system security in ethical hacking
Post on 02-Aug-2015
63 Views
Preview:
TRANSCRIPT
ETHICAL HACKING
CONTENTS
Introduction Types Of Hackers Hacking Process Certifications Hacking Language Security Types System Security Keyloggers,Anti-keyloggers Tips For Securing System Data And System Advantages Of Ethical Hacking Disadvantages Of Ethical Hacking Conclusion
INTRODUCTION
Ethical hacking is also known as penetrationtesting, instruction testing or red teaming It is Legal Permission is obtained from the target Part of an overall security program Identify vulnerabilities visible from Internet atparticular point of time Hacker
Cracker
TYPES OF HACKERS
White Hat Hacker Good guys Don’t use their skill for illegal purpose
Black Hat Hacker Bad guys Use their skill maliciously for personal gain
Grey Hat Hacker It is a combination of White hat n Black Hat
Hackers Goal of grey hat hackers is to provide
national security
HACKING PROCESS
Foot printing
Scanning
Enumeration
Attack and Gaining Access
Escalating Privilege, Covering
Tracks and Creating Backdoors
CERTIFICATIONS
The International Council of E-Commerce Consultants (EC-Council) provides a professional certification for Certified Ethical Hackers (CEH). A certified ethical hacker is an ethical hacker who has obtained the certification provided by the EC-Council.
1. Legality2. Footprint3. Scanning4. Enumeration5. System Hacking6. Trojans & Backdoors7. Sniffers8. Denial of Service 9. Social Engineering10. Session Hacking
HACKERS LANGUAGE
1 -> i or l3 -> e4 -> a 7 -> t9 -> g0 -> o$ -> s| -> i or I
|\| -> n|\/| -> ms -> zz -> sf -> phph -> fx -> ckck -> x
Example:
Hacking is good
H4ck||\|g 1$ 900d
SECURITY TYPES
Broadly we can divide security in three divisions 1.System security
2.Data Security 3.Network Security
System security is least consider nowadays also when we have maximum number of hackers and crackers.
SYSTEM SECURITY
System security means securing a system from unauthorized access by the person who can physically access it.
System security is further divided into two divisions
1. System accessible Security 2. Data accessible Security
SYSTEM ACCESSIBLE SECURITY
System accessible security means restricting someone to access the system completely, it can be referred as OS level security.
Eg: Provide user password in the system
DATA ACCESSIBLE SECURITY
When we give permission to a user to access only certain files and folders in a system then it is consider as the Data Accessible Security.
We can achieve data accessible security by many ways.
Some of the ways are:- 1) Encrypting Hard disk 2) Hiding Folders 3) By locking folders
KEYLOGGERS, ANTI-KEYLOGGERS
Keyloggers are a software or hardware which records the screenshots or keystrokes without the knowledge of user.
Types of keyloggers: 1.SOFTWARE KEYLOGGERS 2.HARDWARE KEYLOGGERS Hardware key loggers can be detected by
carefully observing the port but to prevent system from software keyloggers, we need to install anti keyloggers.
KON BOOT
TIPS FOR SECURING SYSTEM DATA AND SYSTEM
Install and Use Anti-Virus, firewalls & Anti key logger Programs
While installing OS like Windows XP give admin password. Use Care When Reading Email with Attachments and
following links. Install and Use a Firewall Program Make Backups of Important Files and Folders Change passwords Use Care When Downloading and Installing Programs Install and Use a Hardware Firewall Install and Use a File Encryption Program and Access
Controls Safeguard your Data Real-World Warnings keep you safe online.
ADVANTAGES OF ETHICAL HACKING
Provides security to banking and financial establishments
Prevents website defacements An evolving technique To catch a thief you have to think like a thief
DISADVANTAGES OF ETHICAL HACKING
All depends upon the trustworthiness of the ethical hacker
Hiring professionals is expensive.
REFERENCES
Ethical Hacking –Wikipedia Ethics in ethical hacking-Idimadakala
nagaraju Need of ethical hacking in online world-Vivek
shrivastava,monika pangaria History and impact of ethical hacking-History
of computing final paper
Ethical hacking : A technique to enhance Information security-Gorpreet k.Juneja
Ethical hacking techniques with penetration testing-K.Bala chowdappa,S.Subba lakshmi,P.N.V.S. Pavan kumar
Ethical hacking in linux environment-Anirudhha P tekada,pravin Gurjar,Pankaj R.Inglr,DR.BB.Meshram
System security in ethical hacking-Kumar utkarsh
http://www.slideshare.com
CONCLUSION
We should pay maximum attention towards our system security and we can do the same by remembering this line “Treat your password like you treat your toothbrush. Never give it to anyone else to use, and change it every few months & most importantly use SYSKEY”
top related