SlideShare a Scribd company logo
Introduction to Cyber Security
Presented by
Mohammad Ashfaqur Rahman
Compliance Professional
www.linkedin.com/in/ashfaqsaphal
ashfaq.saphal@gmail.com
Objective
●
Concept of IT Security
●
Information Security Terminologies
●
Hacker and Attack
●
Trends of attack
●
Perspective Bangladesh
Information
●
'Information is an asset which, like other important
business assets, has value to an organization and
consequently needs to be suitably protected’
– Ref : BS ISO 27002:2005
●
‘…Whatever form the information takes, or means by
which it is shared or stored, it should always be
appropriately protected’
– Ref : BS ISO 27002:2005
Information
●
Creation
●
Transmit
●
Store
●
Lost – Corrupt – Destroy – Stolen
●
Paper based
●
Verbal
Security
●
“The quality or state of being secure—to be free from
danger”
●
A successful organization should have multiple layers of
security in place:
– Physical security
– Personal security
– Operations security
– Communications security
– Network security
– Information security
Information Security
●
The protection of information and its critical elements,
including systems and hardware that use, store, and
transmit that information
●
Information Security is also known as Cyber Security
– Also written as Cybersecurity
– Security of
• Information System
• Network
History
●
Old Caesar Cipher
●
IT Security concept invoked immediately after the first
mainframes were developed
●
Groups developing code-breaking computations during
World War II created the first modern computers
– Introduction of turing machine
●
WikiLeaks, Anonymous, Lulzsec
– Bangladesh Cyber Army
– Bangladesh Black Hat Hackers
Compromised System
●
"Compromised" is a nice way of saying that someone or
something has maliciously broken into your computer
without your knowledge or permission.
●
It means that you can't trust the integrity of any file
(program, document, spreadsheet, image, etc.) on your
computer.
●
can't find out what's been done to your computer files
●
an exact "before" copy to compare them with
Impact of Compromisation
●
Personal
– Lost of personal sensitive data : Identity theft
– Social harrasment : Social account / mail hack
– Financial loss : Credit Card / Online Banking
●
Organizational
– Loss of customer confidence : cusotomer data
loss
– Financial Losses : Lost of confidential data
– Damaged Reputation : loss of good will
Impact of Compromisation
●
Social
– Unrest Situation
– Harassment
– Child Pornography
The Hacker
●
A hacker is someone who
– seeks and exploits weaknesses in a
– computer system or
– computer network.
●
A hacker is someone who likes to tinker with electronics
or computer systems : finding ways to make them do
what they do better, or do things they weren't intended to
do
The Hacker
●
Hackers may be motivated by a multitude of reasons, such
as
– Profit
– Protest
– Challenge
– Enjoyment
– to evaluate those weaknesses to assist in
removing them.
Types of Hacker
●
White Hat
– Good Guys
– Don't use their skills for illegal purposes
– Computer Security experts and
– help protect people from the Black Hats
Types of Hacker
●
Black Hat
– Bad Guys
– Use their skills maliciously for personal gain
– Hack banks, steal credit cards, and deface
websites
Types of Hacker
●
Grey hat
– combination of a Black Hat and a White Hat
Hacker
– hack into a computer system for the sole
purpose of notifying the administrator
Hacker Hierarchy
●
Script kiddies
– Wannabe hackers
– Have no hacking skills
– use the tools developed by other hackers
– No knowledge of what's happening behind the
scenes
Hacker Hierarchy
●
Intermediate hackers
– know about computers, networks
– enough programming and scripting knowledge
– Use pre-developed well-known exploits
Hacker Hierarchy
●
Elite Hackers
– skilled hackers
– write hacker tools and exploits
– break into systems and hide their tracks
Other Terminologies
●
Neophyte
– Also known as "n00b", or "newbie"
– is someone who is new to hacking or phreaking
and has almost no knowledge or experience
●
Blue hat
– someone outside computer security consulting
firms who is used to bug test a system prior to
its launch, looking for exploits so they can be
closed
Other Terminologies
Cyber-attack
●
any type of offensive maneuver
●
by individuals or whole organizations
●
targets computer information systems, infrastructures,
computer networks, and/or personal computer devices
●
Factors that involves
– Fear factor
– Spectacular factor
– Vulnerability factor
Threat Trends
●
Cyber Crime
– Bad guys are mostly Eastern European
although Asian groups are also active
– A complete service based economy supporting
their activities
– Attacks are a mix of
• social engineering and
• technical attack
Threat Trends
●
Hactivists
– WikiLeaks
– Anonymous, Lulzsec
– DDoS attacks
– Data loss
• combination of hacking and insiders
Threat Trends
●
Nation State
– Motivations
• Espionage
• Disruption
• Targeting Government + Private Sector
ICT Act 2006, Bangladesh
Incident Trends, Bangladesh
●
According to bdCERT
Incident Trends, Bangladesh
●
Site Defacement
– Site hacked by hacker group named Indishell,
Sil3nt Hack3r, My@nm@r H4acK3rs Unit
– Government sites were targeted (.gov.bd)
– Sites running on CMS are not fully patched
and inherently carrying bugs which is quite
easy for the hacker to penetrate.
– Lack of proactive monitoring and enforcement
of standards.
Incident Trends, Bangladesh
●
Site Defacement
Case Study – Network Hacking
●
Foot Printing
●
Port Scanning
●
Banner Grabbing
●
Searching for Vulnerabilities
●
Penetrating
Case Study – Network Hacking
●
Foot Printing
– You see the company e-mails, address, names,
when the domain was created, when the domain
expires, the domain name servers, and more!
– A hacker can also take advantage of search
engines to search sites for data
• "site : www:thetargetsite:com" this will
display every page that Google has
Case Study – Network Hacking
●
Port Scanning
– To detect the port's listening services on
server's open ports so as to detect the
vulnerabilities
– The Nmap Security Scanner is available for
both Mac and Windows users:
• http://nmap.org/download.html
Case Study – Network Hacking
●
Port Scanning
– To detect the port's listening services on
server's open ports so as to detect the
vulnerabilities
– The Nmap Security Scanner is available for
both Mac and Windows users:
• http://nmap.org/download.html
Case Study – Network Hacking
●
Banner Grabbing
– Telnet into service port To gure out what
software and version of the service
– If you are using Windows Vista, then telnet is
not installed by default, Use control panel –
Programs and Features - Turn Windows
features on or o
- Telnet Client to install
– If you found port 21 (ie ftp) open, then telnet
www.targetsite.com 21 to nd out FTP software
Case Study – Network Hacking
●
Searching for Vulnerabilities
– Search a couple vulnerability databases for an
exploit
– If there's an exploit available, run it against the
server and take complete control
– Popular exploit databases are Milw0rm,
SecurityFocus, osvdb
Case Study – Network Hacking
●
Attacks
– Denial-of-Service(DoS)
– Bu
er Overfow(BoF)
Case Study – Network Hacking
●
Penetrating
– Running the exploits against the target and
penetrating the server
– From PT Server
– Multiple programming language
Case Study – Network Hacking
●
Root Access
– Root kit deployment
– Grab data
It is your turn

