Professional Documents
Culture Documents
By Sunny Vaghela
Session Flow
Why
Security? Hacking Introduction Hacker Communities Types of Hackers. Malicious Hacker Strategies Ethical Hacker Strategies Steps for conducting Ethical Hacking. Importance of Vulnerability Research. Vulnerability Research References. Conclusion.
Why Security? Increasing use of Complex computer infrastructure. Increasing use of Network elements & applications. Decreasing level of skill set.
Why Security? Any Security breach in company will affect its asset & goodwill. Any Security breach in government can affect its operations & reputation.
Hacking - Definition The Art of exploring various security breaches is termed as Hacking. Its an anti-society activity. It says, there always exists more than one way to solve the problem. The terms Hacker and Hacking are being misinterpreted and misunderstood with negative sidelines.
Crackers/Attackers
An Individuals who break into computers with malicious intent. Motive/Intent To seek unauthorized access into a system and cause damage or destroy or reveal confidential information. To compromise the system to deny services to legitimate users for troubling, harassing them or for taking revenge. Effects- Can cause financial losses & image/reputation damages, defamation in the society for individuals or organizations
Crackers/Attackers
An Individuals who break into computers with malicious intent. Motive/Intent To seek unauthorized access into a system and cause damage or destroy or reveal confidential information. To compromise the system to deny services to legitimate users for troubling, harassing them or for taking revenge. Effects- Can cause financial losses & image/reputation damages, defamation in the society for individuals or organizations
Phreaks
Phreaks These are persons who use computer devices and software to break into phone networks. Motive/Intention- To find loopholes in security in phone network and to make phone calls at free of cost!!! Effects- You may have to big amount of phone bills, for doing nothing!!!
Script Kiddies
Script Kiddies These are persons not having technical skills to hack computers. Motive/Intention- They use the available information about known vulnerabilities to break into remote systems. Its an act performed for a fun or out of curiosity.
Hats Off?
White Hat Hackers They use their knowledge and skill set for good, constructive intents. They find out new security loopholes and their solutions. E.g.- LIKE ME.. As Im Doing It Right Now ( I Hope So!!!) Black Hat Hacker- They use their knowledge and skill set for illegal activities, destructive intents. E.g.- to gain money (online robbery), to take revenge. Disgruntled Employees is the best example of Black Hats. Attackers (Black Hat Hackers) are not at all concerned with security professionals (White Hat hackers). Actually these hackers are Bad Guys!!!
Vulnerability Research
Vulnerability research is process of finding vulnerabilities, threats & loopholes in Server/ System /Network. Includes Vulnerability Assessment & Penetration Testing. Vulnerability notes can be search on internet via Number, CVE.
Conclusion
Security is important because prevention is better than cure. Community of Hackers. Security Involves five phases. Ethical Hacking involves Conducting Security Audits, Vulnerability Assessment & Penetration testing Vulnerability Research is process of discovering different vulnerabilities in technology & applications.