Cyber Crime and Ethical Hacking

19
POWERPOINT PRESENTATION

Transcript of Cyber Crime and Ethical Hacking

Page 1: Cyber Crime and Ethical Hacking

POWERPOINT PRESENTATION

Page 2: Cyber Crime and Ethical Hacking

TOPIC: CYBER CRIME AND ETHICAL HACKING

Presented By:

oANKIT KUMAR o ([email protected])

o (www.facebook.com/Ankitkumar108)

Page 3: Cyber Crime and Ethical Hacking

Content Overview: Definitions (Cyber Crime & Ethical Hacking)

Cyber Crime (History & Category)

Facts related to Cyber Crime

Some Alarming Facts of Cyber Crime

Cyber Crime in form of Hacking

Process involved in Hacking

Type of Hackers

Some of world’s most famous Hackers

Ethical Hacking

Ethical Hacking process

Advantage and Disadvantage

What to do if a Computer is Hacked

Security Tips

Our Conclusion and Suggestion

Page 4: Cyber Crime and Ethical Hacking

Definitions:

CYBER CRIME:

Crime committed using a

computer and the

internet to steal a

person’s identity or

illegal imports or

malicious programs.

Cybercrime is nothing

but where the computer

used as an object or

subject of crime.

ETHICAL HACKING

A type of hacking in which hacker systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit.

Page 5: Cyber Crime and Ethical Hacking

Cyber Crime:

History:

The first recorded cyber

crime took place in the year

1820.

The first spam email took

place in 1978 when it was

sent over the Arpanet.

The first Virus was installed

on an Apple Computer in

1982.

Category:

HACKING

CHILD PORNOGRAPHY

DENIAL OF SERVICE

ATTACK

VIRUS DISSEMINITION

COMPUTER VANDALISM

CYBER TERRORISM

SOFTWARE PIRACY

Page 6: Cyber Crime and Ethical Hacking

Facts related to Cyber Crime:

Types of Cyber attacks (By %age):

Financial fraud: 11%

Sabotage of data/networks: 17%

Theft of proprietary information: 20%

System penetration from the outside: 25%

Denial of service: 27%

Unauthorized access by insiders: 71%

Employee abuse of internet privileges: 79%

Viruses: 85%

A Report of ASSOCHAM:

Page 7: Cyber Crime and Ethical Hacking

These Facts Are Alarming !!!

Page 8: Cyber Crime and Ethical Hacking

Cyber Crimes in form of HACKING:

Hacking:

The Process of

attempting to gain or

successfully

gaining, unauthorized

access to computer

resources is called

Hacking.

.

Hacking Growth Rate:

Page 9: Cyber Crime and Ethical Hacking

Processes involved in Hacking:

Page 10: Cyber Crime and Ethical Hacking

Type of Hackers:

Black Hat: Violates computer security

for little reason beyond

maliciousness or for

personal gain.

White Hat: Breaks security for non-

malicious reasons.

Grey Hat: Hacker lies between a black

hat and a white hat hacker.

Page 11: Cyber Crime and Ethical Hacking

Some of world’s most famous Hackers: EDWARD SNOWDEN:

( Hacked and leaked classified

information from the U.S.

National Security Agency in

2013. Most Wanted Criminal

declared by FBI.)

ANKIT FADIA:

(A well known Ethic Hacker.

Wrote his first book on

hacking at age of 14.Till now

he has written more than 21

books.)

JONATHAN JAMES:

(Also known as C0mrade on the

Internet. At age of 15, he hacked

a number of networks, including

those belonging to Bell South,

Miami-Dade, U.S. Defense, and

NASA. Committed suicide in

2008.)

JULIAN ASSANGE:

(Founder and CEO of

WikiLeaks, An organisation of

hackers known for their hacking

techniques to steel classified

datas of govt. officials.)

KEVIN MITNICK:

(U.S. Department of Justice

called him the “most wanted

computer criminal in U.S.

history.” His story is so wild that

it was the basis for two featured

films.)

ALBERT GONZALEZ:

(He paved his way to Internet

fame when he collected over 170

million credit card and ATM

card numbers over a period of 2

years. Yep. That’s equal to a

little over half the population of

the United States.)

Page 12: Cyber Crime and Ethical Hacking

Ethical Hacking: Working Principle:

“TO CATCH A THIEF ,

THINK LIKE A THIEF…….”

Programmer v/s Hacker:

Page 13: Cyber Crime and Ethical Hacking

Ethical Hacking Process:

Executing Plans

Evaluating Results

Formulating Plans

Page 14: Cyber Crime and Ethical Hacking

Advantage & Disadvantage:

Advantages: Prevents website defacements.

An evolving technique, advancing day by day.

Helps in finding and removing loopholes in cyber security.

Can be used to recover lost information where the computer password has been lost.

Teaches you that no technology is 100% secure.

To test how good security is on your own network.

They call it white hat computer hacking.

Disadvantages: All depends upon the

trustworthiness of the ethical

hacker.

Hiring professionals is expensive.

He / She may betray you.

Criminals can use it to their

advantage.

It can harm someone's privacy

It's Illegal

Page 15: Cyber Crime and Ethical Hacking

What to do if a Computer is Hacked ???

Shutdown or turn off the Computer .

Separate the System from the Network.

Restore the System with Backup, or Re-install all the

programs.

Restart the System, connect it with Network and again

Restart it.

Now Computer is Ready to use.

Page 16: Cyber Crime and Ethical Hacking

Security Tips: Use antivirus software’s.

Insert firewalls.

Uninstall unnecessary software.

Maintain backup.

Check security settings and TURN ON Updates.

Stay anonymous - choose a genderless screen name.

Never give your full name or address to strangers.

Learn ‘Etiquette' - follow it and expect it from others.

Don't respond to harassing or negative messages (flames).

Get out of uncomfortable or hostile situations quickly.

Save offending messages.

Learn more about Internet privacy.

Page 17: Cyber Crime and Ethical Hacking

Our Conclusion and Suggestion:

Remember, a Computer is 100% safe only when it is Turned Off.

The Technology is getting advanced day by day.

If you are a System administrator, you should have at least basic knowledge about Tricks

and Techniques related to Computer and Cyber security.

Keep yourself updated from all Cyber related news.

Technology is like a fish. The longer it stays on the shelf, the less desirable it becomes.

Technology is destructive only in the hands of people who do not realize that they are

one and the same process as the universe : (ALLAN WATTS).

Page 18: Cyber Crime and Ethical Hacking

Any Questions ????

Page 19: Cyber Crime and Ethical Hacking

THANK YOU !!!!!