More Related Content

What's hot (20)

PDF
Cyber Security 2017 Challenges
Leandro Bennaton
 
PPTX
Cyber Security: A Common Problem 2018
joshquarrie
 
PPTX
Information & Cyber Security Risk
Murray Security Services
 
PDF
Key Findings from the 2015 IBM Cyber Security Intelligence Index
IBM Security
 
PDF
Cyber Security Awareness
Ramiro Cid
 
PDF
The Cyber Security Landscape: An OurCrowd Briefing for Investors
OurCrowd
 
PDF
A Look Into Cyber Security
GTreasury
 
PDF
Cyber Security For Organization Proposal PowerPoint Presentation Slides
SlideTeam
 
PDF
Whitepaper Avira about Artificial Intelligence to cyber security
GopiRajan4
 
PPTX
NCSAM = Cyber Security Awareness Month: Trends and Resources
Stephen Cobb
 
PPTX
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Netpluz Asia Pte Ltd
 
PDF
Cybersecurity concepts & Defense best practises
WAJAHAT IQBAL
 
PDF
Cyber Security: The Strategic View
Cisco Canada
 
PDF
Cyber Domain Security
ICSA, LLC
 
PPTX
Cyber Security for the Small Business Experience
National Retail Federation
 
PDF
Introduction to the concept of it security
RAVIKUMAR Digital Signal Processing
 
PDF
Hacking the Helpdesk, Craig Clark
Service Desk Institute
 
PDF
Cyber security-in-india-present-status
Rama Reddy
 
PDF
Cybersecurity Employee Training
Paige Rasid
 
PDF
2019 Cybersecurity Predictions
Nuance Communications
 
Cyber Security 2017 Challenges
Leandro Bennaton
 
Cyber Security: A Common Problem 2018
joshquarrie
 
Information & Cyber Security Risk
Murray Security Services
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
IBM Security
 
