SlideShare a Scribd company logo
Master Ethical System Hacking
By Mohsin Baig
Introduction to Ethical Hacking
Introduction to Ethical Hacking
Learn How To Protect Enterprise Data, Applications
and Networks From Hackers
Develop Cyber Defense
Capabilities
Module 1 : Introduction to Ethical Hacking
1.0
Introduction to
Security Fundamentals
• Modern businesses face many challenges from the
threat of sophisticated cyber criminals to
persistently advanced level threats
• Confidentiality, Integrity and Availability form the
basic building blocks of effective security
measures.
• Scope of confidentiality encompasses secrecy and
privacy of information.
• Physical example of confidentiality: Armed
Guards, Locked doors etc
• Logical example of confidentiality: Protection of
Data in storage and transit
1.1 Security
Fundamentals
• Scope of Integrity encompasses correctness of
information
• Correctness project’s confidence that the data
hasn’t been tampered with or modified to suit
certain interests
• Integrity of data is projected by two modes:
storage and transit
• Access and audit controls can protect information
in storage controls
• Cryptography usage of algorithms can also protect
information in storage
1.2 Risk, Asset, Threats
and Vulnerabilities
• Security professionals must have comprehensive
understanding about the relationship between
Risk, Threats, Assets and Vulnerabilities
• Risk can be defined as a measure which highlights
the probability of an unwanted event or threat to
materialise
• Elements of risks encompass: assets, threats and
vulnerabilities
• Asset can be defined as a item which has
economic value and ownership is upheld by an
individual or enterprise
• Assets can be categorised into the following types:
routers, servers, hard drives, laptops etc or virtual
such as databases, trade secrets etc
1.3 Backup Data Risk
• Ethical attackers must also have knowledge in
how to protect data
• Data can be protected through backup
• Backing up data is typically influenced by the
following types of factors within the
organisation:
1. What will be the Frequency of
backups?
2. How much volume of data is to be
backed up?
3. What will be the Storage method and
transmission method ?
4. How much time is available to perform
backup every day
1.4
Definition of an Exploit
Exploit can be coherently defined as a
tool, software, techniques or process
which capitalises on a vulnerability that
enables access, loss of integrity or denial
of service on a computer system.
Software by large all have vulnerabilities
to some extent and most hackers are
aware about the potential vulnerabilities.
Many organisations address the
vulnerabilities and patches some
however are not capable of fixing them
due to lack of funding.
1.5 Risk Assessment
• Process of identifying all the possible security risks, hazards and perform evaluation in order to
measure the potential impact if the hazard and risks materialised.
• Risk Assessment can be pursued either as Qualitative or Quantitative
• Scope of Qualitative risk assessment methods comprise of establishing scenarios to prioritise and
identify list of all critical concerns based on scalability. ie “high”, “medium”, “low” risks
• Scope of Quantitative risk assessment allocates the financial impact to the asset if the risk or
hazard materialises or isn’t managed effectively.
1.6 Quantitative Risk
Assessment Process
QRA utilises the following steps when assigning the monetary value to the asset:
Step 1:
Investigate the single loss expectancy (SLE)
Step 2:
Calculate the annual rate of occurrence (ARO)
Step 3:
Calculate the annual loss expectancy (ALE)
(ALE = SLE x ARO)
1.7 Security Testing
• Core responsibility performed by ethical
hackers
• Tests are established in a unique process to
ensure ethical hackers have no means of
having any knowledge or partial knowledge
with regards to the IT product or system which
is the subject of an target of evaluation (TOE)
• Core intent of the ethical hacker to
comprehensively test the TOE with
encompassing it security controls and identify
all levels of vulnerabilities within the TOE.

More Related Content

PPTX
Step by-step for risk analysis and management-yaser aljohani
PPT
Lesson 1- Risk Managment
PPTX
Health information secuirty session 5 best practise in information security
PPTX
Health information security session 4 risk management
PPT
Lesson 3- Effectiveness of IDPS
PPTX
Risk Management Approach to Cyber Security
PPT
Lesson 2- Information Asset Valuation
Step by-step for risk analysis and management-yaser aljohani
Lesson 1- Risk Managment
Health information secuirty session 5 best practise in information security
Health information security session 4 risk management
Lesson 3- Effectiveness of IDPS
Risk Management Approach to Cyber Security
Lesson 2- Information Asset Valuation

What's hot (19)

