+ All Categories
Home > Internet > Cyber Crime and Ethical Hacking

Cyber Crime and Ethical Hacking

Date post: 07-Apr-2017
Category:
Upload: ankit-kumar
View: 528 times
Download: 0 times
Share this document with a friend
19
POWERPOINT PRESENTATION
Transcript
Page 1: Cyber Crime and Ethical Hacking

POWERPOINT PRESENTATION

Page 2: Cyber Crime and Ethical Hacking

TOPIC: CYBER CRIME AND ETHICAL HACKING

Presented By:oANKIT KUMARo ([email protected])o (www.facebook.com/Ankitkumar108)

Page 3: Cyber Crime and Ethical Hacking

Content Overview: Definitions (Cyber Crime & Ethical Hacking) Cyber Crime (History & Category) Facts related to Cyber Crime Some Alarming Facts of Cyber Crime Cyber Crime in form of Hacking Process involved in Hacking Type of Hackers Some of world’s most famous Hackers Ethical Hacking Ethical Hacking process Advantage and Disadvantage What to do if a Computer is Hacked Security Tips Our Conclusion and Suggestion

Page 4: Cyber Crime and Ethical Hacking

Definitions: CYBER CRIME:

Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs. Cybercrime is nothing but where the computer used as an object or subject of crime.

ETHICAL HACKING

A type of hacking in which hacker systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities  that a malicious hacker could potentially exploit.

Page 5: Cyber Crime and Ethical Hacking

Cyber Crime:History: The first recorded

cyber crime took place in the year 1820.

The first spam email took place in 1978 when it was sent over the Arpanet.

The first Virus was installed on an Apple Computer in 1982.

Category: HACKING CHILD PORNOGRAPHY DENIAL OF SERVICE

ATTACK VIRUS DISSEMINITION COMPUTER VANDALISM CYBER TERRORISM SOFTWARE PIRACY

Page 6: Cyber Crime and Ethical Hacking

Facts related to Cyber Crime: Types of Cyber attacks (By %age):

Financial fraud: 11%

Sabotage of data/networks: 17%

Theft of proprietary information: 20%

System penetration from the outside: 25%

Denial of service: 27%

Unauthorized access by insiders: 71%

Employee abuse of internet privileges: 79%

Viruses: 85%

A Report of ASSOCHAM:

Page 7: Cyber Crime and Ethical Hacking

These Facts Are Alarming !!!

Page 8: Cyber Crime and Ethical Hacking

Cyber Crimes in form of HACKING:Hacking:

The Process of attempting to gain or successfully gaining, unauthorized access to computer resources is called Hacking.

.

Hacking Growth Rate:

Page 9: Cyber Crime and Ethical Hacking

Processes involved in Hacking:

Page 10: Cyber Crime and Ethical Hacking

Type of Hackers: Black Hat:Violates computer security for little reason beyond maliciousness or for personal gain. White Hat:Breaks security for non-malicious reasons. Grey Hat:Hacker lies between a black hat and a white hat hacker.

BLACK HAT

HACKERS

WHITE HAT

HACKERS

GREY HAT

HACKERS

Page 11: Cyber Crime and Ethical Hacking

Some of world’s most famous Hackers: EDWARD SNOWDEN:

( Hacked and leaked classified information from the U.S. National Security Agency in 2013. Most Wanted Criminal declared by FBI.)

ANKIT FADIA: (A well known Ethic

Hacker. Wrote his first book on hacking at age of 14.Till now he has written more than 21 books.)

JONATHAN JAMES: (Also known as C0mrade on

the Internet.  At age of 15, he hacked a number of networks, including those belonging to Bell South, Miami-Dade, U.S. Defense, and NASA. Committed suicide in 2008.)

JULIAN ASSANGE: (Founder and CEO of

WikiLeaks, An organisation of hackers known for their hacking techniques to steel classified datas of govt. officials.)

KEVIN MITNICK: (U.S. Department of Justice

called him the “most wanted computer criminal in U.S. history.” His story is so wild that it was the basis for two featured films.)

ALBERT GONZALEZ: (He paved his way to

Internet fame when he collected over 170 million credit card and ATM card numbers over a period of 2 years. Yep. That’s equal to a little over half the population of the United States.)

Page 12: Cyber Crime and Ethical Hacking

Ethical Hacking:Working Principle:

“TO CATCH A THIEF ,

THINK LIKE A THIEF…….”

Programmer v/s Hacker:

Page 13: Cyber Crime and Ethical Hacking

Ethical Hacking Process:

Executing PlansEvaluating ResultsFormulating Plans

Page 14: Cyber Crime and Ethical Hacking

Advantage & Disadvantage:

Advantages: Prevents website defacements. An evolving technique, advancing day

by day. Helps in finding and removing loopholes

in cyber security. Can be used to recover lost information

where the computer password has been lost.

Teaches you that no technology is 100% secure.

To test how good security is on your own network.

They call it white hat computer hacking.

Disadvantages: All depends upon the

trustworthiness of the ethical hacker.

Hiring professionals is expensive.

He / She may betray you.

Criminals can use it to their advantage.

It can harm someone's privacy

It's Illegal

Page 15: Cyber Crime and Ethical Hacking

What to do if a Computer is Hacked ??? Shutdown or turn off the Computer . Separate the System from the Network. Restore the System with Backup, or Re-

install all the programs. Restart the System, connect it with Network

and again Restart it. Now Computer is Ready to use.

Page 16: Cyber Crime and Ethical Hacking

Security Tips: Use antivirus software’s. Insert firewalls. Uninstall unnecessary software. Maintain backup. Check security settings and TURN ON Updates. Stay anonymous - choose a genderless screen name. Never give your full name or address to strangers. Learn ‘Etiquette' - follow it and expect it from others. Don't respond to harassing or negative messages (flames). Get out of uncomfortable or hostile situations quickly. Save offending messages. Learn more about Internet privacy.

Page 17: Cyber Crime and Ethical Hacking

Our Conclusion and Suggestion: Remember, a Computer is 100% safe only when it is Turned Off.

The Technology is getting advanced day by day.

If you are a System administrator, you should have at least basic knowledge about Tricks and Techniques related to Computer and Cyber security.

Keep yourself updated from all Cyber related news.

Technology is like a fish. The longer it stays on the shelf, the less desirable it becomes.

Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe : (ALLAN WATTS).

Page 18: Cyber Crime and Ethical Hacking

Any Questions ????

Page 19: Cyber Crime and Ethical Hacking

THANK YOU !!!!!


Recommended