Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Ethical Hacking

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 26

Ethical Hacking

Contents
Definition
Why Ethical Hacking?
Evolution of Ethical Hacking
News Related to Cyber Crime and Ethical Hacking
Types of Hacking Attacks
Prevention of Hacking Attacks
Advantages and Disadvantages of Ethical Hacking
Uses and Needs of Ethical Hacking

More than 700 Government Websites


Hacked since 2012

Central Bureau of Investigation


(CBI) Website

Andhra Pradesh Govt. Website

India Rank 5Th Among Cyber Crime


Affected Countries
Cyber Frauds in India
(#, 2011-May 2014)
71,780

13,301
2011

Websites Hacked in India


(#, 2011-2013)
48,175
62,189

22,060

2012

Source: Home Ministry Statistics

27,605

28,481

2012

2013

21,699
2013

2014 (till May)

2011

2014 (till May)

Source: Home Ministry Statistics

Number of Cyber Crimes in India may touch 3,00,000 in 2015, almost


double the level of last year - ASSOCHAM-Mahindra SSG study

Ethical Hacking

Definition

Hacking performed by a company or individual to help


identify potential threats on a computer or network
An ethical hacker attempts to bypass way past the system
security and search for any weak points that could be
exploited by malicious hackers.
This information is then used by the organization to
improve the system security, in an effort to minimize or
eliminate, any potential attacks.

Why Ethical Hacking?


With the growth of internet, computer security has become a major concern
for businesses and governments
Best way to evaluate the intruder threat would to have computer security
professionals attempt to break into the computer systems

Evolution of Ethical Hacking

Ethical hacking is said to originate in ancient India, in the form of strategy


game known as chaturanga, an early version of chess.

That evolved into actual chess, thenmilitary "tigerteams," and


eventually, when technology advanced enough, into the operating system
and applicationrealm.

Of course, for a long time, nobody was calling it ethical hacking - but
that's exactly what it was: Individuals or groups were assessing their own
resiliency to attack. In other words, they were hacking themselvesfor their
own good.

10

11

12

News Related to Cyber Crime and Ethical Hacking


FBI has been hiring ethical hackers to protect
against acts of cyber vandalism such as a
group of hackers taking down Sony's
Playstation Network and Microsoft's Xbox
Live.
Even though the FBI is seeking people with a
specific background in cyber security,new
Cyber
Cellstill
which
main
department
thattests
comes under EOW is attached with
hireswill
haveisto
undergo
the fitness
national
and of
state
security
agencies to solve several Cyber Crime cases.
and training
a typical
agent
When the AIADMK website was hacked last year, EOW took expert help from a
white hat hacker to narrow down the culprit

13

Types of Hacking Attacks


Trojan programs
Spoofing
Spyware
Denial of Service Attacks
Wormhole Attack
Phishing

14

Trojan Programs
Conceals itself with an
unsuspected program
Unknowingly executed
Read, delete , move and
execute any file
Hacker steals user information
when user comes online

15

Denial of Service Attack


Large no. of packets sent
through packet generator
software
Makes service unavailable
by consuming resources
Ping of Death
SYN flood attack

16

Phishing
Fake emails asking to fill personal
information on counterfeit links
Manipulating URL and redirecting
to phishers website

17

Prevention of Hacking Attacks


Patches and upgrades (hardening)
Disabling unnecessary software
Firewalls and Intrusion Detection Systems
Honeypots
Recognizing and reacting to port scanning

18

Advantages
It can help a country fight against national security
breaches and terrorism.
White hat hackers can also demonstrate the techniques
used by unethical invaders and help prepare organizations
for black hat hacker attacks.
It can help organizations identify vulnerable areas in their
information system.
It can benefit organizations by creating a computer
system that prevents malicious hackers from gaining
access to the system.
19

Disadvantages
The ethical hacker can use the knowledge they have
gained and engage in malicious hacking activities.
There is a possibility that the ethical hacker will send
and/or place malicious code, viruses, malware and other
destructive and harmful things on a computer system.
The ethical hacker can himself engage in massive security
breach.

20

Uses and Needs of Ethical Hacking


Ethical hackers are on the rise because of advancement
in technology. A lot of organizations have been a victim of
cyber attacks which increases the need to safeguard their
networks which can be done by professional ethical
hackers.
Complex Enterprise Networks Require Security Expertise
Ethical Hacking Services Provide Objective Analysis and
Validation
Ethical hacking services provide customers with
objective, real-world assessments of their security
architectures
The following are the services of ethical hackers:

21

Ethical Hackings Role in an Enterprise Security


Architecture

22

Ethical Hacking In Business


Companies now create an online presence which
increases their need for ethical hacking
Ethical hacking is required to safeguard sensitive
information about customers in business
transactions
Helps improve security of systems in organization
Companies are moving towards cloud computing
which raises concern for security. They want to take
advantage of virtualization without compromising on
security
To test network at regular intervals and create a
sense of awareness about security at all levels in
business
23

Ethical Hacking used in Crime Investigation


Several ethical hackers are college drop outs or highly
qualified computer professionals with an urge to crack
down on criminals
This hacker works mostly at night; has the latest and
updated devices and is invisible to any regular web-user
They help security agencies solve cyber crime-related
cases
Criminal gangs that work out of foreign nations are well
connected in the dark web which is accessible by the
ethical hackers
The police cracks crimes on social networking sites like
facebook, email related frauds, etc. But ethical hackers
handle crimes happening using dark web.
They have immense knowledge about the Onion Router
and with sophisticated expensive equipments, they help

24

Contd.
An ethical hacker once helped a multinational bank crack
down a hacker who gained access to their server to steal
data. The white hat hacker and his group took the issue
to the international war room for internet which had
experts from all over the world. This helped them track
the identity of the hacker immediately and stopped the
crime.
A white hat hacker also help find the culprit who hacked
AIADMK website last year.

25

Thank You!

You might also like