Upload
others
View
2
Download
0
Embed Size (px)
Citation preview
ashwinirath.com
Ethical HackingAshwini Kumar Rath
Director, Batoi Systems Pvt Ltdwww.batoi.com
ashwinirath.com
It’s Battle and Conflict! For Wealth and Power.
ashwinirath.com
Hacking, Hackers and Hacktivism
Black Hat
White Hat
Grey Hat
Data Theft Data Exposure
Malfunction Exploitation
Unhappy Users Crime Rings Nation States
ashwinirath.com
Attack Vectors
ashwinirath.com
History of Hacking
ashwinirath.com
Risk = Threat X Vulnerability
Dark Web
Deep Web
Public Web
Growth of Internet and increase in connected systems enlarge the surface of attack.
ashwinirath.com
Attack MethodsReconnaissance
Scanning
GainingAccessMaintainingAccess
CoveringTracks
Virtualbox
ashwinirath.com
Users
Administrative
Technical
• TOGAF (The Open Group Architecture Framework)• ITIL (Information Technology
Infrastructure Library)• COBIT (Control OBjectives for
Information and related Technologies)
How to Prevent Hacking
ashwinirath.com
InternetArchitecture
SystemNetworkingandVirtualization
OperatingSystems SoftwareTools
AttackMethods Laws,StandardsandGuidelines
Ethical Hacking – A Career
Responsibilities
Chief Security OfficerSecurity Evangelist
Security Compliance OfficerSystem Security SpecialistNetwork Security Specialist
Application Security Specialist
ashwinirath.comSource:huffingtonpost.in
Ethical. NOT illegal.