Cyber Security Awareness
Ramiro Cid
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
OurCrowd
 
A Look Into Cyber Security
GTreasury
 
Cyber Security For Organization Proposal PowerPoint Presentation Slides
SlideTeam
 
Whitepaper Avira about Artificial Intelligence to cyber security
GopiRajan4
 
NCSAM = Cyber Security Awareness Month: Trends and Resources
Stephen Cobb
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Netpluz Asia Pte Ltd
 
Cybersecurity concepts & Defense best practises
WAJAHAT IQBAL
 
Cyber Security: The Strategic View
Cisco Canada
 
Cyber Domain Security
ICSA, LLC
 
Cyber Security for the Small Business Experience
National Retail Federation
 
Introduction to the concept of it security
RAVIKUMAR Digital Signal Processing
 
Hacking the Helpdesk, Craig Clark
Service Desk Institute
 
Cyber security-in-india-present-status
Rama Reddy
 
Cybersecurity Employee Training
Paige Rasid
 
2019 Cybersecurity Predictions
Nuance Communications
 

Viewers also liked (20)

PPTX
An Introduction of SQL Injection, Buffer Overflow & Wireless Attack
TechSecIT
 
PPTX
أساسيات أمن المعلومات
Mohammed Almeshekah
 
PPTX
أمن المعلومات 4
Dr Abdalla Mahmoud
 
PPTX
Cyber security
Ankush Verma
 
PPTX
мероприятие по творчеству михалкова
msikanov
 
PPT
Nghien cuu bạc hà
Ton Day
 
PPTX
новогодний калейдоскоп
msikanov
 
PPTX
неделя детской книги
msikanov
 
PPTX
день космонавтики в гкп
msikanov
 
PPSX
Labelle
Laras Mukti
 
PDF
Live Interest Meter - Learning from Quantified Feedback in Mass Lectures
veronicarp
 
PPTX
Storyboard kpd 3026
Awg Stu
 
PPTX
история нового года
msikanov
 
PPTX
1пошагово детальное преподавание информации,ее усвоение, уменьшение искажений...
msikanov
 
PPT
выставка игрушек ссср
msikanov
 
PPT
Technische Natuurkunde
university-of-twente
 
PPT
учебные сборы 2014
msikanov
 
PPTX
арт студия
msikanov
 
PPTX
Mama
msikanov
 
An Introduction of SQL Injection, Buffer Overflow & Wireless Attack
TechSecIT
 
أساسيات أمن المعلومات
Mohammed Almeshekah
 
أمن المعلومات 4
Dr Abdalla Mahmoud
 
Cyber security
Ankush Verma
 
мероприятие по творчеству михалкова
msikanov
 
Nghien cuu bạc hà
Ton Day
 
новогодний калейдоскоп
msikanov
 
неделя детской книги
msikanov
 
день космонавтики в гкп
msikanov
 
Labelle
Laras Mukti
 
Live Interest Meter - Learning from Quantified Feedback in Mass Lectures
veronicarp
 
Storyboard kpd 3026
Awg Stu
 
история нового года
msikanov
 
1пошагово детальное преподавание информации,ее усвоение, уменьшение искажений...
msikanov
 
выставка игрушек ссср
msikanov
 
Technische Natuurkunde
university-of-twente
 
учебные сборы 2014
msikanov
 
арт студия
msikanov
 
Mama
msikanov
 
Ad

Similar to 001.itsecurity bcp v1 (20)

