This presentation will give a brief idea about information security and ethical hacking. It also shows the need of security now-a-days where cyber crime is increasing day-by-day.
3. Introduction
Information security is the practice of
defending information from unauthorized
access, use, disclosure, disruption,
modification, perusal, inspection,
recording or destruction.
5. Richard’s Law Of Computer Security
Either don’t buy a computer system
and if you are buying a computer
system don’t turn it on.
6. Basic Principle of Security
C - Confidentiality
I - Integrity
A - Availability
7. Confidentiality
Confidentiality refers to preventing the disclosure of
information to unauthorized individuals or systems.
Integrity
In information security, data integrity means
maintaining and assuring the accuracy and consistency
of data over its entire life-cycle.
Availability
For any information system to serve its purpose, the
information must be available when it is needed.
9. Cryptography
It is an art of secret writing in which
plain text is converted into cipher
text(not readable) by using
mathematical induction process
10. Types of Cryptography
On the basis of Cipher text
1. stream line cipher
2. Block (chunk)cipher
On the basis of Secret Key
1. Single key Cryptography Standard
2. Public key Cryptography Standard
11. Steganography
To hide an information behind an
image is called steganography
This technique was used in 26/11
attack
13. Introduction
Hacking is neither legal nor illegal it is just a
concept to bypass a security mechanism of any
system , server or any network with
authentication and authorization or without
authentication and authorization.
14. Types Of Hacker
1. White hat/ Ethical hackers
2. Black hat hackers/ Crackers
3. Grey hat hackers
4. Blue hat hackers
Additional category
1. Neophyte
2. Hacktivist
3. Elite hacker
4. Script kiddie
15. White hat / Ethical hacker
• If someone is bypassing security or breaching
security with authentication and authorization is
called ethical hacker
• A white hat hacker breaks security for non-
malicious reasons, perhaps to test their own
security system or while working for a security
company which makes security software. The
term "white hat" in Internet slang refers to an
ethical hacker.
16. Black hat hacker
A "black hat" hacker is a hacker who "violates computer
security for little reason beyond maliciousness or for
personal gain"
They choose their targets using a two-pronged process
known as the "pre-hacking stage".
17. Blue hat hacker
A blue hat hacker is someone outside computer
security consulting firms who is used to bug test a
system prior to its launch, looking for exploits so
they can be closed. Microsoft also uses the term
Blue Hat to represent a series of security briefing
events.
18. Grey hat hacker
A grey hat hacker is a combination of a Black Hat
and a White Hat Hacker. A Grey Hat Hacker may
surf the internet and hack into a computer system
for the sole purpose of notifying the administrator
that their system has been hacked, for example.
Then they may offer to repair their system for a
small fee.[