SlideShare a Scribd company logo
3
Most read
4
Most read
11
Most read
Ethical hacking & cyber security
Group 5 - Ethical Hacking & Cyber Security
Team Members –
Ankit
Gandharkar
Karishma
Maurya
Tejinder Singh
Sidhu
Shweta Shinde Supriya Chaurasia
Agenda
• What is cyber attack?
• What is cyber security?
• Why cyber security?
• Fundamental goals of cyber security
• What are cyber threats?
• Who is hacker & it’s types?
• What is ethical hacking?
• Roles and responsibilities of ethical hacker
• Skills of ethical hacker
• Phases of Ethical hacking
• Tips to avoid getting hacked
• Careers in ethical hacking & cyber security
What is Cyber Attack?
• A cyber attack is any type of offensive
maneuver that targets computer
information systems, infrastructures,
computer networks, or personal
computer devices. Usually, the
attacker seeks some type of benefit
from disrupting the victim’s network.
• An attacker is a person or process that
attempts to access data, functions or
other restricted areas of the system
without authorization, potentially
with malicious intent.
• Malware, Phishing, Man-in-the-
middle attack, Denial-of-service
attack, SQL injection etc. are the
common types of cyber attack.
Ethical hacking & cyber security
What is Cyber Security?
• Cyber security is the practice of defending computers, servers, mobile
devices, electronic systems, networks, and data from malicious
attacks.
• It's also known as information technology security or electronic
information security.
• The term applies in a variety of contexts, from business to mobile
computing, and can be divided into a few common categories. Such as
Network security, Application security, Information security &
Operational security.
Why Cyber Security?
To build a computer system that
prevents hackers’ access and
safeguard system and information
from malicious attack.
To manage adequate preventive
measures in order to avoid security
breaches.
To safeguard user or customer
information available in business
transactions and visits.
To test networks at regular
intervals.
To create security awareness at all
levels in a business. 0
100
200
300
400
500
600
700
800
900
2010 2011 2012 2013 2014 2015 2016 2016 2017 2018
Total Malware Infection Growth Rate
Fundamental Goals of Cyber Security
Confidentiality
Integrity Availability
Cyber Threats
Malware
Virus, Trojans, Spyware,
Ransomware, Adware, &
Botnets
SQL
Injection
Phishing DDoS
Romance
Scams
Man in
the
middle
Dridex
Malware
Emotet
Malware
Who is Hacker?
“Hacker" is someone who explores
methods for breaching defenses &
exploiting weaknesses in a
computer system or network.
Hacking is the act of finding
possible entry points which exist in
a computer system or network and
entering into one of these. Hacking
is usually carried out to gain
unauthorized access to a computer
system or network for negative
purposes such as to harm or steal
the sensitive information from the
computer.
Types of Hackers
Black Hat Hackers
Black Hat hackers, also known
as crackers, are those who hack
in order to gain unauthorized
access to a system and harm its
operations or steal sensitive
information. Black Hat hacking is
always illegal because of its bad
intent which includes stealing
corporate data, violating privacy,
damaging the system, blocking
network communication, etc.
White Hat Hackers
White Hat hackers are also known
as Ethical Hackers. They never
intent to harm a system, rather
they try to find out weaknesses in
a computer or a network system
as a part of penetration testing
and vulnerability assessments.
Ethical hacking is not illegal and it
is one of the demanding jobs
available in the IT industry.
Grey Hat Hackers
Grey hat hackers are a blend of
both black hat and white hat
hackers. They act without
malicious intent but for their fun,
they exploit a security weakness in
a computer system or network
without the owner’s permission or
knowledge. Their intent is to bring
the weakness to the attention of
the owners and getting
appreciation.
What is Ethical Hacking?
• Ethical Hacking is an authorized practice of bypassing system security to
identify potential data breaches and threats in a network. This information
is then used by the organization to improve the system security, to minimize
or eliminate any potential attacks.
• The company that owns the system or network allows Cyber Security
experts to perform such activities in order to test the system’s defenses.
Thus, unlike malicious hacking, this process is planned, approved, and more
importantly, legal.
• Ethical hackers duplicate the techniques and methods followed by malicious
hackers in order to find out the system discrepancies, replicating all the
latter’s steps to find out how a system attack occurred or may occur.
Ethical hacking & cyber security
Ethical hacking & cyber security
1 2 3 4 5 6
RECONNAISSANCE CLEARING TRACKSGAINING ACCESS
PHASES OF ETHICAL HACKING
Tips to avoid getting hacked
Don’t open a file from an unknown sender
Don’t use same password everywhere
Use anti-virus software
Try not login to your accounts on public networks
Don’t visit fishy websites
Don’t keep a copy of plain text login
Update, Update, Update
Ethical Hacking & Cyber Security Careers
• Network Security Engineer
• Cyber Security Analyst
• Security Architect
• Cyber Security Manager
• Chief Information Security Officer (CISO)
• Certified Ethical Hacker (CEH)
References
• https://www.kaspersky.co.in/resource-center/definitions/what-is-cyber-
security
• https://www.simplilearn.com/what-is-ethical-hacking-
articletps://www.simplilearn.com/top-cyber-security-jobs-india-article
• https://www.safetydetectives.com/blog/ransomware-statistics/
• https://www.rfwireless-world.com/Terminology/Advantages-and-
Disadvantages-of-Ethical-Hacking.html
• https://purplesec.us/protect-business-cyber-attacks/
• https://www.news18.com/news/tech/1852-cyber-attacks-hit-india-each-
minute-last-year-mumbai-delhi-most-affected-2295963.html
• https://www.youtube.com/
THANK YOU