PPTX
Dhams hacking
dharmesh ram
 
PPTX
hacking basics
dharmesh ram
 
PPT
All about Hacking
Madhusudhan G
 
PPTX
Ethical hacking 2016
arohan6
 
PPTX
Ethical hacking
arohan6
 
PPTX
Ethical hacking
arohan6
 
PPT
Cyber Security Awareness - file 1 of 2
Mohammad Ashfaqur Rahman
 
PDF
Introduction of hacking and cracking
Harshil Barot
 
PPT
Introduction to hackers
Harsh Sharma
 
PPT
Hackers
Mohamed Boudchiche
 
PPTX
Hacking Presentation v2 By Raffi
Shawon Raffi
 
PPT
How to become Hackers .
Greater Noida Institute Of Technology
 
PPT
Hackers Cracker Network Intruder
Erdo Deshiant Garnaby
 
PPT
Computer hacking
shreyas dani
 
PPTX
What is cyber security
AdvAbdulMueedAhmad
 
PPTX
Ethical hacking
Rishabha Garg
 
PPT
ETHICAL HACKING
Sweta Leena Panda
 
PDF
Hackers and cyber crimes
Sweta Kumari Barnwal
 
PDF
Unit ii-hackers and cyber crimes
Sweta Kumari Barnwal
 
PPTX
13-5-2025 a13-5-2025 a13-5-2025 a13-5-2025 a.pptx
FutureTechnologies3
 
Dhams hacking
dharmesh ram
 
hacking basics
dharmesh ram
 
All about Hacking
Madhusudhan G
 
Ethical hacking 2016
arohan6
 
Ethical hacking
arohan6
 
Ethical hacking
arohan6
 
Cyber Security Awareness - file 1 of 2
Mohammad Ashfaqur Rahman
 
Introduction of hacking and cracking
Harshil Barot
 
Introduction to hackers
Harsh Sharma
 
Hacking Presentation v2 By Raffi
Shawon Raffi
 
How to become Hackers .
Greater Noida Institute Of Technology
 
Hackers Cracker Network Intruder
Erdo Deshiant Garnaby
 
Computer hacking
shreyas dani
 
What is cyber security
AdvAbdulMueedAhmad
 
Ethical hacking
Rishabha Garg
 
ETHICAL HACKING
Sweta Leena Panda
 
Hackers and cyber crimes
Sweta Kumari Barnwal
 
Unit ii-hackers and cyber crimes
Sweta Kumari Barnwal
 
13-5-2025 a13-5-2025 a13-5-2025 a13-5-2025 a.pptx
FutureTechnologies3
 
Ad

More from Mohammad Ashfaqur Rahman (20)

PDF
Cyber Security Considerations for 4IR in Bangladesh
Mohammad Ashfaqur Rahman
 
PPTX
Cyber Security For E-commerce (Infrastructure) development
Mohammad Ashfaqur Rahman
 
PPTX
Cyber Awareness : Perspective Bangladesh & Covid-19
Mohammad Ashfaqur Rahman
 
PPT
Cyber Security Awareness - file 2 of 2
Mohammad Ashfaqur Rahman
 
PPT
009.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
PPT
008.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
PPT
007.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
PPT
006.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
PPT
005.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
PPT
002.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
PPT
000.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
PDF
Business Continuty Planning and Disester Recovry Planning
Mohammad Ashfaqur Rahman
 
PPT
013.safetymanagement v3
Mohammad Ashfaqur Rahman
 
DOC
013.safetymanagement v3
Mohammad Ashfaqur Rahman
 
PPT
012.safetymanagement v3
Mohammad Ashfaqur Rahman
 
DOC
012.safetymanagement v3
Mohammad Ashfaqur Rahman
 
PPT
011.safetymanagement v3
Mohammad Ashfaqur Rahman
 
DOC
011.safetymanagement v3
Mohammad Ashfaqur Rahman
 
PPT
010.safetymanagement v3
Mohammad Ashfaqur Rahman
 
DOC
010.safetymanagement v3
Mohammad Ashfaqur Rahman
 
Cyber Security Considerations for 4IR in Bangladesh
Mohammad Ashfaqur Rahman
 
Cyber Security For E-commerce (Infrastructure) development
Mohammad Ashfaqur Rahman
 
Cyber Awareness : Perspective Bangladesh & Covid-19
Mohammad Ashfaqur Rahman
 
Cyber Security Awareness - file 2 of 2
Mohammad Ashfaqur Rahman
 
009.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
008.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
007.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
006.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
005.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
002.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
000.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
Business Continuty Planning and Disester Recovry Planning
Mohammad Ashfaqur Rahman
 
013.safetymanagement v3
Mohammad Ashfaqur Rahman
 
013.safetymanagement v3
Mohammad Ashfaqur Rahman
 
012.safetymanagement v3
Mohammad Ashfaqur Rahman
 
012.safetymanagement v3
Mohammad Ashfaqur Rahman
 
011.safetymanagement v3
Mohammad Ashfaqur Rahman
 
011.safetymanagement v3
Mohammad Ashfaqur Rahman
 
010.safetymanagement v3
Mohammad Ashfaqur Rahman
 
010.safetymanagement v3
Mohammad Ashfaqur Rahman
 

Recently uploaded (20)

