Download - Ethical Hacking Introduction. What is Ethical Hacking? Types of Ethical Hacking Responsibilities of a ethical hacker Customer Expectations Skills.

Transcript
Page 1: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

Ethical Hacking

Introduction

Page 2: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

What is Ethical Hacking?Types of Ethical HackingResponsibilities of a ethical hackerCustomer ExpectationsSkills of the hacker

Overview

Page 3: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

Ethical

What is it?

Hacking

Page 4: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

Art and Science ofUnderstanding and determining vulnerabilities inside the information infrastructure

Art and Science of understanding and determining vulnerabilities inside the information infrastructure

Page 5: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

Ethical

Types of Ethical Hacking

Hacking

Page 6: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

Types

Types BLACK BOX

GREYBOX

WHITEBOX

Knowledge ofinformation

infrastructure

Page 7: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

Ethical

Responsibilities of Ethical Hacker

Hacking

Page 8: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

Responsibilities

• Use your knowledge & tools only for legal purposes.

• Only hack to identify security issues with goal of defense.

• Get management approvals.

Page 9: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

Ethical

Customer Expectations

Hacking

Page 10: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

Customer Expectations

• Define Goals and expectations• Confidentiality• Who owns the resultant data- the company• Full disclosures

Page 11: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

EthicalHacker’s

skills Hacking

Page 12: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

Hacker’s skills

Network/SystemsAdministrator

Security expertise

Extensive Knowledge

Page 13: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

Ethical

Laws and Preparation

Hacking

Page 14: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

Preparation

• Get signed approvals for all test• Sign confidentiality agreements (NDA) • Get approval from collateral parties• Put together teams and tools• Define Goals

Page 15: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

Ethical

Types of Attacks

Hacking

Page 16: Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.

Types of Attacks

• Full Penetration• Denial of Service• Specific Information ( theft or disclosure)• Social Engineering