SlideShare a Scribd company logo
ETHICAL HACKING A LICENCE TO HACK Gadde Srikanth  A. Ravali Rukmini  Information technology  Computer science B.TECH- II YR VELLORE INSTITUTE OF TECHNOLOGY School of Computer Sciences
INTRODUCTION Ethical hacking- also known as penetration testing or intrusion testing or red teaming has become a major concern for businesses and governments. Companies are worried about the possibility of being “hacked” and potential customers are worried about maintaining control of personal information. Necessity of computer security professionals to break into the systems of the organisation.
Ethical hackers employ the same tools and techniques as the intruders. They neither damage the target systems nor steal information. The tool is not an automated hacker program  rather it is an audit that both identifies the vulnerabilities of a system and provide advice on how to eliminate them. INTRODUCTION
PLANNING THE TEST Aspects that should be focused on: Who should perform penetration testing? How often the tests have to be conducted? What are the methods of measuring and communicating the results? What if something unexpected happens during the test and brings the whole system down? What are the organization's security policies?
The minimum security policies that an organization should posses Information policy Security policy Computer use User management System administration procedures Incident response procedures Configuration management Design methodology Disaster methodology Disaster recovery plans.
Ethical hacking- a dynamic process Running through the penetration test once gives the current set of security issues which subject to change. Penetration testing must be continuous to ensure that system movements and newly installed applications do not introduce new vulnerabilities into the system.
Who are ethical hackers The skills ethical hackers should posses They must be completely trustworthy. Should have very strong programming and computer networking skills and have been in networking field for several years.
Should have more patience. Continuous updating of the knowledge on computer and network security is required. They should know the techniques of the criminals, how their activities might be detected and how to stop them. Who are ethical hackers
Choice of an ethical hacker An independent external agency. black box testing . An expertise with in your own organization. white box testing .
AREAS TO BE TESTED Application servers Firewalls and security devices  Network security  Wireless security
Red Team-Multilayered Assessment Various areas of security are evaluated using a multilayered approach. Each area of security defines how the target will be assessed. An identified vulnerability at one layer may be protected at another layer minimizing the associated risk of the vulnerability.
Information security (INFOSEC)- A revolving process
 
Attacks on Websites:-  Denial of service attack Some hackers hack your websites just because they can. They try to do something spectacular to exhibit their talents. Their comes the denial of service attack. During the attacks, customers were unable to reach the websites, resulting in loss of revenue and “mind share”. On January 17, 2000, a U.S. library of congress website was attacked.
 
 
The ethical hack itself Testing itself poses some risk to the client. Criminal hacker monitoring the transmissions of ethical hacker could trap the information. Best approach is to maintain several addresses around the internet from which ethical hackers originate.  Additional intrusion monitoring software can be deployed at the target.
IBM’S Immune system for Cyber space Any of the following combination may be used Remote network. Remote dial-up network. Local network. Stolen laptop computer. Social engineering. Physical entry.
 
Competitive Intelligence A systematic and ethical program for maintaining external information that can affect your company’s plans. It is legal collection and analysis of information regarding the vulnerabilities of the business partners. The same information used to aid a company can be used to compete with the company. The way to protect the information is to be aware of how it may be used.
Information Security Goals Improve IS awareness. Assess risk. Mitigate risk immediately. Assist in the decision making process. Conduct drills on emergency response procedures.
Conclusions  Never underestimate the attacker or overestimate our existing posture. A company may be target not just for its information but potentially for its various transactions. To protect against an attack, understanding where the systems are vulnerable is necessary. Ethical hacking helps companies first comprehend their risk and then, manage them.
Always security professionals are one step behind the hackers and crackers. Plan for the unplanned attacks. The role of ethical hacking in security is to provide customers with awareness of how they could be attacked and why they are targeted. “ Security though a pain”, is necessary. Conclusions
References 1.www.javvin.com 2.www.computerworld.com 3.www.research.ibm.com/journals 4.www.howstuffworks.com 5.”Information Technology” journal,september,august 2005,published by EFY. 6.IEEE journal on" security and privacy”
Queries?

More Related Content

PPT
Ethicalhackingalicencetohack 120223062548-phpapp01
PPTX
Threat Modelling And Threat Response
PPTX
How to assess and manage cyber risk
PDF
Security Automation and Machine Learning
PPTX
Red Team vs. Blue Team
PPTX
Vulnerability Assessment
PPTX
Cyber Threat Management
PPTX
10 Critical Corporate Cyber Security Risks
Ethicalhackingalicencetohack 120223062548-phpapp01
Threat Modelling And Threat Response
How to assess and manage cyber risk
Security Automation and Machine Learning
Red Team vs. Blue Team
Vulnerability Assessment
Cyber Threat Management
10 Critical Corporate Cyber Security Risks

What's hot (20)

