You are on page 1of 51

CYBER SECURITY LAWS

AND ETHICAL HACKERS


 Introduction
 Definition
 History
 Categories of Cyber
crime
 Types of Cyber crime
 Case Studies
 Statistical Report
 Prevention
 Security
Ethical Hacking
 Who are Hackers
 Why do Hackers hack
 Types of Hackers
 What should do after hack
 Hacking Process
 Why do We need Ethical Hacking
 Required Skills of an Ethical Hacker
 What do hackers do after Hacking?
 Advantages
 Disadvantages
 Future Enhancements
 Conclusion
 The Internet in India is growing rapidly. It
has given rise to new opportunities in every
field such as entertainment , business ,
education or sports.

 There are two sides to a coin. INTERNET


also has its disadvantages like CYBER
CRIME – Illegal activity committed on the
Internet.
DEFINITION :

 Crime committed using a


Computer and the Internet
to steal Data or
Information.
 Illegal imports
 Malicious programs
 The first SPAM email took place in 1978 when
it was sent out over ARPANET.
 ARPANET : Advanced Research Projects
Agency Network
 Like spam the first VIRUS was installed on an
Apple Computer in 1982.
 A 16-year old student was arrested in UK in
1994 for doing this crime.
 The computer as a target

 The computer as a weapon


 Hacking
 Identity theft
 Malicious software
 Computer vandalism
 Cyber terrorism
 Software piracy
 Hacking in simple terms means an illegal intrusion
into a computer system or network.
 In many organizations they have to check their
Internet security protection. If not the hacking
criminal uses a variety of software to enter a person’s
computer and the person may not be aware that his
computer is being accessed from a remote location.
 This has become a major problem with people using the
Internet for cash
 transactions and banking services.
 In this cyber crime, a criminal accesses data about a person’s
bank account, credit cards, Social Security, debit card and other
sensitive information to siphon money or to buy things online
in the victim’s name.
 It can result in major financial losses for the victim and even
spoil the victim’s credit history.
 Malicious software that attaches itself to other
software. (Virus, worms, Trojan Horse , web-
jacking, email bombing etc)
 This type of software's employed for you to gain
access to a system for you to take delicate
information or even data or even triggering the
destruction of software program contained in the
machine.
 Damaging or destroying the data rather
than stealing or misusing.
 Transmitting virus.
 Use of internet based attacks in terrorists activities
against computers/networks with the intension of
causing harm.
 Cyber terrorism can also include attacks on Internet
business, but when this is done for economic
motivations rather than ideological.
 Software piracy is the unauthorized or
illegal
 copying, distribution, or use of software. It is such
a profitable “Business" that it has caught the
attention of organized crime groups in a number of
countries.
 CREATING FAKE PROFILE : Fake Profiles use
is common in Students. Many cases have been
registered against Fake Profiles in Cyber Cell.
 PASSWORD HACKING : Students are taking
cyber crimes just for fun or carrying out small
acts such as password hacking to revenge on
their teachers , friends in schools an also
Morphing pictures and posting them on
social networking sites to defame others.
 PHISHING: Phishing is the act of attempting
to acquire information such as username,
passwords and credit card details. Phishing
emails may contain links to the websites that
are infected with malware.
 Resent News where Government is taking
Action Against Websites Spreading Hatred :
Terrorist Originations like Al-Qaeeda, ISIS
and Boko Haram have been making use of
the Social Media creating hatred and divide.
 Use Anti-virus software.
 Insert Firewalls.
 Uninstall unnecessary software
 Maintain Backup
 Check security settings
 Stay Anonymous - choose a genderless
screen name.
 Never give your full name or address to
strangers.
 INTERNET SECURITY IS A BRANCH OF COMPUTER
SECURITY SPECIFICALLY RELATED TO THE INTERNET.
 Its objective is to establish rules and measures to
use against attacks over the internet.
 Defend us from Critical Attacks.
 Browses the safe websites.
 Internet securityprocessin all the incoming
and outgoing data on our computer.
ETHICAL HACKING
INTRODUCTION
 Ethical hacking also known as penetration
testing or white-hat hacking, involves the
same tools, tricks, and techniques that
hackers use,but with one major difference
that Ethical hacking is legal.
ETHICAL HACKING
 Independent computer security Professionals
breaking into the computer systems.
 Neither damage the target systems nor steal
information.
 Evaluate target systems security and report back
to owners about the bugs found.
WHO ARE HACKERS?
 A person who enjoys learning details
 of a programming language or system.
 A person who enjoys actually doing the
programming rather than just theorizing about
it.
 A person capable of appreciating someone else's
hacking.
 A person who picks up programming quickly.
 A person who is an expert at a particular
programming language or system.
WHY DO HACKERS HACK ?
 Just for fun.
 Show off.
 Hack other systems secretly.
 Notify many people their
thought.
 Steal important information.
 Destroy enemy’s computer
network during the war.
 Ethical Hackers but not Criminal Hackers
 Completely trustworthy.
 Strong programming and computer
networking skills.
 Learn about the system and trying to find its
weaknesses.
 Techniques of Criminal hackers-Detection-
Prevention.
TYPES OF HACKERS

