system security in ethical hacking

Post on 02-Aug-2015

63 Views

Category:

Career

2 Downloads

Preview:

Click to see full reader

TRANSCRIPT

ETHICAL HACKING

CONTENTS

Introduction Types Of Hackers Hacking Process Certifications Hacking Language Security Types System Security Keyloggers,Anti-keyloggers Tips For Securing System Data And System Advantages Of Ethical Hacking Disadvantages Of Ethical Hacking Conclusion

INTRODUCTION

Ethical hacking is also known as penetrationtesting, instruction testing or red teaming It is Legal Permission is obtained from the target Part of an overall security program Identify vulnerabilities visible from Internet atparticular point of time Hacker

Cracker

TYPES OF HACKERS

White Hat Hacker Good guys Don’t use their skill for illegal purpose

Black Hat Hacker Bad guys Use their skill maliciously for personal gain

Grey Hat Hacker It is a combination of White hat n Black Hat

Hackers Goal of grey hat hackers is to provide

national security

HACKING PROCESS

Foot printing

Scanning

Enumeration

Attack and Gaining Access

Escalating Privilege, Covering

Tracks and Creating Backdoors

CERTIFICATIONS

The International Council of E-Commerce Consultants (EC-Council) provides a professional certification for Certified Ethical Hackers (CEH). A certified ethical hacker is an ethical hacker who has obtained the certification provided by the EC-Council.

1. Legality2. Footprint3. Scanning4. Enumeration5. System Hacking6. Trojans & Backdoors7. Sniffers8. Denial of Service 9. Social Engineering10. Session Hacking

HACKERS LANGUAGE

1 -> i or l3 -> e4 -> a 7 -> t9 -> g0 -> o$ -> s| -> i or I

|\| -> n|\/| -> ms -> zz -> sf -> phph -> fx -> ckck -> x

Example:

Hacking is good

H4ck||\|g 1$ 900d

SECURITY TYPES

Broadly we can divide security in three divisions 1.System security

2.Data Security 3.Network Security

System security is least consider nowadays also when we have maximum number of hackers and crackers.

SYSTEM SECURITY

System security means securing a system from unauthorized access by the person who can physically access it.

System security is further divided into two divisions

1. System accessible Security 2. Data accessible Security

SYSTEM ACCESSIBLE SECURITY

System accessible security means restricting someone to access the system completely, it can be referred as OS level security.

Eg: Provide user password in the system

DATA ACCESSIBLE SECURITY

When we give permission to a user to access only certain files and folders in a system then it is consider as the Data Accessible Security.

We can achieve data accessible security by many ways.

Some of the ways are:- 1) Encrypting Hard disk 2) Hiding Folders 3) By locking folders

KEYLOGGERS, ANTI-KEYLOGGERS

Keyloggers are a software or hardware which records the screenshots or keystrokes without the knowledge of user.

Types of keyloggers: 1.SOFTWARE KEYLOGGERS 2.HARDWARE KEYLOGGERS Hardware key loggers can be detected by

carefully observing the port but to prevent system from software keyloggers, we need to install anti keyloggers.

KON BOOT

TIPS FOR SECURING SYSTEM DATA AND SYSTEM

Install and Use Anti-Virus, firewalls & Anti key logger Programs

While installing OS like Windows XP give admin password. Use Care When Reading Email with Attachments and

following links. Install and Use a Firewall Program Make Backups of Important Files and Folders Change passwords Use Care When Downloading and Installing Programs Install and Use a Hardware Firewall Install and Use a File Encryption Program and Access

Controls Safeguard your Data Real-World Warnings keep you safe online.

ADVANTAGES OF ETHICAL HACKING

Provides security to banking and financial establishments

Prevents website defacements An evolving technique To catch a thief you have to think like a thief

DISADVANTAGES OF ETHICAL HACKING

All depends upon the trustworthiness of the ethical hacker

Hiring professionals is expensive.

REFERENCES

Ethical Hacking –Wikipedia Ethics in ethical hacking-Idimadakala

nagaraju Need of ethical hacking in online world-Vivek

shrivastava,monika pangaria History and impact of ethical hacking-History

of computing final paper

Ethical hacking : A technique to enhance Information security-Gorpreet k.Juneja

Ethical hacking techniques with penetration testing-K.Bala chowdappa,S.Subba lakshmi,P.N.V.S. Pavan kumar

Ethical hacking in linux environment-Anirudhha P tekada,pravin Gurjar,Pankaj R.Inglr,DR.BB.Meshram

System security in ethical hacking-Kumar utkarsh

http://www.slideshare.com

CONCLUSION

We should pay maximum attention towards our system security and we can do the same by remembering this line “Treat your password like you treat your toothbrush. Never give it to anyone else to use, and change it every few months & most importantly use SYSKEY”

top related