More Related Content

PPTX
Cyber security
PPTX
Cyber-Security & Hacking
PPT
Himachal pradesh
PPTX
Pollution its types, causes and effects by naveed.m
PPTX
Time Management
PDF
AI in research: ChatGPT and more
PPT
Piaget’S Cognitive Development Theory
PPTX
Trends in pharmaceutical industry
Cyber security
Cyber-Security & Hacking
Himachal pradesh
Pollution its types, causes and effects by naveed.m
Time Management
AI in research: ChatGPT and more
Piaget’S Cognitive Development Theory
Trends in pharmaceutical industry

What's hot (20)

PPTX
Cyber security Information security
PPT
Ethical Hacking Powerpoint
PPTX
Cyber Security
PPTX
Cybersecurity
PPTX
Cyber Security Introduction.pptx
PPTX
Ethical hacking presentation
PPT
Ethical hacking
PPTX
Introduction to ethical hacking
PPTX
Types of cyber attacks
PPTX
Cyber Crime
PPTX
Ethical hacking
PPTX
Cyber security system presentation
PDF
Network Security Presentation
PPTX
Cyber security
PPTX
CyberSecurity
PPTX
Cyber security and Hacking
PPTX
Cyber security
PPTX
Cyber security
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PPTX
IoT Security, Threats and Challenges By V.P.Prabhakaran
Cyber security Information security
Ethical Hacking Powerpoint
Cyber Security
Cybersecurity
Cyber Security Introduction.pptx
Ethical hacking presentation
Ethical hacking
Introduction to ethical hacking
Types of cyber attacks
Cyber Crime
Ethical hacking
Cyber security system presentation
Network Security Presentation
Cyber security
CyberSecurity
Cyber security and Hacking
Cyber security
Cyber security
Cybersecurity Attack Vectors: How to Protect Your Organization
IoT Security, Threats and Challenges By V.P.Prabhakaran

Similar to Ethical hacking & cyber security (20)

