X

Download A ETHICAL HACKING PowerPoint Presentation


Login   OR  Register
X

Share page



  Preview

               
Home / Computers & Web / Computers & Web Presentations / A ETHICAL HACKING PowerPoint Presentation

A ETHICAL HACKING PowerPoint Presentation

worldwideweb By : worldwideweb

On : Aug 07, 2014

In : Computers & Web

Embed :
846
views

3
downloads
Login / Signup - with account for


  • → Make favorite
  • → Flag as inappropriate
  • → Download Presentation
  • → Share Presentation
  • Slide 1 - ETHICAL HACKING A LICENCE TO HACK
  • Slide 2 - INTRODUCTION Ethical hacking- also known as penetration testing or intrusion testing or red teaming has become a major concern for businesses and governments. Companies are worried about the possibility of being “hacked” and potential customers are worried about maintaining control of personal information. Necessity of computer security professionals to break into the systems of the organisation.
  • Slide 3 - Ethical hackers employ the same tools and techniques as the intruders. They neither damage the target systems nor steal information. The tool is not an automated hacker program rather it is an audit that both identifies the vulnerabilities of a system and provide advice on how to eliminate them. INTRODUCTION
  • Slide 4 - PLANNING THE TEST Aspects that should be focused on: Who should perform penetration testing? How often the tests have to be conducted? What are the methods of measuring and communicating the results? What if something unexpected happens during the test and brings the whole system down? What are the organization's security policies?
  • Slide 5 - The minimum security policies that an organization should posses Information policy Security policy Computer use User management System administration procedures Incident response procedures Configuration management Design methodology Disaster methodology Disaster recovery plans.
  • Slide 6 - Ethical hacking- a dynamic process Running through the penetration test once gives the current set of security issues which subject to change. Penetration testing must be continuous to ensure that system movements and newly installed applications do not introduce new vulnerabilities into the system.
  • Slide 7 - Who are ethical hackers The skills ethical hackers should posses They must be completely trustworthy. Should have very strong programming and computer networking skills and have been in networking field for several years.
  • Slide 8 - Should have more patience. Continuous updating of the knowledge on computer and network security is required. They should know the techniques of the criminals, how their activities might be detected and how to stop them. Who are ethical hackers
  • Slide 9 - Choice of an ethical hacker An independent external agency. black box testing. An expertise with in your own organization. white box testing.
  • Slide 10 - AREAS TO BE TESTED Application servers Firewalls and security devices Network security Wireless security
  • Slide 11 - Red Team-Multilayered Assessment Various areas of security are evaluated using a multilayered approach. Each area of security defines how the target will be assessed. An identified vulnerability at one layer may be protected at another layer minimizing the associated risk of the vulnerability.
  • Slide 12 - Information security (INFOSEC)- A revolving process
  • Slide 13 - ppt slide no 13 content not found
  • Slide 14 - Attacks on Websites:- Denial of service attack Some hackers hack your websites just because they can. They try to do something spectacular to exhibit their talents. Their comes the denial of service attack. During the attacks, customers were unable to reach the websites, resulting in loss of revenue and “mind share”. On January 17, 2000, a U.S. library of congress website was attacked.
  • Slide 15 - ppt slide no 15 content not found
  • Slide 16 - ppt slide no 16 content not found
  • Slide 17 - The ethical hack itself Testing itself poses some risk to the client. Criminal hacker monitoring the transmissions of ethical hacker could trap the information. Best approach is to maintain several addresses around the internet from which ethical hackers originate. Additional intrusion monitoring software can be deployed at the target.
  • Slide 18 - IBM’S Immune system for Cyber space Any of the following combination may be used Remote network. Remote dial-up network. Local network. Stolen laptop computer. Social engineering. Physical entry.
  • Slide 19 - ppt slide no 19 content not found
  • Slide 20 - Competitive Intelligence A systematic and ethical program for maintaining external information that can affect your company’s plans. It is legal collection and analysis of information regarding the vulnerabilities of the business partners. The same information used to aid a company can be used to compete with the company. The way to protect the information is to be aware of how it may be used.
  • Slide 21 - Information Security Goals Improve IS awareness. Assess risk. Mitigate risk immediately. Assist in the decision making process. Conduct drills on emergency response procedures.
  • Slide 22 - Conclusions Never underestimate the attacker or overestimate our existing posture. A company may be target not just for its information but potentially for its various transactions. To protect against an attack, understanding where the systems are vulnerable is necessary. Ethical hacking helps companies first comprehend their risk and then, manage them.
  • Slide 23 - Always security professionals are one step behind the hackers and crackers. Plan for the unplanned attacks. The role of ethical hacking in security is to provide customers with awareness of how they could be attacked and why they are targeted. “Security though a pain”, is necessary. Conclusions
  • Slide 24 - References 1.www.javvin.com 2.www.computerworld.com 3.www.research.ibm.com/journals 4.www.howstuffworks.com 5.”Information Technology” journal,september,august 2005,published by EFY. 6.IEEE journal on" security and privacy”
  • Slide 25 - Queries?
Parents Free PowerPoint Template

Parents

Views : 409

Herbal Pills Free PowerPoint Template

Herbal Pills

Views : 573

Light Abstract Free PowerPoint Template

Light Abstract

Views : 835

Injecting Free PowerPoint Template

Injecting

Views : 428

Blue Abstract Free PowerPoint Template

Blue Abstract

Views : 743

Agriculture Free PowerPoint Template

Agriculture

Views : 889

Rose Free PowerPoint Template

Rose

Views : 646

Room Interior Free PowerPoint Template

Room Interior

Views : 452

Interior Free PowerPoint Template

Interior

Views : 519

Ice Hockey Free PowerPoint Template

Ice Hockey

Views : 1189

Bales Free PowerPoint Template

Bales

Views : 480

Doctor Free PowerPoint Template

Doctor

Views : 423

Koli Bacteria Free PowerPoint Template

Koli Bacteria

Views : 1324

Maple Leaf Free PowerPoint Template

Maple Leaf

Views : 472

Happy Birthday Free PowerPoint Template

Happy Birthday

Views : 581

Male Female Free PowerPoint Template

Male Female

Views : 557

Gerbera Free PowerPoint Template

Gerbera

Views : 322

Barbell Free PowerPoint Template

Barbell

Views : 542

Domino Free PowerPoint Template

Domino

Views : 564

Law Rules Free PowerPoint Template

Law Rules

Views : 1824

Description : Available A ETHICAL HACKING powerpoint presentation for free download which is uploaded by steve an active user in belonging ppt presentation Computers & Web category.

Tags : ethical hacking | network security | hacking | online hacking | web hacking | online crime | bullying

Shortcode : Get Shareable link