You are on page 1of 16

Ethical Hacking: Understanding Ethical Hacking

The Truth About Living in a Technology Based World

Dale Meredith
@dalemeredith | www.dalemeredith.com

Series TOC
Ethical Hacking: Understanding Ethical Hacking

Ethical Hacking: Session Hijacking

Ethical Hacking: Reconnaissance/Footprinting

Ethical Hacking: Social Engineering

Ethical Hacking: SQL Injection

Ethical Hacking: System Hacking

Ethical Hacking: Scanning Networks

Ethical Hacking: Denial of Service

Ethical Hacking: Enumeration

Ethical Hacking: Hacking Mobile Platforms

Ethical Hacking: Hacking Webservers

Ethical Hacking: Hacking Web Applications

Ethical Hacking: Cryptography

Ethical Hacking: Hacking Wireless Networks

Ethical Hacking: Sniffing

Ethical Hacking: Trojans and Backdoors

Ethical Hacking: Buffer Overflow

Ethical Hacking: Viruses and Worms

Ethical Hacking: Penetration Testing

Ethical Hacking: Evading IDS, Firewalls, and Honeypots

The Truth About Living in a


Technology Based World

By 2017, the Global Cyber Security Market


Is Expected to Skyrocket to $120.1 Billion
from $64.7 Billion in 2011

The Estimated Annual Cost of Global


Cybercrime Is
$375 Billion

Yearly Cyber Crime Victim Count Estimates


Victims Per YEAR:

566 Million

Yearly Cyber Crime Victim Count Estimates


Victims Per DAY:

1.5 Million

Yearly Cyber Crime Victim Count Estimates


Victims Per SECOND:

18

Yearly Cyber Crime Victim Count Estimates


Number of Identities Exposed:

Over 657
Million

Data Breach Stats by Industry


Healthcare
Banking

Government
Education
Business
0

10

15

20
Sales

25

30

35

40

45

How Protected Do You Feel?

So I ask you againhow protected do you


feel?

You might also like