PDF
Ethical hacking and social engineering
PDF
Module 3-cyber security
PPTX
Introduction of ethical hacking.........
PPTX
Ethical Hacking
PPT
Ethical hacking a licence to hack
PPTX
Ethical Hacking.pptx
PPTX
Cse ethical hacking ppt
PPTX
Cse ethical hacking ppt
PPTX
Hacking.pptx
PPTX
CSSE-Ethical-Hacking-ppt.pptx
PPTX
Cyber security detailed ppt and understand
PPTX
Introduction of Cyber Security
PPTX
Intro
PPSX
Hacking
DOCX
Unit 1 Introduction to Cyber Securiyt Attacks.docx
PPTX
Ethical hacking Chapter 1 - Overview.pptx
PPTX
Ethical Hacking.pptx
PPTX
What is Ethical Hacking?.pptx
PDF
Hacking and Ethical Hacking
PPTX
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
Ethical hacking and social engineering
Module 3-cyber security
Introduction of ethical hacking.........
Ethical Hacking
Ethical hacking a licence to hack
Ethical Hacking.pptx
Cse ethical hacking ppt
Cse ethical hacking ppt
Hacking.pptx
CSSE-Ethical-Hacking-ppt.pptx
Cyber security detailed ppt and understand
Introduction of Cyber Security
Intro
Hacking
Unit 1 Introduction to Cyber Securiyt Attacks.docx
Ethical hacking Chapter 1 - Overview.pptx
Ethical Hacking.pptx
What is Ethical Hacking?.pptx
Hacking and Ethical Hacking
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx

Recently uploaded (20)

PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Introduction-to-Social-Work-by-Leonora-Serafeca-De-Guzman-Group-2.pdf
PDF
Open folder Downloads.pdf yes yes ges yes
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
Basic Mud Logging Guide for educational purpose
PDF
Business Ethics Teaching Materials for college
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Pharma ospi slides which help in ospi learning
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PPTX
COMPUTERS AS DATA ANALYSIS IN PRECLINICAL DEVELOPMENT.pptx
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Open Quiz Monsoon Mind Game Final Set.pptx
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Microbial diseases, their pathogenesis and prophylaxis
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Introduction-to-Social-Work-by-Leonora-Serafeca-De-Guzman-Group-2.pdf
Open folder Downloads.pdf yes yes ges yes
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Basic Mud Logging Guide for educational purpose
Business Ethics Teaching Materials for college
TR - Agricultural Crops Production NC III.pdf
Pharma ospi slides which help in ospi learning
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
COMPUTERS AS DATA ANALYSIS IN PRECLINICAL DEVELOPMENT.pptx
Renaissance Architecture: A Journey from Faith to Humanism
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Insiders guide to clinical Medicine.pdf
Open Quiz Monsoon Mind Game Final Set.pptx
Abdominal Access Techniques with Prof. Dr. R K Mishra
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
FourierSeries-QuestionsWithAnswers(Part-A).pdf

