com/news/tech/1852-cyber-attacks-hit-india-each- minute-last-year-mumbai-delhi-most-affected-2295963.html • https://www.youtube.com/