SlideShare une entreprise Scribd logo
1  sur  18
National Information Security Education & Awareness program Linux User Group of BIT Mesra Sponsored by www.thehackbook.com Introduction To Ethical Hacking  By Neel kamal
 Hacker
 What is Hacking Hacking is the art of finding a solution to real life problems
 Who is Hacker Hackers are developers. Hackers are those geeks and scientists who provide IT solutions to real life problems. Hackers think beyond the boundaris e.g : Newton , Einstein , J.C Bose
                   Examples Social Networking site for plants. Sending sms to smart phone whenever a  post man delivers the letter in the letter box. Sending sms to near & dear ones whenever you reach the destination.
                   Hackers Development of Science   <><>  Hackers
                Misconception What about those who break into systems? Are they hacker? The answer is no.
 Who is Responsible for   misconception Media  is the root cause of all this misconception. Lack of Awareness among common students and people.
                      Cracker One who breaks into systems illegally are crackers. They are bad guys or gals
 Case studies (Mumbai India) Lady living in one-room apartment. Lady had the habit of chatting  on internet with strangers. An attacker from Russia installed Trojan in her system. With the help of Trojan he switched her web camera on. And make it live on internet and invaded her privacy.
            case studies cont. It continued for 3-4 months. When she went for job interview she her boss immediately exclaimed that she would definitely get the job as he enjoyed her on pornographic website on a regular basis. The attacker was never caught
   Impacts Privacy Invasion Harassment and mental torture The lady almost became paranoid and never want to use internet again.
            Hacker vs Cracker ,[object Object],        Lots of knowledge        Good Guy        Strong Ethics        Helps in catching cyber criminals
Hacker vs Cracker Qualities of cracker      Lots of knowledge      Bad ethics      Cyber criminals
    Skills of Hacker Learn Programming languages ( C, C++) Learn scripting languages ( JSP, Python, PHP ) Good knowledge of database and query languages (SQL, YQL, FQL, etc) Learn Networking (TCP/IP) Learn to work in Unix Start playing with web api’s
 Options for 12th students ,[object Object]
Should not go for CEH or certification  courses in Ethical Hacking and penetration Testing ,[object Object]
 Thank You   The End

Contenu connexe

Tendances

Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
Umang Patel
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
Dharmesh Makwana
 

Tendances (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Hacking
HackingHacking
Hacking
 
the best hacking ppt
the best hacking pptthe best hacking ppt
the best hacking ppt
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
basic knowhow hacking
basic knowhow hackingbasic knowhow hacking
basic knowhow hacking
 
185
185185
185
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
The History of Hacking in 5minutes (for dummie)
The History of Hacking in 5minutes (for dummie)The History of Hacking in 5minutes (for dummie)
The History of Hacking in 5minutes (for dummie)
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 

En vedette

Presentation for public awareness
Presentation for public awarenessPresentation for public awareness
Presentation for public awareness
drmcbansal
 
Disaster management ppt
Disaster management pptDisaster management ppt
Disaster management ppt
Aniket Pingale
 

En vedette (10)

ENT Surgeon in Mumbai | ENT Treatment in India
ENT Surgeon in Mumbai | ENT Treatment in IndiaENT Surgeon in Mumbai | ENT Treatment in India
ENT Surgeon in Mumbai | ENT Treatment in India
 
Standards: awareness, information, education
Standards: awareness, information, educationStandards: awareness, information, education
Standards: awareness, information, education
 
Human Impact on Information Security - Computer Society of India Conference, ...
Human Impact on Information Security - Computer Society of India Conference, ...Human Impact on Information Security - Computer Society of India Conference, ...
Human Impact on Information Security - Computer Society of India Conference, ...
 
Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04
 
Slp Ethics
Slp EthicsSlp Ethics
Slp Ethics
 
Building Community with PR
Building Community with PRBuilding Community with PR
Building Community with PR
 
Five Golden Rules
Five  Golden  RulesFive  Golden  Rules
Five Golden Rules
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Presentation for public awareness
Presentation for public awarenessPresentation for public awareness
Presentation for public awareness
 
Disaster management ppt
Disaster management pptDisaster management ppt
Disaster management ppt
 

Similaire à National information security education & awareness program

Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
Arifa Ali
 

Similaire à National information security education & awareness program (20)

Hacking
HackingHacking
Hacking
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
 
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
 
Ethics
EthicsEthics
Ethics
 
Ethics
EthicsEthics
Ethics
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Evolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptxEvolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptx
 
Hacking
HackingHacking
Hacking
 
CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptxCYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Cyber Essays
Cyber EssaysCyber Essays
Cyber Essays
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Ethical hacking Book Review
Ethical hacking Book ReviewEthical hacking Book Review
Ethical hacking Book Review
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Unit 2
Unit 2Unit 2
Unit 2
 

Dernier

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Dernier (20)

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 

National information security education & awareness program

  • 1. National Information Security Education & Awareness program Linux User Group of BIT Mesra Sponsored by www.thehackbook.com Introduction To Ethical Hacking By Neel kamal
  • 3. What is Hacking Hacking is the art of finding a solution to real life problems
  • 4. Who is Hacker Hackers are developers. Hackers are those geeks and scientists who provide IT solutions to real life problems. Hackers think beyond the boundaris e.g : Newton , Einstein , J.C Bose
  • 5. Examples Social Networking site for plants. Sending sms to smart phone whenever a post man delivers the letter in the letter box. Sending sms to near & dear ones whenever you reach the destination.
  • 6. Hackers Development of Science <><> Hackers
  • 7. Misconception What about those who break into systems? Are they hacker? The answer is no.
  • 8. Who is Responsible for misconception Media  is the root cause of all this misconception. Lack of Awareness among common students and people.
  • 9. Cracker One who breaks into systems illegally are crackers. They are bad guys or gals
  • 10. Case studies (Mumbai India) Lady living in one-room apartment. Lady had the habit of chatting on internet with strangers. An attacker from Russia installed Trojan in her system. With the help of Trojan he switched her web camera on. And make it live on internet and invaded her privacy.
  • 11. case studies cont. It continued for 3-4 months. When she went for job interview she her boss immediately exclaimed that she would definitely get the job as he enjoyed her on pornographic website on a regular basis. The attacker was never caught
  • 12. Impacts Privacy Invasion Harassment and mental torture The lady almost became paranoid and never want to use internet again.
  • 13.
  • 14. Hacker vs Cracker Qualities of cracker Lots of knowledge Bad ethics Cyber criminals
  • 15. Skills of Hacker Learn Programming languages ( C, C++) Learn scripting languages ( JSP, Python, PHP ) Good knowledge of database and query languages (SQL, YQL, FQL, etc) Learn Networking (TCP/IP) Learn to work in Unix Start playing with web api’s
  • 16.
  • 17.
  • 18. Thank You The End

Notes de l'éditeur

  1. Ankit