Ethical hacking & cyber security

  • 2. Group 5 - Ethical Hacking & Cyber Security Team Members – Ankit Gandharkar Karishma Maurya Tejinder Singh Sidhu Shweta Shinde Supriya Chaurasia
  • 3. Agenda • What is cyber attack? • What is cyber security? • Why cyber security? • Fundamental goals of cyber security • What are cyber threats? • Who is hacker & it’s types? • What is ethical hacking? • Roles and responsibilities of ethical hacker • Skills of ethical hacker • Phases of Ethical hacking • Tips to avoid getting hacked • Careers in ethical hacking & cyber security
  • 4. What is Cyber Attack? • A cyber attack is any type of offensive maneuver that targets computer information systems, infrastructures, computer networks, or personal computer devices. Usually, the attacker seeks some type of benefit from disrupting the victim’s network. • An attacker is a person or process that attempts to access data, functions or other restricted areas of the system without authorization, potentially with malicious intent. • Malware, Phishing, Man-in-the- middle attack, Denial-of-service attack, SQL injection etc. are the common types of cyber attack.
  • 6. What is Cyber Security? • Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. • It's also known as information technology security or electronic information security. • The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories. Such as Network security, Application security, Information security & Operational security.
  • 7. Why Cyber Security? To build a computer system that prevents hackers’ access and safeguard system and information from malicious attack. To manage adequate preventive measures in order to avoid security breaches. To safeguard user or customer information available in business transactions and visits. To test networks at regular intervals. To create security awareness at all levels in a business. 0 100 200 300 400 500 600 700 800 900 2010 2011 2012 2013 2014 2015 2016 2016 2017 2018 Total Malware Infection Growth Rate
  • 8. Fundamental Goals of Cyber Security Confidentiality Integrity Availability
  • 9. Cyber Threats Malware Virus, Trojans, Spyware, Ransomware, Adware, & Botnets SQL Injection Phishing DDoS Romance Scams Man in the middle Dridex Malware Emotet Malware
  • 10. Who is Hacker? “Hacker" is someone who explores methods for breaching defenses & exploiting weaknesses in a computer system or network. Hacking is the act of finding possible entry points which exist in a computer system or network and entering into one of these. Hacking is usually carried out to gain unauthorized access to a computer system or network for negative purposes such as to harm or steal the sensitive information from the computer.
  • 11. Types of Hackers Black Hat Hackers Black Hat hackers, also known as crackers, are those who hack in order to gain unauthorized access to a system and harm its operations or steal sensitive information. Black Hat hacking is always illegal because of its bad intent which includes stealing corporate data, violating privacy, damaging the system, blocking network communication, etc. White Hat Hackers White Hat hackers are also known as Ethical Hackers. They never intent to harm a system, rather they try to find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments. Ethical hacking is not illegal and it is one of the demanding jobs available in the IT industry. Grey Hat Hackers Grey hat hackers are a blend of both black hat and white hat hackers. They act without malicious intent but for their fun, they exploit a security weakness in a computer system or network without the owner’s permission or knowledge. Their intent is to bring the weakness to the attention of the owners and getting appreciation.
  • 12. What is Ethical Hacking? • Ethical Hacking is an authorized practice of bypassing system security to identify potential data breaches and threats in a network. This information is then used by the organization to improve the system security, to minimize or eliminate any potential attacks. • The company that owns the system or network allows Cyber Security experts to perform such activities in order to test the system’s defenses. Thus, unlike malicious hacking, this process is planned, approved, and more importantly, legal. • Ethical hackers duplicate the techniques and methods followed by malicious hackers in order to find out the system discrepancies, replicating all the latter’s steps to find out how a system attack occurred or may occur.
  • 15. 1 2 3 4 5 6 RECONNAISSANCE CLEARING TRACKSGAINING ACCESS PHASES OF ETHICAL HACKING
  • 16. Tips to avoid getting hacked Don’t open a file from an unknown sender Don’t use same password everywhere Use anti-virus software Try not login to your accounts on public networks Don’t visit fishy websites Don’t keep a copy of plain text login Update, Update, Update
  • 17. Ethical Hacking & Cyber Security Careers • Network Security Engineer • Cyber Security Analyst • Security Architect • Cyber Security Manager • Chief Information Security Officer (CISO) • Certified Ethical Hacker (CEH)
  • 18. References • https://www.kaspersky.co.in/resource-center/definitions/what-is-cyber- security • https://www.simplilearn.com/what-is-ethical-hacking- articletps://www.simplilearn.com/top-cyber-security-jobs-india-article • https://www.safetydetectives.com/blog/ransomware-statistics/ • https://www.rfwireless-world.com/Terminology/Advantages-and- Disadvantages-of-Ethical-Hacking.html • https://purplesec.us/protect-business-cyber-attacks/ • https://www.news18.com/news/tech/1852-cyber-attacks-hit-india-each- minute-last-year-mumbai-delhi-most-affected-2295963.html • https://www.youtube.com/