Cyber Crime and Ethical Hacking
-
Upload
ankit-kumar -
Category
Education
-
view
282 -
download
0
Transcript of Cyber Crime and Ethical Hacking
POWERPOINT PRESENTATION
TOPIC: CYBER CRIME AND ETHICAL HACKING
Presented By:
oANKIT KUMAR o ([email protected])
o (www.facebook.com/Ankitkumar108)
Content Overview: Definitions (Cyber Crime & Ethical Hacking)
Cyber Crime (History & Category)
Facts related to Cyber Crime
Some Alarming Facts of Cyber Crime
Cyber Crime in form of Hacking
Process involved in Hacking
Type of Hackers
Some of world’s most famous Hackers
Ethical Hacking
Ethical Hacking process
Advantage and Disadvantage
What to do if a Computer is Hacked
Security Tips
Our Conclusion and Suggestion
Definitions:
CYBER CRIME:
Crime committed using a
computer and the
internet to steal a
person’s identity or
illegal imports or
malicious programs.
Cybercrime is nothing
but where the computer
used as an object or
subject of crime.
ETHICAL HACKING
A type of hacking in which hacker systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit.
Cyber Crime:
History:
The first recorded cyber
crime took place in the year
1820.
The first spam email took
place in 1978 when it was
sent over the Arpanet.
The first Virus was installed
on an Apple Computer in
1982.
Category:
HACKING
CHILD PORNOGRAPHY
DENIAL OF SERVICE
ATTACK
VIRUS DISSEMINITION
COMPUTER VANDALISM
CYBER TERRORISM
SOFTWARE PIRACY
Facts related to Cyber Crime:
Types of Cyber attacks (By %age):
Financial fraud: 11%
Sabotage of data/networks: 17%
Theft of proprietary information: 20%
System penetration from the outside: 25%
Denial of service: 27%
Unauthorized access by insiders: 71%
Employee abuse of internet privileges: 79%
Viruses: 85%
A Report of ASSOCHAM:
These Facts Are Alarming !!!
Cyber Crimes in form of HACKING:
Hacking:
The Process of
attempting to gain or
successfully
gaining, unauthorized
access to computer
resources is called
Hacking.
.
Hacking Growth Rate:
Processes involved in Hacking:
Type of Hackers:
Black Hat: Violates computer security
for little reason beyond
maliciousness or for
personal gain.
White Hat: Breaks security for non-
malicious reasons.
Grey Hat: Hacker lies between a black
hat and a white hat hacker.
Some of world’s most famous Hackers: EDWARD SNOWDEN:
( Hacked and leaked classified
information from the U.S.
National Security Agency in
2013. Most Wanted Criminal
declared by FBI.)
ANKIT FADIA:
(A well known Ethic Hacker.
Wrote his first book on
hacking at age of 14.Till now
he has written more than 21
books.)
JONATHAN JAMES:
(Also known as C0mrade on the
Internet. At age of 15, he hacked
a number of networks, including
those belonging to Bell South,
Miami-Dade, U.S. Defense, and
NASA. Committed suicide in
2008.)
JULIAN ASSANGE:
(Founder and CEO of
WikiLeaks, An organisation of
hackers known for their hacking
techniques to steel classified
datas of govt. officials.)
KEVIN MITNICK:
(U.S. Department of Justice
called him the “most wanted
computer criminal in U.S.
history.” His story is so wild that
it was the basis for two featured
films.)
ALBERT GONZALEZ:
(He paved his way to Internet
fame when he collected over 170
million credit card and ATM
card numbers over a period of 2
years. Yep. That’s equal to a
little over half the population of
the United States.)
Ethical Hacking: Working Principle:
“TO CATCH A THIEF ,
THINK LIKE A THIEF…….”
Programmer v/s Hacker:
Ethical Hacking Process:
Executing Plans
Evaluating Results
Formulating Plans
Advantage & Disadvantage:
Advantages: Prevents website defacements.
An evolving technique, advancing day by day.
Helps in finding and removing loopholes in cyber security.
Can be used to recover lost information where the computer password has been lost.
Teaches you that no technology is 100% secure.
To test how good security is on your own network.
They call it white hat computer hacking.
Disadvantages: All depends upon the
trustworthiness of the ethical
hacker.
Hiring professionals is expensive.
He / She may betray you.
Criminals can use it to their
advantage.
It can harm someone's privacy
It's Illegal
What to do if a Computer is Hacked ???
Shutdown or turn off the Computer .
Separate the System from the Network.
Restore the System with Backup, or Re-install all the
programs.
Restart the System, connect it with Network and again
Restart it.
Now Computer is Ready to use.
Security Tips: Use antivirus software’s.
Insert firewalls.
Uninstall unnecessary software.
Maintain backup.
Check security settings and TURN ON Updates.
Stay anonymous - choose a genderless screen name.
Never give your full name or address to strangers.
Learn ‘Etiquette' - follow it and expect it from others.
Don't respond to harassing or negative messages (flames).
Get out of uncomfortable or hostile situations quickly.
Save offending messages.
Learn more about Internet privacy.
Our Conclusion and Suggestion:
Remember, a Computer is 100% safe only when it is Turned Off.
The Technology is getting advanced day by day.
If you are a System administrator, you should have at least basic knowledge about Tricks
and Techniques related to Computer and Cyber security.
Keep yourself updated from all Cyber related news.
Technology is like a fish. The longer it stays on the shelf, the less desirable it becomes.
Technology is destructive only in the hands of people who do not realize that they are
one and the same process as the universe : (ALLAN WATTS).
Any Questions ????
THANK YOU !!!!!