 Black Hat Hacker


 White Hat Hacker
 Grey Hat Hacker
 BLACK-HAT HACKER

A black hat hackers or


crackers are individuals with
extraordinary computing skills,
resorting to malicious or
destructive activities.

 That is black hat hackers use their


knowledge and skill for their own
personal gains probably by
hurting others.
 WHITE-HAT HACKER

 White hat hackers are those


individuals professing hacker
skills and using them for
defensive purposes.

 This means that the white hat


hackers use their knowledge
 and skill for the good of others
and for the common good.
 GREY-HAT HACKERS

 These are individuals who


work both offensively and
defensively at various times.
 We cannot predict their
behavior.
 Sometimes they use their skills
for the common good while in
some other times he uses them
for their personal gains.
 WHAT SHOULD DO AFTER HACKED?

 Shutdown or turn off the system


 Separate the system from
network
 Restore the system with the
backup or reinstall all programs
 Connect the system to the
network
 It can be good to call the police
 HACKING PROCESS

 Foot Printing
 Scanning
 Gaining Access
 Maintaining Access
FOOT PRINTING
 Whois lookup
 NS lookup
 IP lookup
SCANNING
 Port Scanning
 Network Scanning
 Finger Printing
 Fire Walking
GAINING ACCESS
 Password Attacks
 Social Engineering
 Viruses
MAINTAINING ACCESS
 Os BackDoors
 Trojans
 Clears Tracks
WHY DO YOU NEED ETHICAL HACKING
PROTECTION FROM POSSIBLE EXTERNAL ATTACKS

Social Engineering

Organizational Automated Attacks


Attacks

Restricted
Data

Accidental
Breaches in Security Denial of
Viruses, Trojan Service (DoS)
Horses, and Worms
 REQUIRED SKILLS OF AN ETHICAL HACKER

 Microsoft: skills in operation, configuration and


management.

 Linux: knowledge of Linux/Unix; security setting,


configuration, and services.

 Firewalls: configurations, and operation of


intrusion detection systems.
 REQUIRED SKILLS OF AN ETHICAL HACKER….

 Routers: knowledge of routers, routing


protocols, and access
 control lists
 Mainframes : knowledge of mainframes
 Network Protocols: TCP/IP; how they function
and can be manipulated.
 Project Management: leading, planning,
organizing, and controlling a penetration testing
team.
 WHAT DO HACKERS DO AFTER HACKING?...

 Patch Security hole


The other hackers can’t intrude
 Clear logs and hide themselves
 Install rootkit ( backdoor )
The hacker who hacked the system can use
the system later
It contains trojan virus, and so on
 Install irc related program
identd, irc, bitchx, eggdrop, bnc
WHAT DO HACKERS DO AFTER HACKING?

 Install scanner program


mscan, sscan, nmap
 Install exploit program
 Install denial of service program
 Use all of installed programs silently
 ADVANTAGES

 To catch a thief you have to think like a thief.


 Helps in closing the open holes in the system
network.
 Provides security to banking and financial
establishments.
 Prevents website defacements.
 An evolving technique.
 DISADVANTAGES

 All depends upon the trustworthiness of


the ethical hacker

 Hiring professionals is expensive.


 FUTURE ENHANCEMENTS

 As it an evolving branch the scope of


enhancement in
 technology is immense.

 No ethical hacker can ensure the system security


by using the same technique repeatedly.

 More enhanced software’s should be used for


optimum protection.
 CONCLUSION
 In the preceding sections we saw the methodology of
hacking, why should we aware of hacking and some
tools which a hacker may use.
 Now we can see what can we do against hacking or to
protect ourselves from hacking.
 The first thing we should do is to keep ourselves
updated
 about those software’s we and using for official and
reliable sources.
 Educate the employees and the users against black hat
hacking.
 TECHNOLOGY IS DESTRUCTIVE ONLY IN THE
HANDS OF PEOPLE WHO DO NOT REALIZE
THAT THEY ARE THE ONE AND THE SAME
PROCESS AS THE UNIVERSE.

You might also like