Date post: | 07-Apr-2018 |
Category: |
Documents |
Upload: | karan-patel |
View: | 224 times |
Download: | 0 times |
8/4/2019 Hacking and Information Security
http://slidepdf.com/reader/full/hacking-and-information-security 1/29
8/4/2019 Hacking and Information Security
http://slidepdf.com/reader/full/hacking-and-information-security 2/29
8/4/2019 Hacking and Information Security
http://slidepdf.com/reader/full/hacking-and-information-security 3/29
8/4/2019 Hacking and Information Security
http://slidepdf.com/reader/full/hacking-and-information-security 4/29
Who the Hackers really
are????? Hackers are the individual personnel or some
well-organized group of people decides somestrategies for achieving some legitimate orillegitimate goals.
Hackers are highly skilled fellows with goodknowledge on computer systems & real life
specialists on tackling any undesiredsituations.
Slides made by : KARAN PATEL
8/4/2019 Hacking and Information Security
http://slidepdf.com/reader/full/hacking-and-information-security 5/29
Hacktivism
Refers to the idea of Hackingwith or for a cause
Comprises of Hackers with
a social or political agenda Aims at sending a message
through their hacking activityand gaining visibility fortheir cause and themselves.
Common targets includes government agencies,MNCs, or any other entity perceived as bad orwrong by these groups or individuals.
Slides made by : KARAN PATEL
8/4/2019 Hacking and Information Security
http://slidepdf.com/reader/full/hacking-and-information-security 6/29
Levels of Hackers:
Script kiddies : These are the wannabe
hackers, who don’t know anythingabout hacking and background
procedures they just apply codesmade by hackers without priorknowledge of the results.
Intermediate Hackers: These are theHackers who knows everything abouthacking but can’t make codes & tools.
Elite Hackers : These are the highly know ledgedentities who plays with computer machines,human minds & laws.
Slides made by : KARAN PATEL
8/4/2019 Hacking and Information Security
http://slidepdf.com/reader/full/hacking-and-information-security 7/29
Types of Hackers:
Black Hats : Individuals with extraordinarycomputing skills , resorting to malicious ordestructive activities. Also known as crackers
White Hats : Individuals professing hackerskills and using them for defensive purposes.Also known as security analysts.
Gray hats : Individuals who work bothoffensively and defensively at various times.
Suicide hackers : Individuals who aim tobring down critical infrastructure for a “cause”and do not worry about facing 30yrs in jailfor their actions.
Slides made by : KARAN PATEL
8/4/2019 Hacking and Information Security
http://slidepdf.com/reader/full/hacking-and-information-security 8/29
What does a Malicious Hacker
Do?
Slides made by : KARAN PATEL
8/4/2019 Hacking and Information Security
http://slidepdf.com/reader/full/hacking-and-information-security 9/29
6 great hackers of all time
WHITE HAT : LINUS TORVALDS
TIM BERNERS LEE
STEPHEN WOZNIAK
BLACK HAT :
KEVIN MITNICK
ROBERT TAPPAN MORRIS
JONATHAN JAMES
Slides made by : KARAN PATEL
8/4/2019 Hacking and Information Security
http://slidepdf.com/reader/full/hacking-and-information-security 10/29
HACKING AND
INFORMATION SECURITY
FAMILIARIZATION WITH HACKING &
CYBER CRIME JARGONS OR LINGOS
Slides made by : KARAN PATEL
8/4/2019 Hacking and Information Security
http://slidepdf.com/reader/full/hacking-and-information-security 11/29
Terminologies:
Threat : An action or event thatmight compromise security. A threatis a potential violation of security.
Vulnerability : Existence of aweakness, design, or implementationerror that can lead to an unexpectedand undesirable event compromisingthe security of the system.
Target of Evaluation (TOE): An ITsystem, program, or component thatis the identified/ subject of a securityanalysis for evaluation or attack.
Slides made by : KARAN PATEL
8/4/2019 Hacking and Information Security
http://slidepdf.com/reader/full/hacking-and-information-security 12/29
Terminologies:
Attack : An assault on the systemsecurity that is derived from anintelligent threat. An attack is anyaction that violates security.
Exploit : A defined way to breachthe security of an IT system
through vulnerability.
Slides made by : KARAN PATEL
8/4/2019 Hacking and Information Security
http://slidepdf.com/reader/full/hacking-and-information-security 13/29
Terminologies:
Security : A state of well-beingof information andinfrastructure in which thepossibility of successful yetundetected theft, tampering,and disruption of information
and services is kept low ortolerable.
Slides made by : KARAN PATEL
8/4/2019 Hacking and Information Security
http://slidepdf.com/reader/full/hacking-and-information-security 14/29
Terminologies:
Malware : A computer programdesigned to have undesirable orharmful effects.
Phishing : The process of tricking user to disclose username and password by sending
fake emails or setting up fakewebsite which mimics sign-inpages is called phishing.