PPTX
Introduction to Fluid and Thermal Engineering
Avesahemad Husainy
 
PPTX
ENSA_Module_7.pptx_wide_area_network_concepts
RanaMukherjee24
 
PPTX
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 
PPTX
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
PPTX
Water resources Engineering GIS KRT.pptx
Krunal Thanki
 
PDF
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PPTX
Information Retrieval and Extraction - Module 7
premSankar19
 
PDF
STUDY OF NOVEL CHANNEL MATERIALS USING III-V COMPOUNDS WITH VARIOUS GATE DIEL...
ijoejnl
 
PDF
SG1-ALM-MS-EL-30-0008 (00) MS - Isolators and disconnecting switches.pdf
djiceramil
 
PDF
Machine Learning All topics Covers In This Single Slides
AmritTiwari19
 
PPTX
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
PDF
All chapters of Strength of materials.ppt
girmabiniyam1234
 
PDF
Construction of a Thermal Vacuum Chamber for Environment Test of Triple CubeS...
2208441
 
PPTX
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
PDF
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
PDF
2025 Laurence Sigler - Advancing Decision Support. Content Management Ecommer...
Francisco Javier Mora Serrano
 
DOCX
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
PDF
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 
PPTX
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
Introduction to Fluid and Thermal Engineering
Avesahemad Husainy
 
ENSA_Module_7.pptx_wide_area_network_concepts
RanaMukherjee24
 
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
Water resources Engineering GIS KRT.pptx
Krunal Thanki
 
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Information Retrieval and Extraction - Module 7
premSankar19
 
STUDY OF NOVEL CHANNEL MATERIALS USING III-V COMPOUNDS WITH VARIOUS GATE DIEL...
ijoejnl
 
SG1-ALM-MS-EL-30-0008 (00) MS - Isolators and disconnecting switches.pdf
djiceramil
 
Machine Learning All topics Covers In This Single Slides
AmritTiwari19
 
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
All chapters of Strength of materials.ppt
girmabiniyam1234
 
Construction of a Thermal Vacuum Chamber for Environment Test of Triple CubeS...
2208441
 
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
2025 Laurence Sigler - Advancing Decision Support. Content Management Ecommer...
Francisco Javier Mora Serrano
 
