system security in ethical hacking
TRANSCRIPT
![Page 1: System Security in Ethical Hacking](https://reader034.vdocuments.us/reader034/viewer/2022042518/55bdaac9bb61eb865d8b462a/html5/thumbnails/1.jpg)
ETHICAL HACKING
![Page 2: System Security in Ethical Hacking](https://reader034.vdocuments.us/reader034/viewer/2022042518/55bdaac9bb61eb865d8b462a/html5/thumbnails/2.jpg)
CONTENTS
Introduction Types Of Hackers Hacking Process Certifications Hacking Language Security Types System Security Keyloggers,Anti-keyloggers Tips For Securing System Data And System Advantages Of Ethical Hacking Disadvantages Of Ethical Hacking Conclusion
![Page 3: System Security in Ethical Hacking](https://reader034.vdocuments.us/reader034/viewer/2022042518/55bdaac9bb61eb865d8b462a/html5/thumbnails/3.jpg)
INTRODUCTION
Ethical hacking is also known as penetrationtesting, instruction testing or red teaming It is Legal Permission is obtained from the target Part of an overall security program Identify vulnerabilities visible from Internet atparticular point of time Hacker
Cracker
![Page 4: System Security in Ethical Hacking](https://reader034.vdocuments.us/reader034/viewer/2022042518/55bdaac9bb61eb865d8b462a/html5/thumbnails/4.jpg)
TYPES OF HACKERS
White Hat Hacker Good guys Don’t use their skill for illegal purpose
Black Hat Hacker Bad guys Use their skill maliciously for personal gain
Grey Hat Hacker It is a combination of White hat n Black Hat
Hackers Goal of grey hat hackers is to provide
national security
![Page 5: System Security in Ethical Hacking](https://reader034.vdocuments.us/reader034/viewer/2022042518/55bdaac9bb61eb865d8b462a/html5/thumbnails/5.jpg)
HACKING PROCESS
Foot printing
Scanning
Enumeration
Attack and Gaining Access
Escalating Privilege, Covering
Tracks and Creating Backdoors
![Page 6: System Security in Ethical Hacking](https://reader034.vdocuments.us/reader034/viewer/2022042518/55bdaac9bb61eb865d8b462a/html5/thumbnails/6.jpg)
CERTIFICATIONS
The International Council of E-Commerce Consultants (EC-Council) provides a professional certification for Certified Ethical Hackers (CEH). A certified ethical hacker is an ethical hacker who has obtained the certification provided by the EC-Council.
1. Legality2. Footprint3. Scanning4. Enumeration5. System Hacking6. Trojans & Backdoors7. Sniffers8. Denial of Service 9. Social Engineering10. Session Hacking
![Page 7: System Security in Ethical Hacking](https://reader034.vdocuments.us/reader034/viewer/2022042518/55bdaac9bb61eb865d8b462a/html5/thumbnails/7.jpg)
HACKERS LANGUAGE
1 -> i or l3 -> e4 -> a 7 -> t9 -> g0 -> o$ -> s| -> i or I
|\| -> n|\/| -> ms -> zz -> sf -> phph -> fx -> ckck -> x
Example:
Hacking is good
H4ck||\|g 1$ 900d
![Page 8: System Security in Ethical Hacking](https://reader034.vdocuments.us/reader034/viewer/2022042518/55bdaac9bb61eb865d8b462a/html5/thumbnails/8.jpg)
SECURITY TYPES
Broadly we can divide security in three divisions 1.System security
2.Data Security 3.Network Security
System security is least consider nowadays also when we have maximum number of hackers and crackers.
![Page 9: System Security in Ethical Hacking](https://reader034.vdocuments.us/reader034/viewer/2022042518/55bdaac9bb61eb865d8b462a/html5/thumbnails/9.jpg)
SYSTEM SECURITY
System security means securing a system from unauthorized access by the person who can physically access it.
System security is further divided into two divisions
1. System accessible Security 2. Data accessible Security
![Page 10: System Security in Ethical Hacking](https://reader034.vdocuments.us/reader034/viewer/2022042518/55bdaac9bb61eb865d8b462a/html5/thumbnails/10.jpg)
SYSTEM ACCESSIBLE SECURITY
System accessible security means restricting someone to access the system completely, it can be referred as OS level security.
