1 / 14

INFORMATION SECURITY & ETHICAL HACKING

INFORMATION SECURITY & ETHICAL HACKING. - Jophine Pranjal Antony. Information Security. Securing valuable information stored as soft copy is called information security. Types: Data Security Computer Security LAN Security Internet Security. What is hacking?.

pakuna
Download Presentation

INFORMATION SECURITY & ETHICAL HACKING

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. INFORMATION SECURITY & ETHICAL HACKING - JophinePranjalAntony

  2. Information Security Securing valuable information stored as soft copy is called information security. Types: • Data Security • Computer Security • LAN Security • Internet Security

  3. What is hacking? Unauthorized use or attempts to circumvent or bypass the security mechanism of an information system like a computer / server / network. HACKED!!!

  4. Basic Threats • Theft of password • email based threats • Launch of malicious programs (Trojans) Be Careful...

  5. Concept of Hacking • White hat hacking (penetration testing) • Black hat hacking • Grey hat hacking Don’t get trapped

  6. Anatomy of Hacking • Either break username and password or • Bomb the server with exploits (weakness) Please!!! wake up

  7. SAM File Security Accounts Manager (SAM) %systemroot%\system32\config Passwords are not stored in SAM file rather than their hashes are. If you are logged in as administrator even then direct manipulation to this file is not possible. For authentication purpose the entered password is hashed and then compared.

  8. Virus & Worms • A VIRUS is a malicious piece of code which cause an unexpected, harmful and negative effect on the victim’s system. • A WORM is similar to a VIRUS, but has additional ability to reside in the memory of infected computer, duplicate itself & spreads copies of itself via email, chat or the network.

  9. Spyware & Trojan Horse • Spyware is a software which gathers information about the victim & passes on that information to the attacker, without even taking the victim’s consent. Tools: spy check, spyware info, spy stopper. • Trojan Horse is a piece of software which appears to perform a certain action but, in fact performs, another! • “It is an unauthorized program contained within a legitimate program. This performs function unknown by the user.”

  10. Key Logger • It is a spy software which monitors all keystrokes made on the victim’s computer. Types: • Hardware key logger • Software key logger. Prevention: • A typical key logger automatically loads itself into memory, each time the computer boots. • “So one should search all the start up files of the system and remove it if any suspicious file or application is found”.

  11. Password Cracking • Password guessing • Dictionary based attacks • Brute Force Attacks • Default Password • Social Engineering

  12. Tips for Strong Password • Don’t use personal information for password. • Don’t use words in dictionary including foreign languages. • Use combination of uppercase and lowercase letters, numbers and symbols. • Don’t substitute number for letters to make words. Eg. s0ph1st1cated • Use longer passwords. Cont…

  13. Tips for Strong Password • Don’t passwords that you see in security articles, even if they are exceptionally complex. • Select passwords which can only be understood by you. For others it should look like random combination of characters. Eg: mfc!rB&G (“my favorite colors (!) are Blue &Green”) • Select password which you can type faster.

  14. Thank You Courtesy: AppinHomeTech

More Related