logging in or signing up Hacking ppt technopundits Download Post to : URL : Related Presentations : Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Uploaded from authorPOINT lite Insert YouTube videos in PowerPont slides with aS Desktop Copy embed code: Embed: Flash iPad Dynamic Copy Does not support media & animations Automatically changes to Flash or non-Flash embed WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 647 Category: Education License: All Rights Reserved Like it (0) Dislike it (0) Added: February 02, 2013 This Presentation is Public Favorites: 0 Presentation Description No description available. Comments Posting comment... Premium member Presentation Transcript How secure are you……? : How secure are you……?Agenda: Agenda What is Information Security and Ethical Hacking Career options in Information Security and Ethical HackingDid you know: Did you know In 1980 a computer cracked a 3-character password within one minute. In 1999 a team of computers cracked a 56-character password within one day. In 2004 a computer virus infected 1 million computers within one hour .What is Ethical Hacking: What is Ethical Hacking Ethical hacking, often performed by white hats or skilled computer experts, is the use of programming skills to determine vulnerabilities in computer systems. While the non-ethical hacker or black hat exploits these vulnerabilities for mischief, personal gain or other reasons, the ethical hacker evaluates them, points them out, and may suggest changes to systems that make them less likely to be penetrated by black hats.Types of Hackers: Types of Hackers Black Hat Hackers Gray Hat Hackers White Hat HackersTypes of Hacking : Types of Hacking Website Hacking Email Hacking Network Hacking Password Hacking Online banking Hacking Computer HackingMalwares: Malwares Virus and Worms Logic Bombs Spywares Trojan Horse BotsProtect yourself from Malwares: Protect yourself from Malwares Antivirus software and keep it upto date Email attachment should be scanned Download files should be scanned External drives should be scanned Security patches should be applied Symptoms of virus infection must not be overlookedHacking Attacks : Hacking Attacks Social Engineering Attack Impersonation Shoulder surfing Popup windows Phishing Fake pages Email Scams DOS Attack (Denial of Service)Fake GMAIL Page: Fake GMAIL PagePhishing Email - Example: Phishing Email - ExamplePhishing Email - Example: Phishing Email - ExamplePhishing Email - Example: Phishing Email - ExampleNigerian Phishing Email Scam: Nigerian Phishing Email ScamOffer Letter Fraud: Offer Letter FraudA World of Opportunities: A World of Opportunities The Asia-Pacific region is anticipated to account for the majority of Information security solutions market by 2012. In this world of Opportunities you will see almost every sector emphasizing on information Security . Banking Sector Aviation Industry Corporate Sector Educational Institutions Government Sector Cyber Crime Investigation cells Global Security agencies Information system Security association National Information Security Testing, Evaluation and certification centresCareer options that you have: Career options that you have Cyber Security Professional Information Security Professional IS Executive Information System Auditor Security Advisors Software Developers IT Specialists IT System Executives IT Consultants Junior Programmer Assistant Software Engineer R&D Executive Security Consultant System Engineer Network Engineer … and many moreWhat do we do?: What do we do? Education Online Reputation Management Fraud Investigations Reference checks Antivirus solutions Network Penetration TestingPowerPoint Presentation: Building your future Accelerating your career growth email@example.com 9176391048 You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.