PPTX
Integrated cyber defense
PDF
Insider Threat Detection Recommendations
PPTX
Mitigating Risk from Cyber Security Attacks
PPTX
Your cyber security webinar
PPTX
Enterprise IT Security Audit | Cyber Security Services
PPTX
Vulnerability in ai
PPTX
Information risk management
PDF
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
PDF
Cyber Security vs.pdf
PPT
Employee Security Awareness Program
PPTX
information security (Audit mechanism, intrusion detection, password manageme...
PDF
The Hacking Team Hack: Lessons Learned for Enterprise Security
PDF
Cybersecurity Roadmap Development for Executives
PPTX
Skills that make network security training easy
PPT
HIPAA, Privacy, Security, and Good Business
PDF
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi
PDF
Incident response methodology
PPTX
Insider Threat Summit - The Future of Insider Threat Detection
PDF
Webinar - Reducing Your Cybersecurity Risk
PPTX
Risk Management Approach to Cyber Security
Integrated cyber defense
Insider Threat Detection Recommendations
Mitigating Risk from Cyber Security Attacks
Your cyber security webinar
Enterprise IT Security Audit | Cyber Security Services
Vulnerability in ai
Information risk management
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Cyber Security vs.pdf
Employee Security Awareness Program
information security (Audit mechanism, intrusion detection, password manageme...
The Hacking Team Hack: Lessons Learned for Enterprise Security
Cybersecurity Roadmap Development for Executives
Skills that make network security training easy
HIPAA, Privacy, Security, and Good Business
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi
Incident response methodology
Insider Threat Summit - The Future of Insider Threat Detection
Webinar - Reducing Your Cybersecurity Risk
Risk Management Approach to Cyber Security

Viewers also liked (20)

PPT
Reflective Audio Journaling
PPTX
The Strategy of Journaling
PPTX
Lecture 15 fraud schemes - james a. hall book chapter 3
PPTX
Cyber crime journal by central detective training school
PPT
Linux Vulnerabilities
PPTX
Journaling Across the Curriculum
PPT
10135 a 09
PPTX
Chapter 3 security part i auditing operating systems and networks
PDF
Do journaling filesystems guarantee against corruption after a power failure (1)
PPT
Hacking A Web Site And Secure Web Server Techniques Used
PPT
Ethical_Hacking_ppt
PPT
Journaling And Reflective Practice
PDF
Top Ten Web Hacking Techniques (2008)
PDF
Hacking in shadows By - Raghav Bisht
PDF
Ethical Hacking Certification Path You Should Follow
PPT
Ethical Hacking
PPTX
Ethical hacking
PPTX
Ethical Hacking
PDF
Hacking the Web
Reflective Audio Journaling
The Strategy of Journaling
Lecture 15 fraud schemes - james a. hall book chapter 3
Cyber crime journal by central detective training school
Linux Vulnerabilities
Journaling Across the Curriculum
10135 a 09
Chapter 3 security part i auditing operating systems and networks
Do journaling filesystems guarantee against corruption after a power failure (1)
Hacking A Web Site And Secure Web Server Techniques Used
Ethical_Hacking_ppt
Journaling And Reflective Practice
Top Ten Web Hacking Techniques (2008)
Hacking in shadows By - Raghav Bisht
Ethical Hacking Certification Path You Should Follow
Ethical Hacking
Ethical hacking
Ethical Hacking
Hacking the Web

Similar to Ethical hacking a licence to hack (20)

PPT
Ethical hacking a licence to hack
DOCX
61370436 main-case-study
PPTX
Ethical Hacking and Network Defence 1.pptx
PDF
Ethical Hacking A high-level information security study on protecting a comp...
PPTX
Ethical Hacking
PDF
Module 1 (legality)
DOCX
Ethical Hacking (CEH) - Industrial Training Report
PPTX
Ashar Shaikh A-84 SEMINAR.pptx
PDF
A Beginner’s Guide to Ethical Hacking.pdf
PPT
Ethical hacking presentation
DOCX
Final report ethical hacking
PPTX
seminar ppt.pptx
PDF
BASICS OF ETHICAL HACKING
PPTX
Cyber Security PPT
PPTX
_Unveiling the Power of Ethical Hacking in Cybersecurity.pptx
PPTX
ethical hacking
PPTX
Skills-of-Ethical-Hacking.pptx
PDF
Ethical hacking and social engineering
PPT
Ethical hacking
PPTX
Ethical Hacking
Ethical hacking a licence to hack
61370436 main-case-study
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking A high-level information security study on protecting a comp...
Ethical Hacking
Module 1 (legality)
Ethical Hacking (CEH) - Industrial Training Report
Ashar Shaikh A-84 SEMINAR.pptx
A Beginner’s Guide to Ethical Hacking.pdf
Ethical hacking presentation
Final report ethical hacking
seminar ppt.pptx
BASICS OF ETHICAL HACKING
Cyber Security PPT
_Unveiling the Power of Ethical Hacking in Cybersecurity.pptx
ethical hacking
Skills-of-Ethical-Hacking.pptx
Ethical hacking and social engineering
Ethical hacking
Ethical Hacking

Recently uploaded (20)

PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Electronic commerce courselecture one. Pdf
PDF
Modernizing your data center with Dell and AMD
PPTX
Cloud computing and distributed systems.
PDF
Network Security Unit 5.pdf for BCA BBA.
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Reach Out and Touch Someone: Haptics and Empathic Computing
Understanding_Digital_Forensics_Presentation.pptx
Empathic Computing: Creating Shared Understanding
Dropbox Q2 2025 Financial Results & Investor Presentation
Agricultural_Statistics_at_a_Glance_2022_0.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Electronic commerce courselecture one. Pdf
Modernizing your data center with Dell and AMD
Cloud computing and distributed systems.
Network Security Unit 5.pdf for BCA BBA.
The AUB Centre for AI in Media Proposal.docx
Advanced methodologies resolving dimensionality complications for autism neur...
Big Data Technologies - Introduction.pptx
Review of recent advances in non-invasive hemoglobin estimation
How UI/UX Design Impacts User Retention in Mobile Apps.pdf

Ethical hacking a licence to hack

  • 1. ETHICAL HACKING A LICENCE TO HACK Gadde Srikanth A. Ravali Rukmini Information technology Computer science B.TECH- II YR VELLORE INSTITUTE OF TECHNOLOGY School of Computer Sciences
  • 2. INTRODUCTION Ethical hacking- also known as penetration testing or intrusion testing or red teaming has become a major concern for businesses and governments. Companies are worried about the possibility of being “hacked” and potential customers are worried about maintaining control of personal information. Necessity of computer security professionals to break into the systems of the organisation.
  • 3. Ethical hackers employ the same tools and techniques as the intruders. They neither damage the target systems nor steal information. The tool is not an automated hacker program rather it is an audit that both identifies the vulnerabilities of a system and provide advice on how to eliminate them. INTRODUCTION
  • 4. PLANNING THE TEST Aspects that should be focused on: Who should perform penetration testing? How often the tests have to be conducted? What are the methods of measuring and communicating the results? What if something unexpected happens during the test and brings the whole system down? What are the organization's security policies?
  • 5. The minimum security policies that an organization should posses Information policy Security policy Computer use User management System administration procedures Incident response procedures Configuration management Design methodology Disaster methodology Disaster recovery plans.
  • 6. Ethical hacking- a dynamic process Running through the penetration test once gives the current set of security issues which subject to change. Penetration testing must be continuous to ensure that system movements and newly installed applications do not introduce new vulnerabilities into the system.
  • 7. Who are ethical hackers The skills ethical hackers should posses They must be completely trustworthy. Should have very strong programming and computer networking skills and have been in networking field for several years.
  • 8. Should have more patience. Continuous updating of the knowledge on computer and network security is required. They should know the techniques of the criminals, how their activities might be detected and how to stop them. Who are ethical hackers
  • 9. Choice of an ethical hacker An independent external agency. black box testing . An expertise with in your own organization. white box testing .
  • 10. AREAS TO BE TESTED Application servers Firewalls and security devices Network security Wireless security
  • 11. Red Team-Multilayered Assessment Various areas of security are evaluated using a multilayered approach. Each area of security defines how the target will be assessed. An identified vulnerability at one layer may be protected at another layer minimizing the associated risk of the vulnerability.
  • 12. Information security (INFOSEC)- A revolving process
  • 13.  
  • 14. Attacks on Websites:- Denial of service attack Some hackers hack your websites just because they can. They try to do something spectacular to exhibit their talents. Their comes the denial of service attack. During the attacks, customers were unable to reach the websites, resulting in loss of revenue and “mind share”. On January 17, 2000, a U.S. library of congress website was attacked.
  • 15.  
  • 16.  
  • 17. The ethical hack itself Testing itself poses some risk to the client. Criminal hacker monitoring the transmissions of ethical hacker could trap the information. Best approach is to maintain several addresses around the internet from which ethical hackers originate. Additional intrusion monitoring software can be deployed at the target.
  • 18. IBM’S Immune system for Cyber space Any of the following combination may be used Remote network. Remote dial-up network. Local network. Stolen laptop computer. Social engineering. Physical entry.
  • 19.  
  • 20. Competitive Intelligence A systematic and ethical program for maintaining external information that can affect your company’s plans. It is legal collection and analysis of information regarding the vulnerabilities of the business partners. The same information used to aid a company can be used to compete with the company. The way to protect the information is to be aware of how it may be used.
  • 21. Information Security Goals Improve IS awareness. Assess risk. Mitigate risk immediately. Assist in the decision making process. Conduct drills on emergency response procedures.
  • 22. Conclusions Never underestimate the attacker or overestimate our existing posture. A company may be target not just for its information but potentially for its various transactions. To protect against an attack, understanding where the systems are vulnerable is necessary. Ethical hacking helps companies first comprehend their risk and then, manage them.
  • 23. Always security professionals are one step behind the hackers and crackers. Plan for the unplanned attacks. The role of ethical hacking in security is to provide customers with awareness of how they could be attacked and why they are targeted. “ Security though a pain”, is necessary. Conclusions
  • 24. References 1.www.javvin.com 2.www.computerworld.com 3.www.research.ibm.com/journals 4.www.howstuffworks.com 5.”Information Technology” journal,september,august 2005,published by EFY. 6.IEEE journal on" security and privacy”