Hacking ppt

Views:
 
Category: Education
     
 

Presentation Description

No description available.

Comments

Presentation Transcript

How secure are you……? : 

How secure are you……?

Agenda: 

Agenda What is Information Security and Ethical Hacking Career options in Information Security and Ethical Hacking

Did you know: 

Did you know In 1980 a computer cracked a 3-character password within one minute. In 1999 a team of computers cracked a 56-character password within one day. In 2004 a computer virus infected 1 million computers within one hour .

What is Ethical Hacking: 

What is Ethical Hacking Ethical hacking, often performed by white hats or skilled computer experts, is the use of programming skills to determine vulnerabilities in computer systems. While the non-ethical hacker or black hat exploits these vulnerabilities for mischief, personal gain or other reasons, the ethical hacker evaluates them, points them out, and may suggest changes to systems that make them less likely to be penetrated by black hats.

Types of Hackers: 

Types of Hackers Black Hat Hackers Gray Hat Hackers White Hat Hackers

Types of Hacking : 

Types of Hacking Website Hacking Email Hacking Network Hacking Password Hacking Online banking Hacking Computer Hacking

Malwares: 

Malwares Virus and Worms Logic Bombs Spywares Trojan Horse Bots

Protect yourself from Malwares: 

Protect yourself from Malwares Antivirus software and keep it upto date Email attachment should be scanned Download files should be scanned External drives should be scanned Security patches should be applied Symptoms of virus infection must not be overlooked

Hacking Attacks : 

Hacking Attacks Social Engineering Attack Impersonation Shoulder surfing Popup windows Phishing Fake pages Email Scams DOS Attack (Denial of Service)

Fake GMAIL Page: 

Fake GMAIL Page

Phishing Email - Example: 

Phishing Email - Example

Phishing Email - Example: 

Phishing Email - Example

Phishing Email - Example: 

Phishing Email - Example

Nigerian Phishing Email Scam: 

Nigerian Phishing Email Scam

Offer Letter Fraud: 

Offer Letter Fraud

A World of Opportunities: 

A World of Opportunities The Asia-Pacific region is anticipated to account for the majority of Information security solutions market by 2012. In this world of Opportunities you will see almost every sector emphasizing on information Security . Banking Sector Aviation Industry Corporate Sector Educational Institutions Government Sector Cyber Crime Investigation cells Global Security agencies Information system Security association National Information Security Testing, Evaluation and certification centres

Career options that you have: 

Career options that you have Cyber Security Professional Information Security Professional IS Executive Information System Auditor Security Advisors Software Developers IT Specialists IT System Executives IT Consultants Junior Programmer Assistant Software Engineer R&D Executive Security Consultant System Engineer Network Engineer … and many more

What do we do?: 

What do we do? Education Online Reputation Management Fraud Investigations Reference checks Antivirus solutions Network Penetration Testing

PowerPoint Presentation: 

Building your future Accelerating your career growth contact@technopundits.in 9176391048