PPSX
Cyber Security Awareness Month 2017- Nugget2
PPTX
Security-Invest Where it Matters Most
PDF
Top 6 Sources for Identifying Threat Actor TTPs
PPT
Introduction to information security
PPT
Ethical hacking a licence to hack
PPTX
Mitigating Risk from Cyber Security Attacks
PPT
Securitymetrics
PDF
Cervone uof t - nist framework (1)
PDF
Threat Intelligence by the Numbers
PPTX
Cyber Security # Lec 3
PPT
Lesson 3- Fair Approach
PPTX
Computer security concepts
PPTX
Cyber Security # Lec 2
PPTX
Developing an Information Security Roadmap
PPTX
Fundamentals of threats and risk management course, cybersecurity
Cyber Security Awareness Month 2017- Nugget2
Security-Invest Where it Matters Most
Top 6 Sources for Identifying Threat Actor TTPs
Introduction to information security
Ethical hacking a licence to hack
Mitigating Risk from Cyber Security Attacks
Securitymetrics
Cervone uof t - nist framework (1)
Threat Intelligence by the Numbers
Cyber Security # Lec 3
Lesson 3- Fair Approach
Computer security concepts
Cyber Security # Lec 2
Developing an Information Security Roadmap
Fundamentals of threats and risk management course, cybersecurity

Similar to Introduction to Ethical Hacking (20)

PPTX
Ethical Hacking and Network Defence 1.pptx
PPTX
MIS: Information Security Management
PPTX
PPTX
PPTX
IT Security & Risk
PDF
Module 3-cyber security
PPTX
UNIT I PPT.pptxsdVDSVDAVDSBGVGNhfzgnnzgdngfh
PPTX
Administering security
PDF
Ethical hacking and social engineering
PPT
College Presentation
PPTX
Gainful Information Security 2012 services
PPTX
Information Security Lecture One for Basic
PPTX
Understanding the security_organization
PPTX
Iso27001 Risk Assessment Approach
PDF
Information Security
PPTX
Security protection On banking systems using ethical hacking.
PPT
Lecture1 intro to cs
PPTX
501 ch 8 risk managment tool
PPT
1. security management practices
PPTX
Information security FundameFundamentals.pptx
Ethical Hacking and Network Defence 1.pptx
MIS: Information Security Management
IT Security & Risk
Module 3-cyber security
UNIT I PPT.pptxsdVDSVDAVDSBGVGNhfzgnnzgdngfh
Administering security
Ethical hacking and social engineering
College Presentation
Gainful Information Security 2012 services
Information Security Lecture One for Basic
Understanding the security_organization
Iso27001 Risk Assessment Approach
Information Security
Security protection On banking systems using ethical hacking.
Lecture1 intro to cs
501 ch 8 risk managment tool
1. security management practices
Information security FundameFundamentals.pptx

Recently uploaded (20)

DOC
field study for teachers graduating samplr
PPTX
_Dispute Resolution_July 2022.pptxmhhghhhh
PPTX
Your Guide to a Winning Interview Aug 2025.
PPTX
Principles of Inheritance and variation class 12.pptx
PPTX
1751884730-Visual Basic -Unitj CS B.pptx
PPT
APPROACH TO DEVELOPMENTALlllllllllllllllll
PDF
MCQ Practice CBT OL Official Language 1.pptx.pdf
PDF
Understanding the Rhetorical Situation Presentation in Blue Orange Muted Il_2...
PPTX
Definition and Relation of Food Science( Lecture1).pptx
PPTX
DPT-MAY24.pptx for review and ucploading
PPTX
Sports and Dance -lesson 3 powerpoint presentation
PPTX
Overview Planner of Soft Skills in a single ppt
PPTX
Surgical thesis protocol formation ppt.pptx
PPT
Gsisgdkddkvdgjsjdvdbdbdbdghjkhgcvvkkfcxxfg
PDF
Why Today’s Brands Need ORM & SEO Specialists More Than Ever.pdf
PPTX
AREAS OF SPECIALIZATION AND CAREER OPPORTUNITIES FOR COMMUNICATORS AND JOURNA...
DOCX
mcsp232projectguidelinesjan2023 (1).docx
PDF
esg-supply-chain-webinar-nov2018hkhkkh.pdf
PPTX
Slideham presentation for the students a
PDF
313302 DBMS UNIT 1 PPT for diploma Computer Eng Unit 2
field study for teachers graduating samplr
_Dispute Resolution_July 2022.pptxmhhghhhh
Your Guide to a Winning Interview Aug 2025.
Principles of Inheritance and variation class 12.pptx
1751884730-Visual Basic -Unitj CS B.pptx
APPROACH TO DEVELOPMENTALlllllllllllllllll
MCQ Practice CBT OL Official Language 1.pptx.pdf
Understanding the Rhetorical Situation Presentation in Blue Orange Muted Il_2...
Definition and Relation of Food Science( Lecture1).pptx
DPT-MAY24.pptx for review and ucploading
Sports and Dance -lesson 3 powerpoint presentation
Overview Planner of Soft Skills in a single ppt
Surgical thesis protocol formation ppt.pptx
Gsisgdkddkvdgjsjdvdbdbdbdghjkhgcvvkkfcxxfg
Why Today’s Brands Need ORM & SEO Specialists More Than Ever.pdf
AREAS OF SPECIALIZATION AND CAREER OPPORTUNITIES FOR COMMUNICATORS AND JOURNA...
mcsp232projectguidelinesjan2023 (1).docx
esg-supply-chain-webinar-nov2018hkhkkh.pdf
Slideham presentation for the students a
313302 DBMS UNIT 1 PPT for diploma Computer Eng Unit 2