Slides made by : KARAN PATEL
8/4/2019 Hacking and Information Security
http://slidepdf.com/reader/full/hacking-and-information-security 15/29
Terminologies:
Rootkits : Rootkits are kernelprograms that have the abilityto hide themselves and cover uptraces of activities.
Spam : Unwanted or junk e-mail.
Spyware : Spyware is a programthat records computer activitieson a machine.
Slides made by : KARAN PATEL
8/4/2019 Hacking and Information Security
http://slidepdf.com/reader/full/hacking-and-information-security 16/29
Terminologies:
Trojans : Trojan is a smallprogram that runs hidden on aninfected computer. With the
help of a Trojan, an attackergets access to stored passwordsin the Trojaned computer andwould be able to read personal
documents, delete files anddisplay pictures, and/or showmessages on the screen.
Slides made by : KARAN PATEL
8/4/2019 Hacking and Information Security
http://slidepdf.com/reader/full/hacking-and-information-security 17/29
Terminologies:
Viruses and Worms: Viruses andworms can be used to infect asystem and modify a system toallow a hacker to gain access. Manyviruses and worms carry Trojans andbackdoors. In this way, a virus orworm is a carrier and allowsmalicious code such as Trojans and
backdoors to be transferred fromsystem to system much in the waythat contact between people allowsgerms to spread.
Slides made by : KARAN PATEL
8/4/2019 Hacking and Information Security
http://slidepdf.com/reader/full/hacking-and-information-security 18/29
8/4/2019 Hacking and Information Security
http://slidepdf.com/reader/full/hacking-and-information-security 19/29
Why security is require?
To save what you have.
To save common human welfare ventures.
To sustain in era of competition. To live happy & ever growing life.
Slides made by : KARAN PATEL
8/4/2019 Hacking and Information Security
http://slidepdf.com/reader/full/hacking-and-information-security 20/29
Security Bases:
Security rests on confidentiality, authenticity,Integrity, and availability
Confidentiality is the concealment of information
or resources. Authenticity is the identification and assurance
of the origin of information.
Integrity refers to the trustworthiness of data or
resources in terms of preventing improper andunauthorized changes.
Availability refers to the ability to use theinformation or resource desired.
Slides made by : KARAN PATEL
8/4/2019 Hacking and Information Security
http://slidepdf.com/reader/full/hacking-and-information-security 21/29
Deployment of security:
Risk Assessment : One must know the level of risk that an attack possesses towardscompany for deploying suitable security
measures.Risk categories include:Confidential informationBusiness credibility
Business availabilityResourcesMoney
Slides made by : KARAN PATEL
8/4/2019 Hacking and Information Security
http://slidepdf.com/reader/full/hacking-and-information-security 22/29
Security,Functionality &
Ease of Use
Slides made by : KARAN PATEL
8/4/2019 Hacking and Information Security
http://slidepdf.com/reader/full/hacking-and-information-security 23/29
HACKING AND
INFORMATION SECURITY
HACKERS SIDE
Slides made by : KARAN PATEL
8/4/2019 Hacking and Information Security
http://slidepdf.com/reader/full/hacking-and-information-security 24/29
What Does a Malicious Hacker Do?
Reconnaissance• Active / passive
Scanning
Gaining access
• Operating system level /application level
• Network level
• Denial of service Maintaining
Maintaining access
• Uploading / altering /downloading programs or data
Covering tracks
Slides made by : KARAN PATEL
8/4/2019 Hacking and Information Security
http://slidepdf.com/reader/full/hacking-and-information-security 25/29
Reconnaissance
Reconnaissance refers to the preparatoryphase where an attacker seeks to gather asmuch information as possible about a targetof evaluation prior to launching an attack.
Slides made by : KARAN PATEL
8/4/2019 Hacking and Information Security
http://slidepdf.com/reader/full/hacking-and-information-security 26/29
Scanning
Scanning refers to pre-attack phase when thehacker scans the network with specificInformation gathered during reconnaissance.
Slides made by : KARAN PATEL
8/4/2019 Hacking and Information Security
http://slidepdf.com/reader/full/hacking-and-information-security 27/29
Gaining Access:
Gaining Access refers to the true attackphase. The hacker exploits the system.
Slides made by : KARAN PATEL
8/4/2019 Hacking and Information Security
http://slidepdf.com/reader/full/hacking-and-information-security 28/29
Maintaining Access:
Maintaining Access refers to the phase whenthe hacker tries to retain his ‘ownership’ of the system.
Slides made by : KARAN PATEL
8/4/2019 Hacking and Information Security
http://slidepdf.com/reader/full/hacking-and-information-security 29/29
Covering tracks:
Covering Tracks refers to the activitiesundertaken by the hacker to extend hismisuse of the system without being detected.
Slides made by : KARAN PATEL