Eg: Provide user password in the system
![Page 11: System Security in Ethical Hacking](https://reader034.vdocuments.us/reader034/viewer/2022042518/55bdaac9bb61eb865d8b462a/html5/thumbnails/11.jpg)
DATA ACCESSIBLE SECURITY
When we give permission to a user to access only certain files and folders in a system then it is consider as the Data Accessible Security.
We can achieve data accessible security by many ways.
Some of the ways are:- 1) Encrypting Hard disk 2) Hiding Folders 3) By locking folders
![Page 12: System Security in Ethical Hacking](https://reader034.vdocuments.us/reader034/viewer/2022042518/55bdaac9bb61eb865d8b462a/html5/thumbnails/12.jpg)
KEYLOGGERS, ANTI-KEYLOGGERS
Keyloggers are a software or hardware which records the screenshots or keystrokes without the knowledge of user.
Types of keyloggers: 1.SOFTWARE KEYLOGGERS 2.HARDWARE KEYLOGGERS Hardware key loggers can be detected by
carefully observing the port but to prevent system from software keyloggers, we need to install anti keyloggers.
![Page 13: System Security in Ethical Hacking](https://reader034.vdocuments.us/reader034/viewer/2022042518/55bdaac9bb61eb865d8b462a/html5/thumbnails/13.jpg)
KON BOOT
![Page 14: System Security in Ethical Hacking](https://reader034.vdocuments.us/reader034/viewer/2022042518/55bdaac9bb61eb865d8b462a/html5/thumbnails/14.jpg)
TIPS FOR SECURING SYSTEM DATA AND SYSTEM
Install and Use Anti-Virus, firewalls & Anti key logger Programs
While installing OS like Windows XP give admin password. Use Care When Reading Email with Attachments and
following links. Install and Use a Firewall Program Make Backups of Important Files and Folders Change passwords Use Care When Downloading and Installing Programs Install and Use a Hardware Firewall Install and Use a File Encryption Program and Access
Controls Safeguard your Data Real-World Warnings keep you safe online.
![Page 15: System Security in Ethical Hacking](https://reader034.vdocuments.us/reader034/viewer/2022042518/55bdaac9bb61eb865d8b462a/html5/thumbnails/15.jpg)
ADVANTAGES OF ETHICAL HACKING
Provides security to banking and financial establishments
Prevents website defacements An evolving technique To catch a thief you have to think like a thief
![Page 16: System Security in Ethical Hacking](https://reader034.vdocuments.us/reader034/viewer/2022042518/55bdaac9bb61eb865d8b462a/html5/thumbnails/16.jpg)
DISADVANTAGES OF ETHICAL HACKING
All depends upon the trustworthiness of the ethical hacker
Hiring professionals is expensive.
![Page 17: System Security in Ethical Hacking](https://reader034.vdocuments.us/reader034/viewer/2022042518/55bdaac9bb61eb865d8b462a/html5/thumbnails/17.jpg)
REFERENCES
Ethical Hacking –Wikipedia Ethics in ethical hacking-Idimadakala
nagaraju Need of ethical hacking in online world-Vivek
shrivastava,monika pangaria History and impact of ethical hacking-History
of computing final paper
![Page 18: System Security in Ethical Hacking](https://reader034.vdocuments.us/reader034/viewer/2022042518/55bdaac9bb61eb865d8b462a/html5/thumbnails/18.jpg)
Ethical hacking : A technique to enhance Information security-Gorpreet k.Juneja
Ethical hacking techniques with penetration testing-K.Bala chowdappa,S.Subba lakshmi,P.N.V.S. Pavan kumar
Ethical hacking in linux environment-Anirudhha P tekada,pravin Gurjar,Pankaj R.Inglr,DR.BB.Meshram
System security in ethical hacking-Kumar utkarsh
http://www.slideshare.com
![Page 19: System Security in Ethical Hacking](https://reader034.vdocuments.us/reader034/viewer/2022042518/55bdaac9bb61eb865d8b462a/html5/thumbnails/19.jpg)
CONCLUSION
We should pay maximum attention towards our system security and we can do the same by remembering this line “Treat your password like you treat your toothbrush. Never give it to anyone else to use, and change it every few months & most importantly use SYSKEY”
![Page 20: System Security in Ethical Hacking](https://reader034.vdocuments.us/reader034/viewer/2022042518/55bdaac9bb61eb865d8b462a/html5/thumbnails/20.jpg)
![Page 21: System Security in Ethical Hacking](https://reader034.vdocuments.us/reader034/viewer/2022042518/55bdaac9bb61eb865d8b462a/html5/thumbnails/21.jpg)