Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

No description
by

Mohd Basil Athamneh

on 28 December 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of

ETHICAL HACKING

Topics :

Trojans horse


What is a Trojan ?

What Trojan creator looks for ?

Indications of Trojan attack ?

Trojan countermeasure ?
CD – ROM drawers opens and closes by itself

Strange chat boxes appear on victim’s computer

Computer screen flips upside down

Wallpaper or background setting change

Documents or messages are printed from the printers themselves

Windows color setting change

The computers shuts down and powers off itself

The account passwords are changed or unauthorized


In 2012, there were 12.6 million cases of identity theft in the US alone, an increase of over one million people since 2009.[1] And if that's not enough to worry you, the San Diego based Identity Theft Resource Center has calculated that it takes about 600 hours to restore your reputation after identity theft.[2] While people are getting better at recognizing identity theft, and minimizing the damage,


The crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's name or identity in order to make transactions or purchases.


Definition

People always thinking that identity theft is always related to money, but today I want tell that
is related to many things in our life and that’s why there are 8 types of identity theft includes:


Identity theft types

1-Financial Identity Theft
2-Insurance Identity Theft
3-Medical Identity Theft
4-Criminal Identity Theft
5-Driver’s License Identity Theft
6-Social Security Identity Theft
7-Synthetic Identity Theft
8-Child Identity Theft


Identity theft is a serious problem affecting more people every day. That’s why learning how to prevent it is so important.
Knowing how to prevent identity theft makes your identity more secure. The more people who know how to prevent identity theft, the less inclined others may be to commit the crime. 

Preventing identity theft starts with managing your personal information carefully and sensibly. We recommend a few simple precautions to keep your personal information safe:

To prevent identity theft, experts recommend that you regularly check your credit report with major credit bureaus,
follow up with creditors if your bills do not arrive on time, destroy unsolicited credit applications, and protect yourself by not giving out any personal information in response to unsolicited e-mail.

HOW TO PREVENT PEOPLE FROM IDENTITY THEFT?

The Question?!!

1-Only carry essential documents with you.









2-Keep new checks out of the mail.






3-Be careful when giving out personal information over the phone.

4- Your trash is their treasure.

5- Make sure others are
keeping you safe.

6- Stay on top of your credit.


7-Protect your Social Security Number.




8-Follow your credit card billing cycles closely.





9-Keep a list of account numbers, expiration dates and telephone numbers filed away.






10-Create passwords or PIN numbers out of a random mix of letters and numbers.

Ethical hacking
Cryptography
penetration testing
Agenda
Types of pen testing
Pen testing Phases
Pen Testing Methodology
Full transcript