SlideShare une entreprise Scribd logo
1  sur  20
By :– Vinmit Patel
Information
Security
Introduction
Information security is the practice of
defending information from unauthorized
access, use, disclosure, disruption,
modification, perusal, inspection,
recording or destruction.
Intelligence
Knowledge
Informatio
n
Data
Richard’s Law Of Computer Security
Either don’t buy a computer system
and if you are buying a computer
system don’t turn it on.
Basic Principle of Security
 C - Confidentiality
 I - Integrity
 A - Availability
Confidentiality
Confidentiality refers to preventing the disclosure of
information to unauthorized individuals or systems.
Integrity
In information security, data integrity means
maintaining and assuring the accuracy and consistency
of data over its entire life-cycle.
Availability
For any information system to serve its purpose, the
information must be available when it is needed.
• Authentication
• Authorization
Confidentiality
• Accountability
Integrity
Cryptography
It is an art of secret writing in which
plain text is converted into cipher
text(not readable) by using
mathematical induction process
Types of Cryptography
On the basis of Cipher text
1. stream line cipher
2. Block (chunk)cipher
On the basis of Secret Key
1. Single key Cryptography Standard
2. Public key Cryptography Standard
Steganography
To hide an information behind an
image is called steganography
This technique was used in 26/11
attack
Ethical Hacking
Introduction
Hacking is neither legal nor illegal it is just a
concept to bypass a security mechanism of any
system , server or any network with
authentication and authorization or without
authentication and authorization.
Types Of Hacker
1. White hat/ Ethical hackers
2. Black hat hackers/ Crackers
3. Grey hat hackers
4. Blue hat hackers
Additional category
1. Neophyte
2. Hacktivist
3. Elite hacker
4. Script kiddie
White hat / Ethical hacker
• If someone is bypassing security or breaching
security with authentication and authorization is
called ethical hacker
• A white hat hacker breaks security for non-
malicious reasons, perhaps to test their own
security system or while working for a security
company which makes security software. The
term "white hat" in Internet slang refers to an
ethical hacker.
Black hat hacker
A "black hat" hacker is a hacker who "violates computer
security for little reason beyond maliciousness or for
personal gain"
They choose their targets using a two-pronged process
known as the "pre-hacking stage".
Blue hat hacker
A blue hat hacker is someone outside computer
security consulting firms who is used to bug test a
system prior to its launch, looking for exploits so
they can be closed. Microsoft also uses the term
Blue Hat to represent a series of security briefing
events.
Grey hat hacker
A grey hat hacker is a combination of a Black Hat
and a White Hat Hacker. A Grey Hat Hacker may
surf the internet and hack into a computer system
for the sole purpose of notifying the administrator
that their system has been hacked, for example.
Then they may offer to repair their system for a
small fee.[
Basic Techniques
Vulnerability scanner
Password cracking
Packet sniffer
Spoofing attack
Rootkit
Social engineering
Trojan horses
Viruses
Worms
Key loggers
Thank You

Contenu connexe

Tendances

Etical hacking
Etical hackingEtical hacking
Etical hacking
talhaabid
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Manas Das
 

Tendances (20)

Ethical hacking for information security
Ethical hacking for information securityEthical hacking for information security
Ethical hacking for information security
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
Basic penetration testing & Ethical Hacking 2nd module
Basic penetration testing & Ethical Hacking 2nd module Basic penetration testing & Ethical Hacking 2nd module
Basic penetration testing & Ethical Hacking 2nd module
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Etical hacking
Etical hackingEtical hacking
Etical hacking
 
Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking Presentation
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Cehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackingCehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking course
Ethical hacking courseEthical hacking course
Ethical hacking course
 
Hacking
HackingHacking
Hacking
 

Similaire à Information security

Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
Dharmesh Makwana
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId
 
Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Ethical hacking11601031 (1)
Ethical hacking11601031 (1)
Mohammad Affan
 
1 introit security
1 introit security1 introit security
1 introit security
richarddxd
 

Similaire à Information security (20)

Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Ethical hacking11601031 (1)
Ethical hacking11601031 (1)
 
Introduction of ethical hacking.........
Introduction of ethical hacking.........Introduction of ethical hacking.........
Introduction of ethical hacking.........
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
computer network and security.pptx
computer network and security.pptxcomputer network and security.pptx
computer network and security.pptx
 
BASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGBASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKING
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)
 
introduction of ethical hacking. ppt
introduction of ethical hacking. pptintroduction of ethical hacking. ppt
introduction of ethical hacking. ppt
 
1 introit security
1 introit security1 introit security
1 introit security
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical Hacking
 

Dernier

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Dernier (20)

Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 

Information security

  • 3. Introduction Information security is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.
  • 5. Richard’s Law Of Computer Security Either don’t buy a computer system and if you are buying a computer system don’t turn it on.
  • 6. Basic Principle of Security  C - Confidentiality  I - Integrity  A - Availability
  • 7. Confidentiality Confidentiality refers to preventing the disclosure of information to unauthorized individuals or systems. Integrity In information security, data integrity means maintaining and assuring the accuracy and consistency of data over its entire life-cycle. Availability For any information system to serve its purpose, the information must be available when it is needed.
  • 9. Cryptography It is an art of secret writing in which plain text is converted into cipher text(not readable) by using mathematical induction process
  • 10. Types of Cryptography On the basis of Cipher text 1. stream line cipher 2. Block (chunk)cipher On the basis of Secret Key 1. Single key Cryptography Standard 2. Public key Cryptography Standard
  • 11. Steganography To hide an information behind an image is called steganography This technique was used in 26/11 attack
  • 13. Introduction Hacking is neither legal nor illegal it is just a concept to bypass a security mechanism of any system , server or any network with authentication and authorization or without authentication and authorization.
  • 14. Types Of Hacker 1. White hat/ Ethical hackers 2. Black hat hackers/ Crackers 3. Grey hat hackers 4. Blue hat hackers Additional category 1. Neophyte 2. Hacktivist 3. Elite hacker 4. Script kiddie
  • 15. White hat / Ethical hacker • If someone is bypassing security or breaching security with authentication and authorization is called ethical hacker • A white hat hacker breaks security for non- malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker.
  • 16. Black hat hacker A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" They choose their targets using a two-pronged process known as the "pre-hacking stage".
  • 17. Blue hat hacker A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term Blue Hat to represent a series of security briefing events.
  • 18. Grey hat hacker A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked, for example. Then they may offer to repair their system for a small fee.[
  • 19. Basic Techniques Vulnerability scanner Password cracking Packet sniffer Spoofing attack Rootkit Social engineering Trojan horses Viruses Worms Key loggers