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 

001.itsecurity bcp v1

  • 1. Introduction to Cyber Security Presented by Mohammad Ashfaqur Rahman Compliance Professional www.linkedin.com/in/ashfaqsaphal [email protected]
  • 2. Objective ● Concept of IT Security ● Information Security Terminologies ● Hacker and Attack ● Trends of attack ● Perspective Bangladesh
  • 3. Information ● 'Information is an asset which, like other important business assets, has value to an organization and consequently needs to be suitably protected’ – Ref : BS ISO 27002:2005 ● ‘…Whatever form the information takes, or means by which it is shared or stored, it should always be appropriately protected’ – Ref : BS ISO 27002:2005
  • 4. Information ● Creation ● Transmit ● Store ● Lost – Corrupt – Destroy – Stolen ● Paper based ● Verbal
  • 5. Security ● “The quality or state of being secure—to be free from danger” ● A successful organization should have multiple layers of security in place: – Physical security – Personal security – Operations security – Communications security – Network security – Information security
  • 6. Information Security ● The protection of information and its critical elements, including systems and hardware that use, store, and transmit that information ● Information Security is also known as Cyber Security – Also written as Cybersecurity – Security of • Information System • Network
  • 7. History ● Old Caesar Cipher ● IT Security concept invoked immediately after the first mainframes were developed ● Groups developing code-breaking computations during World War II created the first modern computers – Introduction of turing machine ● WikiLeaks, Anonymous, Lulzsec – Bangladesh Cyber Army – Bangladesh Black Hat Hackers
  • 8. Compromised System ● "Compromised" is a nice way of saying that someone or something has maliciously broken into your computer without your knowledge or permission. ● It means that you can't trust the integrity of any file (program, document, spreadsheet, image, etc.) on your computer. ● can't find out what's been done to your computer files ● an exact "before" copy to compare them with
  • 9. Impact of Compromisation ● Personal – Lost of personal sensitive data : Identity theft – Social harrasment : Social account / mail hack – Financial loss : Credit Card / Online Banking ● Organizational – Loss of customer confidence : cusotomer data loss – Financial Losses : Lost of confidential data – Damaged Reputation : loss of good will
  • 10. Impact of Compromisation ● Social – Unrest Situation – Harassment – Child Pornography
  • 11. The Hacker ● A hacker is someone who – seeks and exploits weaknesses in a – computer system or – computer network. ● A hacker is someone who likes to tinker with electronics or computer systems : finding ways to make them do what they do better, or do things they weren't intended to do
  • 12. The Hacker ● Hackers may be motivated by a multitude of reasons, such as – Profit – Protest – Challenge – Enjoyment – to evaluate those weaknesses to assist in removing them.
  • 13. Types of Hacker ● White Hat – Good Guys – Don't use their skills for illegal purposes – Computer Security experts and – help protect people from the Black Hats
  • 14. Types of Hacker ● Black Hat – Bad Guys – Use their skills maliciously for personal gain – Hack banks, steal credit cards, and deface websites
  • 15. Types of Hacker ● Grey hat – combination of a Black Hat and a White Hat Hacker – hack into a computer system for the sole purpose of notifying the administrator
  • 16. Hacker Hierarchy ● Script kiddies – Wannabe hackers – Have no hacking skills – use the tools developed by other hackers – No knowledge of what's happening behind the scenes
  • 17. Hacker Hierarchy ● Intermediate hackers – know about computers, networks – enough programming and scripting knowledge – Use pre-developed well-known exploits
  • 18. Hacker Hierarchy ● Elite Hackers – skilled hackers – write hacker tools and exploits – break into systems and hide their tracks
  • 19. Other Terminologies ● Neophyte – Also known as "n00b", or "newbie" – is someone who is new to hacking or phreaking and has almost no knowledge or experience ● Blue hat – someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed
  • 21. Cyber-attack ● any type of offensive maneuver ● by individuals or whole organizations ● targets computer information systems, infrastructures, computer networks, and/or personal computer devices ● Factors that involves – Fear factor – Spectacular factor – Vulnerability factor
  • 22. Threat Trends ● Cyber Crime – Bad guys are mostly Eastern European although Asian groups are also active – A complete service based economy supporting their activities – Attacks are a mix of • social engineering and • technical attack
  • 23. Threat Trends ● Hactivists – WikiLeaks – Anonymous, Lulzsec – DDoS attacks – Data loss • combination of hacking and insiders
  • 24. Threat Trends ● Nation State – Motivations • Espionage • Disruption • Targeting Government + Private Sector
  • 25. ICT Act 2006, Bangladesh
  • 27. Incident Trends, Bangladesh ● Site Defacement – Site hacked by hacker group named Indishell, Sil3nt Hack3r, My@nm@r H4acK3rs Unit – Government sites were targeted (.gov.bd) – Sites running on CMS are not fully patched and inherently carrying bugs which is quite easy for the hacker to penetrate. – Lack of proactive monitoring and enforcement of standards.
  • 29. Case Study – Network Hacking ● Foot Printing ● Port Scanning ● Banner Grabbing ● Searching for Vulnerabilities ● Penetrating
  • 30. Case Study – Network Hacking ● Foot Printing – You see the company e-mails, address, names, when the domain was created, when the domain expires, the domain name servers, and more! – A hacker can also take advantage of search engines to search sites for data • "site : www:thetargetsite:com" this will display every page that Google has
  • 31. Case Study – Network Hacking ● Port Scanning – To detect the port's listening services on server's open ports so as to detect the vulnerabilities – The Nmap Security Scanner is available for both Mac and Windows users: • http://nmap.org/download.html
  • 32. Case Study – Network Hacking ● Port Scanning – To detect the port's listening services on server's open ports so as to detect the vulnerabilities – The Nmap Security Scanner is available for both Mac and Windows users: • http://nmap.org/download.html
  • 33. Case Study – Network Hacking ● Banner Grabbing – Telnet into service port To gure out what software and version of the service – If you are using Windows Vista, then telnet is not installed by default, Use control panel – Programs and Features - Turn Windows features on or o - Telnet Client to install – If you found port 21 (ie ftp) open, then telnet www.targetsite.com 21 to nd out FTP software
  • 34. Case Study – Network Hacking ● Searching for Vulnerabilities – Search a couple vulnerability databases for an exploit – If there's an exploit available, run it against the server and take complete control – Popular exploit databases are Milw0rm, SecurityFocus, osvdb
  • 35. Case Study – Network Hacking ● Attacks – Denial-of-Service(DoS) – Bu er Overfow(BoF)
  • 36. Case Study – Network Hacking ● Penetrating – Running the exploits against the target and penetrating the server – From PT Server – Multiple programming language
  • 37. Case Study – Network Hacking ● Root Access – Root kit deployment – Grab data
  • 38. It is your turn