Want to create interactive content? It’s easy in Genially!

Get started free

Ethical Hacking and Cybersecurity

Pablo

Created on November 25, 2024

Start designing with a free template

Discover more than 1500 professional designs like these:

Dynamic Visual Presentation

Corporate Christmas Presentation

Customer Service Manual

Business Results Presentation

Meeting Plan Presentation

Business vision deck

Economic Presentation

Transcript

Ethical Hacking and Cybersecurity

Pablo Molina Escriche

Introduction

During this presentation, we'll learn about the meaning and differences of hacking and cyber-attacking. Some of the most common tools that are used. Usual hacking techniques to be aware of, and useful methods to protect our accounts and privacy from them.

INDEX

What is hacking?

Tools

Common techniques

Prevention measures

What is Hacking?

  • Exploiting vulnerabilities in an organization's networks and IT systems to gain unauthorized access or control over digital files. Hackers are not the same as "cyber attackers."
  • Ethical hacking, on the other hand, is defined as the use of hacking skills and tools to legally and ethically evaluate the security of a computer system or network. The goal is to identify and fix vulnerabilities before they are exploited.

Tools

Wireshark:

Kali Linux:

03
01

Network protocol analysis.

A distribution specifically designed for penetration testing and security auditing.

Contextualiza tu tema con un subtítulo

Invicti:

04

Nmap:

02

Simulates hacker behavior, enabling automated vulnerability detection.

Network exploration.

Common hacking techniques

PHISHING

  • Pretending to be a legitimate company or website through emails or pop-ups to deceive the victim and trick them into entering their information on a fake form, leaving them vulnerable to hackers.

Brute Force Attacks

Man-in-the-Middle (MitM)

Social Engineering

Based on trial and error, often used to crack weak passwords.

Methods such as conversations, eavesdropping, psychological manipulation, and others to directly extract information from an individual.

Also known as data spying, it involves intercepting and manipulating communications between two systems.

Keyloggers

Malware that records keystrokes and sends them to its distributor.

Prevention Measures

Secure and updated passwords.

Minimize digital footprint.

Avoid public networks.

Prevention Measures

Authentication mechanisms.

Antivirus and antimalware software.

Bibliography and references

  • EC-Council Official Website: https://www.eccouncil.org
  • Kali Linux Official Documentation: https://www.kali.org/docs
  • Nmap Official Website: https://nmap.org
  • Wireshark Documentation: https://www.wireshark.org/docs
  • OWASP (Open Web Application Security Project): https://owasp.org
  • National Institute of Standards and Technology (NIST): https://www.nist.gov