ethical hacking

26
Ethical Hacking

Upload: shikhagupta3288

Post on 10-Dec-2015

5 views

Category:

Documents


0 download

DESCRIPTION

Ethical Hacking

TRANSCRIPT

Ethical Hacking

2

Contents Definition Why Ethical Hacking? Evolution of Ethical Hacking News Related to Cyber Crime and Ethical Hacking Types of Hacking Attacks Prevention of Hacking Attacks Advantages and Disadvantages of Ethical Hacking Uses and Needs of Ethical Hacking

3

More than 700 Government Websites Hacked since 2012

Central Bureau of Investigation (CBI) Website

Andhra Pradesh Govt. Website

4

2011 2012 2013 2014 (till May)

13,301

22,060

71,78062,189

Cyber Frauds in India(#, 2011-May 2014)

2011 2012 2013 2014 (till May)

21,699

27,605 28,481

48,175

Websites Hacked in India(#, 2011-2013)

Source: Home Ministry Statistics Source: Home Ministry Statistics

India Rank 5Th Among Cyber Crime Affected Countries

Number of Cyber Crimes in India may touch 3,00,000 in 2015, almost double the level of last year - ASSOCHAM-Mahindra SSG study

Number of Cyber Crimes in India may touch 3,00,000 in 2015, almost double the level of last year - ASSOCHAM-Mahindra SSG study

5

Hacking performed by a company or individual to help identify potential threats on a computer or network

An ethical hacker attempts to bypass way past the system security and search for any weak points that could be exploited by malicious hackers.

This information is then used by the organization to improve the system security, in an effort to minimize or eliminate, any potential attacks.

Definition

Ethical Hacking

Why Ethical Hacking?

With the growth of internet, computer security has become a major concern for businesses and governments

Best way to evaluate the intruder threat would to have computer security professionals attempt to break into the computer systems

6

Evolution of Ethical Hacking

Ethical hacking is said to originate in ancient India, in the form of strategy game known as chaturanga, an early version of chess.

That evolved into actual chess, then military "tiger teams," and eventually, when technology advanced enough, into the operating system and application realm.

Of course, for a long time, nobody was calling it ethical hacking - but that's exactly what it was: Individuals or groups were assessing their own resiliency to attack. In other words, they were hacking themselves for their own good.

7

8

9

10

11

12

13

News Related to Cyber Crime and Ethical Hacking

FBI has been hiring ethical hackers to protect against acts of cyber vandalism such as a group of hackers taking down Sony's Playstation Network and Microsoft's Xbox Live.

Even though the FBI is seeking people with a specific background in cyber security, new hires will still have to undergo the fitness tests and training of a typical agent

Cyber Cell which is main department that comes under EOW is attached with national and state security agencies to solve several Cyber Crime cases.

When the AIADMK website was hacked last year, EOW took expert help from a white hat hacker to narrow down the culprit

14

Types of Hacking Attacks

Trojan programs Spoofing Spyware Denial of Service Attacks Wormhole Attack Phishing

15

Trojan Programs

Conceals itself with an unsuspected program Unknowingly executed Read, delete , move and execute any file Hacker steals user information when user comes online

16

Denial of Service Attack

Large no. of packets sent through packet generator software Makes service unavailable by consuming resources Ping of Death SYN flood attack

17

Phishing

Fake emails asking to fill personal information on counterfeit links Manipulating URL and redirecting to phisher’s website

18

Prevention of Hacking Attacks

Patches and upgrades (hardening) Disabling unnecessary software Firewalls and Intrusion Detection Systems ‘Honeypots’ Recognizing and reacting to port scanning

19

Advantages

It can help a country fight against national security breaches and terrorism.

White hat hackers can also demonstrate the techniques used by unethical invaders and help prepare organizations for black hat hacker attacks.

It can help organizations identify vulnerable areas in their information system.

It can benefit organizations by creating a computer system that prevents malicious hackers from gaining access to the system.

20

Disadvantages

The ethical hacker can use the knowledge they have gained and engage in malicious hacking activities.

There is a possibility that the ethical hacker will send and/or place malicious code, viruses, malware and other destructive and harmful things on a computer system.

The ethical hacker can himself engage in massive security breach.

21

Uses and Needs of Ethical Hacking

Ethical hackers are on the rise because of advancement in technology. A lot of organizations have been a victim of cyber attacks which increases the need to safeguard their networks which can be done by professional ethical hackers.

Complex Enterprise Networks Require Security Expertise Ethical Hacking Services Provide Objective Analysis and

Validation Ethical hacking services provide customers with

objective, real-world assessments of their security architectures

The following are the services of ethical hackers:

22

Ethical Hacking’s Role in an Enterprise Security Architecture

23

Ethical Hacking In Business

Companies now create an online presence which increases their need for ethical hacking

Ethical hacking is required to safeguard sensitive information about customers in business transactions

Helps improve security of systems in organization Companies are moving towards cloud computing

which raises concern for security. They want to take advantage of virtualization without compromising on security

To test network at regular intervals and create a sense of awareness about security at all levels in business

24

Ethical Hacking used in Crime Investigation

Several ethical hackers are college drop outs or highly qualified computer professionals with an urge to crack down on criminals

This hacker works mostly at night; has the latest and updated devices and is invisible to any regular web-user

They help security agencies solve cyber crime-related cases

Criminal gangs that work out of foreign nations are well connected in the dark web which is accessible by the ethical hackers

The police cracks crimes on social networking sites like facebook, email related frauds, etc. But ethical hackers handle crimes happening using dark web.

They have immense knowledge about the Onion Router and with sophisticated expensive equipments, they help stop cyber crimes

25

Contd….

An ethical hacker once helped a multinational bank crack down a hacker who gained access to their server to steal data. The white hat hacker and his group took the issue to the international war room for internet which had experts from all over the world. This helped them track the identity of the hacker immediately and stopped the crime.

A white hat hacker also help find the culprit who hacked AIADMK website last year.

Thank You!