hacking (1)

30
TERM PAPER ON ETHICAL HACKING PRESENTED BY : PRUDHVI RAJ IT-1 13501A1249

Upload: deepu-naeni

Post on 12-Jul-2015

80 views

Category:

Documents


0 download

TRANSCRIPT

TERM PAPER ON

ETHICAL HACKINGPRESENTED BY :

PRUDHVI RAJ

IT-1

13501A1249

WHAT IS HACKING ?• Hacking is the intentional unauthorized access to

computer systems

– Illegal activities from harmless pranks to huge thefts and

– shutdowns of services

• Traditionally hacking refers to the hobby/profession of working with computers.

• But now a days it refers to breaking into computer systems.

HISTORY OF HACKING• The first hacker was appeared in 1960’s at the Massachusetts

Institute of Technology(MIT) .

• During the 1970’s , a different kind of hacker appeared : PhonePhreaker or Phone Hacker.

• In the 1980’s, phreaks started to migrate to computers and the first Bulletin Board System(BBS) appeared.

• During the 1990’s, when the use of internet wide spread around the world, hackers multipiled.

ETHICAL HACKING

What is ethical hacking • BASIC MEANING :

In simple words Ethical Hacking is testing the resources for a good cause and for the betterment of technology. It also means to secure the system.

• TECHNICAL MEANING :Technically Ethical Hacking is done by a computer hacker who is hired by an organization to undertake non malicious hacking work in order to discover computer-security flaws.

WHO ARE ETHICAL HACKERS???

• Completely trustworthy.

• Strong programming and computer networking skills.

• Technique of criminal hackers-Detection-Prevention.

• Ethical hackers possess same skills , mind set and tools of a hacker but the attacks are done in a non destructive manner.

Hacking Process

Footprinting

Scanning

EnumerationAttack and

Gaining Access

Escalating Privilege, Covering

Tracks and Creating Backdoors

TYPES OF HACKING->Website hacking. ->Email hacking.

->Network hacking. ->Password hacking.

->online transactions hacking. ->Computer hacking.

->Mobile hacking. ->PDA hacking.

->Metropolitan system hacking.

WHY DO HACKERS HACK?• Just for fun.

• Hack other systems secretly.

• Notify many people their thought.

• Steal important information.

• Destroy enemy’s computer network during the war

CONSEQUENCES OFILLEGAL HACKING• Thousands of dollars in fines.

• Imprisonment.

• Seizure of your computer.

IS HACKING A CRIME??

TYPES OF HACKERS

Black hats

•Very dangerous persons.

•Always have motive to earn huge profits.

•Highly paid persons.

•Evolves themselves mostly in criminal

activities.

•These could be CODERS & ADMINS.

•As well as SCRIPT KIDDIES.

White hats•These are good hackers.

•Have genuine license to hack.

•Have registered police records.

•Evolves themselves in good works.

•Generally owned by companies for

security designing.

•Have high pay scales.

•Generally these are CODERS.

GREY HATS

•Also known as RED HATS.

•Perform both tasks fair and unfair.

•Generally these are ADMINS.

•Have little high pay than white hats.

•Generally not so dangerous but some

times it could be.

Advantages

These are good hackers

Have genuine license to hack

Have registered police records

Advantages :Generally owned by companies for

security designing

They have high salaries

YOU HAVE BEEN

WHAT TO DO AFTER BEING HACKED?• Shut down the system.

• Clear the memory using cleaners (like C Cleaner).

• Scan infected sections with good antivirus.

• Separate the system from network (do not use internet)

• Restore the system with the back up. (if o/s problem)

• Finally , connect the system to the network.

HOW CAN BE A REAL HACKER• Study C/C++/Assembly language.

• Study computer architecture.

• Study operating system.

• Study computer network.

• Examine the hacking tools for a month.

• Think the problem of a computer.

SECURITY & COUNTER MEASURES:• Use of Antivirus.

• Proper logout after proper use of mail id.

• Manual opening browser.

• Don’t open spam.

• Password protected admin account.

Did you know ?• Social networking sites like

‘FACEBOOK’,’GMAIL’,’YAHOO” comprised of 60% of direct or indirect hacking incidents.

• The average age group of hackers are aged between 14-24 yrs. …

Job of each hacker:

• The White Hat Approach:

This is a more deterministic plan of attack than the Black Box one.

Cyber c rime

IN THE WORLD..

Stephen wozniac Tsutomu shimomura

Kevin mitnick Kevin poulsen

WORLD FAMOUS HACKERS

HOW TO PREVENT HACKERS

Change your password everymonth

Install a firewall on your computer

Purchase or download antivirus software

Install antispyware program onto your computer

CONCLUSIONFrom a practical standpoint the security problem will remain as long as manufacturers remain committed to current system.

Regular auditing, vigilant intrusion detection, good system administration practice and computer security awareness are all essential parts of an organization’s security efforts.

ANY QUERIES???