ݺߣ

ݺߣShare a Scribd company logo
INFORMATION SECURITY & ETHICAL HACKING
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Defense in DepthWireless SecurityAnti-VirusAnti-spywareWired/wireless networkComputerPassword SecuritySoftwareSoftware updatesDataOnline SecurityAccount SecurityPhysical SecurityAnti-SpamBackup
Update Software Use Antivirus Software Use Anti-Spyware Use Strong Passwords Secure Your Accounts Secure Your Physical Environment Keep Wireless Devices Secure Practice Online Safety Send and Receive Secure Messages Back Up Your Data Layered Defense
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
SECURITY AND HACKING TOGETHER“To catch a thief , think like a thief.”The idea is that if as a security professional you don’t know what threats you are facing from crackers/hackers, you will never be able to build an efficient security system.
Information Security & Ethical Hacking
What is Ethical HackingAlso Called –Penetration Testing, White-hat hackingHackingProcess of breaking into systems for:Personal or Commercial Gains
Malicious Intent – Causing sever damage to Information & AssetsEthicalConforming to accepted professional standards of conductBlack-hat – Bad guysWhite-hat - Good Guys
 Ethical Hacking
SocialEngineeringAutomatedAttacksOrganizationalAttacksRestrictedDataAccidental Breaches in SecurityDenial ofService (DoS)Viruses, Trojan Horses, and WormsWhy – Ethical HackingProtection from possible External Attacks
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
System Penetration TestingFootprinting
Information Gathering about system and network
WhoIs Queries, Locate network range
Scanning
Identifying active hosts and its vulnerabilities on a network
Identifying services "well-known" port
Enumeration
Intrusive Probing
User names, passwords, vulnerabilities, etc
Gaining Access (system hacking)
Viruses, Worms, Trojans and Spyware
No Password
Guessable Passwords
Brute-Force Attack
Software Vulnerabilities
Network Sniffing
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking
Information Security & Ethical Hacking

More Related Content

Information Security & Ethical Hacking