+ All Categories
Home > Documents > Hacking and Information Security

Hacking and Information Security

Date post: 07-Apr-2018
Category:
Upload: karan-patel
View: 224 times
Download: 0 times
Share this document with a friend
29
HACKING AND INTRODUCTION TO HACKING & HACKERS Slides made by : KARAN PA TEL
Transcript
Page 1: Hacking and Information Security

8/4/2019 Hacking and Information Security

http://slidepdf.com/reader/full/hacking-and-information-security 1/29

Page 2: Hacking and Information Security

8/4/2019 Hacking and Information Security

http://slidepdf.com/reader/full/hacking-and-information-security 2/29

Page 3: Hacking and Information Security

8/4/2019 Hacking and Information Security

http://slidepdf.com/reader/full/hacking-and-information-security 3/29

Page 4: Hacking and Information Security

8/4/2019 Hacking and Information Security

http://slidepdf.com/reader/full/hacking-and-information-security 4/29

Who the Hackers really

are????? Hackers are the individual personnel or some

well-organized group of people decides somestrategies for achieving some legitimate orillegitimate goals.

Hackers are highly skilled fellows with goodknowledge on computer systems & real life

specialists on tackling any undesiredsituations.

Slides made by : KARAN PATEL

Page 5: Hacking and Information Security

8/4/2019 Hacking and Information Security

http://slidepdf.com/reader/full/hacking-and-information-security 5/29

Hacktivism

Refers to the idea of Hackingwith or for a cause

Comprises of Hackers with

a social or political agenda Aims at sending a message

through their hacking activityand gaining visibility fortheir cause and themselves.

Common targets includes government agencies,MNCs, or any other entity perceived as bad orwrong by these groups or individuals.

Slides made by : KARAN PATEL

Page 6: Hacking and Information Security

8/4/2019 Hacking and Information Security

http://slidepdf.com/reader/full/hacking-and-information-security 6/29

Levels of Hackers:

Script kiddies : These are the wannabe 

hackers, who don’t know anythingabout hacking and background

procedures they just apply codesmade by hackers without priorknowledge of the results.

Intermediate Hackers: These are theHackers who knows everything abouthacking but can’t make codes & tools. 

Elite Hackers : These are the highly know ledgedentities who plays with computer machines,human minds & laws.

Slides made by : KARAN PATEL

Page 7: Hacking and Information Security

8/4/2019 Hacking and Information Security

http://slidepdf.com/reader/full/hacking-and-information-security 7/29

Types of Hackers:

Black Hats : Individuals with extraordinarycomputing skills , resorting to malicious ordestructive activities. Also known as crackers

White Hats : Individuals professing hackerskills and using them for defensive purposes.Also known as security analysts.

Gray hats : Individuals who work bothoffensively and defensively at various times.

Suicide hackers : Individuals who aim tobring down critical infrastructure for a “cause”and do not worry about facing 30yrs in jailfor their actions.

Slides made by : KARAN PATEL

Page 8: Hacking and Information Security

8/4/2019 Hacking and Information Security

http://slidepdf.com/reader/full/hacking-and-information-security 8/29

What does a Malicious Hacker

Do?

Slides made by : KARAN PATEL

Page 9: Hacking and Information Security

8/4/2019 Hacking and Information Security

http://slidepdf.com/reader/full/hacking-and-information-security 9/29

6 great hackers of all time

WHITE HAT : LINUS TORVALDS

TIM BERNERS LEE

STEPHEN WOZNIAK

BLACK HAT :

KEVIN MITNICK

ROBERT TAPPAN MORRIS

JONATHAN JAMES

Slides made by : KARAN PATEL

Page 10: Hacking and Information Security

8/4/2019 Hacking and Information Security

http://slidepdf.com/reader/full/hacking-and-information-security 10/29

HACKING AND

INFORMATION SECURITY

FAMILIARIZATION WITH HACKING &

CYBER CRIME JARGONS OR LINGOS

Slides made by : KARAN PATEL

Page 11: Hacking and Information Security

8/4/2019 Hacking and Information Security

http://slidepdf.com/reader/full/hacking-and-information-security 11/29

Terminologies:

Threat : An action or event thatmight compromise security. A threatis a potential violation of security.

Vulnerability : Existence of aweakness, design, or implementationerror that can lead to an unexpectedand undesirable event compromisingthe security of the system.

Target of Evaluation (TOE): An ITsystem, program, or component thatis the identified/ subject of a securityanalysis for evaluation or attack. 

Slides made by : KARAN PATEL

Page 12: Hacking and Information Security

8/4/2019 Hacking and Information Security

http://slidepdf.com/reader/full/hacking-and-information-security 12/29

Terminologies:

Attack : An assault on the systemsecurity that is derived from anintelligent threat. An attack is anyaction that violates security.

Exploit : A defined way to breachthe security of an IT system

through vulnerability. 

Slides made by : KARAN PATEL

Page 13: Hacking and Information Security

8/4/2019 Hacking and Information Security

http://slidepdf.com/reader/full/hacking-and-information-security 13/29

Terminologies:

Security : A state of well-beingof information andinfrastructure in which thepossibility of successful yetundetected theft, tampering,and disruption of information

and services is kept low ortolerable. 

Slides made by : KARAN PATEL

Page 14: Hacking and Information Security

8/4/2019 Hacking and Information Security

http://slidepdf.com/reader/full/hacking-and-information-security 14/29

Terminologies:

Malware : A computer programdesigned to have undesirable orharmful effects.

