Docstoc

hack.ppt - Ning

Document Sample
hack.ppt - Ning Powered By Docstoc
					                  IT Security
   Do we need a secure cyberspace?
   Should we protect our identity?
   Is knowledge a form of defence?
         Hacking Fundamentals
   What exactly is hacking ?
   Am I doing the correct thing while 'Hacking' ?
   Then what is Cracking ?
   Ethical, Legal and Social aspects
   Modern definition- the Ethical hacking
Knowing IP addresses
             IP address is a
              unique web address
              for each computer
              connected to internet
             Knowing this is
              essential before
              anything else
Accessing Vulnerabilities
                Port scanning
                Legal issues
                Using brutus, netbrute
                 scanner
                Most popular
                 scanner-nessus
nmap
      Is a network scanner
      Can be used for Host
       discovery, OS detection as
       well as port scanning
      To install, use the foll.
       Command in Debian Linux
      sudo apt-get install nmap
      Available for windows
                     Spoofing
   Is a way of masquerading
   A man-in-middle attack
   Is done in a network for 'sniffing' the data
   Common application is phishing websites
   Caller-ID spoofing in VOIP communications
   E-Mail address spoofing by spammers
              E-MAIL TRACING
   Used to know about the exact details of your
    mails
   Can authenticate the sender
   As a finder for route of the mail- can be used as
    a security against phishing/scam mails
                 Web Defense
   Disabling scripts in web pages
   Clearing cookies regularly
   Using/updating to latest version of web browser
   Avoiding replies to unsolicted(spam) mails
   Not clicking links/downloading attachment given
    in spam/unsolicited mails
         First line of(OS) defense
   Patch up windows using automatic updates
   Install well known antivirus and update it
    regularly
   Install a 3rd party firewall
   Use a strong password using syskey utility to
    encrypt sam passwords
             Parting Lines

   Remember, prevention is better than cure
   It is upto YOU to use a technology
    judiciously
   Yes, you can contribute in making the
    existing technologies more secure
For more know-how, join our
  community at Orkut.com

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:15
posted:8/2/2011
language:English
pages:11