Ceh

  • Uploaded by: DEEPAK RAJ
  • 0
  • 0
  • February 2021
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Ceh as PDF for free.

More details

  • Words: 386
  • Pages: 12
Loading documents preview...
CYBER SECURITY & Ethical Hacking Hope Your Firewall Is Not Screwed Up

CONCEPTS CONCEPT Modules

AIM

STEPS Steps How Hackers Gains Access

HOW TO BE SECURED

Over-View Previously Held Attacks

TOPICS

Footprinting and Scanning Networks

Introduction to Ethical Hacking

1

2

Social Engineering

Malware Threats

System Hacking

3

4

Evading IDS, Firewalls and Honeypots

5

6

TOPICS Denial of Service And SQL Injection

7

Hacking Wireless Networks

8

Hacking Wireless Networks

Cryptography

9

10

WORK CYCLE 03

GAINING ACCESS

01

05

CLEARING TRACKS

INFORMATION GATHERING

02

SCANNING

04

MAINTAING ACCESS

ATTACKS TYPES VIRUSES

Application Attacks

Worms, Trojan Horses, Add Wares, Etc

Contains the scripts behind the software applications that malfunctions your devices

MITM Attack

DDOS

Transfers the HTTPS links towards HTTP; Most likely to happen in Online Bank Transactions

multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a attack.

BOT NETS

Back Doors

a number of Internet-connected devices, used to perform distributed DDoS attack, steal data, send spam, and allows the attacker to access the device and its connection.

to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

MONTHLY ATTACKS 160

120 80 40

0 JAN

MAR

2017

MAY

JUL

SEP

2016

NOV

MOSTLY ATTACKED COUNTERIES RUSSIA Russian hackers are famous worldwide and have a knack for cracking the most secure of networks. A total of 5.14% of cyber attacks are initiated by the Russians.

USA As US accounts for nearly 10% of the world’s malicious digital traffic. It is home to many famous and infamous hackers.

TURKEY

BRAZIL Brazil has the highest cyber attack traffic not only in SouthAmerica but the entire southern hemisphere

CHINA The purpose of these attacks is to mostly hack the networks of US government and its allies. As per a research, 27.24% of cyber attacks are initiated by China

BIGGEST SOURCES OF CYBER ATTACKS

55% DATA IN PUBLIC CLOUD

43% CLOUD INFRASTRUCTURE

75%

95%

MOBILE DEVICES

SOCIAL ENGINEERING

TIMELINE Storm Warm

2004

Skywipe And Flamer

2010 2009

MyDoom

2012 2011

StuxNet

Ransomware

HOW TO BE PROTECTIVE

05

Cyber Security Insurance

Modern Firewall

06

Move To Trusted DNS Source Only

03

Spam Filters

07

Two Factor Authentication For Remote User

04

Backup, Disaster Recovery

08

Inspect Wireless Networks

01 02

Anti-virus, AntiMalwares

THANKS FOR WATCHING

Related Documents

Ceh
February 2021 3
Ceh
January 2021 4
Ceh V10
February 2021 1
Ceh Module 05: Scanning
January 2021 1
Ceh Exam Material
February 2021 0
312-50 Ceh Dump
February 2021 0

More Documents from "Adrian Anghel"

Ceh
February 2021 3
Hr Head List
February 2021 13
Career Guide 2020.pdf
March 2021 0
Bbm_group_08
February 2021 1