Phishing : The process of tricking user to disclose username and password by sending

fake emails or setting up fakewebsite which mimics sign-inpages is called phishing. 

Slides made by : KARAN PATEL

Page 15: Hacking and Information Security

8/4/2019 Hacking and Information Security

http://slidepdf.com/reader/full/hacking-and-information-security 15/29

Terminologies:

Rootkits : Rootkits are kernelprograms that have the abilityto hide themselves and cover uptraces of activities.

Spam : Unwanted or junk e-mail.

Spyware : Spyware is a programthat records computer activitieson a machine.

Slides made by : KARAN PATEL

Page 16: Hacking and Information Security

8/4/2019 Hacking and Information Security

http://slidepdf.com/reader/full/hacking-and-information-security 16/29

Terminologies:

Trojans : Trojan is a smallprogram that runs hidden on aninfected computer. With the

help of a Trojan, an attackergets access to stored passwordsin the Trojaned computer andwould be able to read personal

documents, delete files anddisplay pictures, and/or showmessages on the screen.

Slides made by : KARAN PATEL

Page 17: Hacking and Information Security

8/4/2019 Hacking and Information Security

http://slidepdf.com/reader/full/hacking-and-information-security 17/29

Terminologies:

Viruses and Worms: Viruses andworms can be used to infect asystem and modify a system toallow a hacker to gain access. Manyviruses and worms carry Trojans andbackdoors. In this way, a virus orworm is a carrier and allowsmalicious code such as Trojans and

backdoors to be transferred fromsystem to system much in the waythat contact between people allowsgerms to spread.

Slides made by : KARAN PATEL

Page 18: Hacking and Information Security

8/4/2019 Hacking and Information Security

http://slidepdf.com/reader/full/hacking-and-information-security 18/29

Page 19: Hacking and Information Security

8/4/2019 Hacking and Information Security

http://slidepdf.com/reader/full/hacking-and-information-security 19/29

Why security is require?

To save what you have.

To save common human welfare ventures.

To sustain in era of competition. To live happy & ever growing life.

Slides made by : KARAN PATEL

Page 20: Hacking and Information Security

8/4/2019 Hacking and Information Security

http://slidepdf.com/reader/full/hacking-and-information-security 20/29

Security Bases:

Security rests on confidentiality, authenticity,Integrity, and availability

Confidentiality is the concealment of information

or resources. Authenticity is the identification and assurance

of the origin of information.

Integrity refers to the trustworthiness of data or

resources in terms of preventing improper andunauthorized changes.

Availability refers to the ability to use theinformation or resource desired.

Slides made by : KARAN PATEL

Page 21: Hacking and Information Security

8/4/2019 Hacking and Information Security

http://slidepdf.com/reader/full/hacking-and-information-security 21/29

Deployment of security:

Risk Assessment : One must know the level of risk that an attack possesses towardscompany for deploying suitable security

measures.Risk categories include:Confidential informationBusiness credibility

Business availabilityResourcesMoney

Slides made by : KARAN PATEL

Page 22: Hacking and Information Security

8/4/2019 Hacking and Information Security

http://slidepdf.com/reader/full/hacking-and-information-security 22/29

Security,Functionality &

Ease of Use

Slides made by : KARAN PATEL

Page 23: Hacking and Information Security

8/4/2019 Hacking and Information Security

http://slidepdf.com/reader/full/hacking-and-information-security 23/29

HACKING AND

INFORMATION SECURITY

HACKERS SIDE

Slides made by : KARAN PATEL

Page 24: Hacking and Information Security

8/4/2019 Hacking and Information Security

http://slidepdf.com/reader/full/hacking-and-information-security 24/29

What Does a Malicious Hacker Do?

Reconnaissance• Active / passive

Scanning

Gaining access

• Operating system level /application level

• Network level

• Denial of service Maintaining

Maintaining access

• Uploading / altering /downloading programs or data

Covering tracks

Slides made by : KARAN PATEL

Page 25: Hacking and Information Security

8/4/2019 Hacking and Information Security

http://slidepdf.com/reader/full/hacking-and-information-security 25/29

Reconnaissance

Reconnaissance refers to the preparatoryphase where an attacker seeks to gather asmuch information as possible about a targetof evaluation prior to launching an attack.

Slides made by : KARAN PATEL

Page 26: Hacking and Information Security

8/4/2019 Hacking and Information Security

http://slidepdf.com/reader/full/hacking-and-information-security 26/29

Scanning

Scanning refers to pre-attack phase when thehacker scans the network with specificInformation gathered during reconnaissance.

Slides made by : KARAN PATEL

Page 27: Hacking and Information Security

8/4/2019 Hacking and Information Security

http://slidepdf.com/reader/full/hacking-and-information-security 27/29

Gaining Access:

Gaining Access refers to the true attackphase. The hacker exploits the system.

Slides made by : KARAN PATEL

Page 28: Hacking and Information Security

8/4/2019 Hacking and Information Security

http://slidepdf.com/reader/full/hacking-and-information-security 28/29

Maintaining Access:

Maintaining Access refers to the phase whenthe hacker tries to retain his ‘ownership’ of the system.

Slides made by : KARAN PATEL

Page 29: Hacking and Information Security

8/4/2019 Hacking and Information Security

http://slidepdf.com/reader/full/hacking-and-information-security 29/29

Covering tracks:

Covering Tracks refers to the activitiesundertaken by the hacker to extend hismisuse of the system without being detected.

Slides made by : KARAN PATEL


Recommended