Introduction to Ethical Hacking

  • 1. Master Ethical System Hacking By Mohsin Baig
  • 4. Learn How To Protect Enterprise Data, Applications and Networks From Hackers
  • 6. Module 1 : Introduction to Ethical Hacking
  • 7. 1.0 Introduction to Security Fundamentals • Modern businesses face many challenges from the threat of sophisticated cyber criminals to persistently advanced level threats • Confidentiality, Integrity and Availability form the basic building blocks of effective security measures. • Scope of confidentiality encompasses secrecy and privacy of information. • Physical example of confidentiality: Armed Guards, Locked doors etc • Logical example of confidentiality: Protection of Data in storage and transit
  • 8. 1.1 Security Fundamentals • Scope of Integrity encompasses correctness of information • Correctness project’s confidence that the data hasn’t been tampered with or modified to suit certain interests • Integrity of data is projected by two modes: storage and transit • Access and audit controls can protect information in storage controls • Cryptography usage of algorithms can also protect information in storage
  • 9. 1.2 Risk, Asset, Threats and Vulnerabilities • Security professionals must have comprehensive understanding about the relationship between Risk, Threats, Assets and Vulnerabilities • Risk can be defined as a measure which highlights the probability of an unwanted event or threat to materialise • Elements of risks encompass: assets, threats and vulnerabilities • Asset can be defined as a item which has economic value and ownership is upheld by an individual or enterprise • Assets can be categorised into the following types: routers, servers, hard drives, laptops etc or virtual such as databases, trade secrets etc
  • 10. 1.3 Backup Data Risk • Ethical attackers must also have knowledge in how to protect data • Data can be protected through backup • Backing up data is typically influenced by the following types of factors within the organisation: 1. What will be the Frequency of backups? 2. How much volume of data is to be backed up? 3. What will be the Storage method and transmission method ? 4. How much time is available to perform backup every day
  • 11. 1.4 Definition of an Exploit Exploit can be coherently defined as a tool, software, techniques or process which capitalises on a vulnerability that enables access, loss of integrity or denial of service on a computer system. Software by large all have vulnerabilities to some extent and most hackers are aware about the potential vulnerabilities. Many organisations address the vulnerabilities and patches some however are not capable of fixing them due to lack of funding.
  • 12. 1.5 Risk Assessment • Process of identifying all the possible security risks, hazards and perform evaluation in order to measure the potential impact if the hazard and risks materialised. • Risk Assessment can be pursued either as Qualitative or Quantitative • Scope of Qualitative risk assessment methods comprise of establishing scenarios to prioritise and identify list of all critical concerns based on scalability. ie “high”, “medium”, “low” risks • Scope of Quantitative risk assessment allocates the financial impact to the asset if the risk or hazard materialises or isn’t managed effectively.
  • 13. 1.6 Quantitative Risk Assessment Process QRA utilises the following steps when assigning the monetary value to the asset: Step 1: Investigate the single loss expectancy (SLE) Step 2: Calculate the annual rate of occurrence (ARO) Step 3: Calculate the annual loss expectancy (ALE) (ALE = SLE x ARO)
  • 14. 1.7 Security Testing • Core responsibility performed by ethical hackers • Tests are established in a unique process to ensure ethical hackers have no means of having any knowledge or partial knowledge with regards to the IT product or system which is the subject of an target of evaluation (TOE) • Core intent of the ethical hacker to comprehensively test the TOE with encompassing it security controls and identify all levels of vulnerabilities within the TOE.