The presentation for "Critique the employment of ethical hacking as a way of reviewing and strengthening the security of information systems" prepared by Hansa Edirisinghe. (MSc IT - Cardiff Metropolitan University, UK
)
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Information Security Management - Hansa Edirisinghe
1. MSc CIS7027
Information Security Management
ASSIGNMENT 2012
Critique the employment of ethical hacking as a way
of reviewing and strengthening the security of
information systems
Hansa Edirisinghe
BSc (Hons) University of Portsmouth, UK
MSc IT - Cardiff Metropolitan University, UK
2. Why did I selected this topic ?
• Hacking is a major security threat in IT
• Organizations find solutions to prevent
their system from hackers
• Employment of Ethical Hacker (EH) is
becoming popular to prevent attacks
3. How critical the Hacking is?
(According to hackmageddon.com, hacking attacks in the month of October 2012)
Source : http://hackmageddon.com/2012-cyber-attacks-timeline-master-index/
4. Hackers
White Hat
People who
specialized
hacking
check the
faults of the
system
Grey Hat
Exploit a
security to the
attention of
the owners
Black Hat
People who
break into
networks and
harm to the
network and
property
White Hat is known as Ethical Hacker
5. Strengthening the security through
EH
• Ensuring the protection of company
confidential information (i.e. Finance, Production,
Marketing, R & D )
• Protect the system from malware/hacking
• Analyze risk assessment and control
vulnerable areas
• Ensure that sensitive information of clients
does not go to wrong hands
6. Barriers to EH
• Heavy dependence of employee, because
EH has all the company secret information
• Finding a competent and specialist person
• Frequent employee turnover may cause
problems to the organization
7. “The employment of ethical hacking as a way of
reviewing and strengthening the security of information
systems”
1. Introduction to EH
2. Discussions on,
a) Ensuring the protection of company confidential information
b) Protect the system from malware/hacking
c) Risk assessment and control vulnerable areas
d) Ensuring sensitive information of clients does not go to wrong hands
e) Barriers to EH
3. Evaluation & Recommendation
4. Conclusion
Framework of my Report