ON
Student declaration………………………………………………………..i
Acknowledgement…………………………………………………………iv
Executive Summary………………………………………………………..v
Chapter Scheme……………………………………………………………vi
Page no.
CHAPTER 1- INTRODUCTION
1.3.3.1 Population…………………………………………
CHAPTER -3
Findings and Analysis……………………………….
…………………………………………………….
CHAPTER -4
Suggestions………………………….…………………………………………………….
CHAPTER -5
Conclusion ……….…………………………………………………….
Bibliography
Annexures
Miscellaneous
This is to certify that I have completed the Summer Training Project titled “market
study of ethical hacking” under the guidance of “Mrs Usha Nair” in partial fulfillment
GAURAV JUNEJA
CERTIFICATE
This is to certify that the summer training project titled “Market study of
submitted in the partial fulfillment of the requirement for the award of the
guidance & direction. To the best of my knowledge and belief, the data &
information presented by him in the project, has not been submitted earlier.
to_________200X.
him/her hard working, sincere and diligent person and his/her behavior &
Before we get into thick of the things, I would like to add a few heartfelt words for the
people who were part of this project in numerous ways, people who gave unending
support right from the stage the project was conceived. I wish to express my deep sense
of gratitude to Innobuzz Knowledge Solutions and its officials, especially Mr. Ankit
Oberoi (MD), Mr. Atul Aggarwal (Manager, Network Security Department) and Mr.
Deepesh Madan (BM). I also thank to my project guide Mr. Surender Khatri & Ishan
Girdhar. I would like to extend my thanks to all the officials in the divisions of
Information Security. I would also like to thank the faculty and staff of my college,
Maharaja Agrasen Institute Of Management Studies, especially Mrs Usha Nair for
guiding me at each step.
EXECUTIVE SUMMARY
CHAPTER-1:- INTRODUCTION
OBJECTIVE - To know the whole segment of people who are interested in ethical
hacking courses.
.
This chapter shows the collected data and its analysis in an understandable
form.
CHAPTER-4 SUGGESTIONS
This chapter includes the suggestions to the company after data analysis.
CHAPTER-5 CONCLUSION
CHAPTER-1
INTRODUCTION
The purpose behind the market study of ethical hacking is to know the awareness level of
people regarding hacking and information security issues. It helps us to know whether
they would be interested in various ethical hacking courses offered by organizations like
innobuzz knowledge solutions ltd.
The people interested in ethical hacking courses are the potential customers for the
various business organizations which provide training in these courses.
Also, all those potential customers form the market of ethical hacking.
RESEARCH OBJECTIVES OF THE STUDY
To know the whole segment of customers who are interested in training programmes
of ethical hacking.
To know the awareness level of customers about hacking and information security
issues.
1. RESEARCH DESIGN:-
Descriptive research design has been used in this study to collect data for
analysis of the awareness level of assesses. The research design used help in
generating qualitative information from the study.
2. DATA COLLECTION:-
The data or the information collected through the descriptive research design
for the study is primary in nature i.e. the information is collected from primary
resources rather than secondary resources. Survey has been conduced for
collecting the primary data from its sample.
REASEARCH DESIGN
Descriptive design has been used to collect information or data from the samples.
1. POPULATION:-
Population here refers to those individuals who reside in Delhi, India . The individuals
should be literate or well educated.
2. SAMPLE SIZE:-
Sample size refers to the actual units used from the population of a particular study for
the purpose of collecting data or information for the analysis of the data to complete the
study. Here the sample size is very small in accordance to its population. The sample size
is of 100 samples from the population.
3. SAMPLING TECHNIQUE:-
Probability sampling technique has been used to conduct the study where each unit of
population has equal chance of being selected. Probability of each unit is equal and there
is no bias on the selection procedure of the samples. Random sampling which is a type of
probability sampling is used in this project. Randomly means that each unit drawn from
the population to form sample have equal chance of being drawn. Therefore, random
sampling technique is used to collect the sample size.
DATA COLLECTION
For study, the data is collected from primary sources and not from secondary sources.
Primary sources are those where the information is collected at the time of the study and
is an original source of information. It has been collected by the researcher from the
sample at the time of the study.
QUESTIONNAIRE
LIMITATIONS
1. The sample size is very less or negligible in respect of the population size and
therefore won’t be able to present the whole population.
2. Due to small sample size the information collected may not prove beneficial for the
analysis and interpretation of the data.
3. The questionnaire designed to gather data is not appropriate as it does not cover all the
essential elements that are required in the study.
CHAPTER
2
COMP
ANY
PROFILE
Aim
We have also has been supporting and actively participating various National Level
Information Security Seminars and Summits such as EliteX 2008 organized by
Department of Information Technology (Govt. of India), Security Vision 2008 (an
IDG Initiative), NASSCOM Security Summit, 2 Day National Seminar on
Information Security at Delhi College of Engineering, Training Workshops in
Modern School, Central Bureau of Investigation and IIT Delhi, IMS Ghaziabad
Etc.
Industry Tie-Ups
We have strong linkages with the industry. Being partners with organizations like
Microsoft Corporation, IBM, HP and Symantec, we have conducted training
programs in many big corporate houses of India. Innobuzz has been training and
certifying experts in Ethical Hacking and Information Security with its Certified
Information Security Expert (CISE) certification. In the short span of less than
two years, we have catered to over 5500 students in Information Security alone.
Clients
Innobuzz has provided its services to some of the best colleges in India. Included in there
Client list are names such as IIT Delhi, Delhi College of Engineering, St.
Stephens College, Faculty of Management Science, Ambedkar Institute of
Technology, Modern School Barakhamba, Delhi Public School etc.
Some of Our Corporate Clients are DLF India, IBM, Spice Jet, Computer Society
of India, Colt Telecom, Fidelity Investments, Arya Ventures, Dewsoft, L&T,
Godrej, FICCI, Govt. Of India and many more.
Achievements
Course Description
The course is designed for people who have theoretical knowledge of basic concepts
about networking & the internet. This course will provide detailed & practical
knowledge
on various hacking concepts. The course will be followed by an exam, clearing in which
student become a Certified Information Security Expert (CISE)
CISE (Certified Information Security Expert) certification is one of the most recognized
Indian certification in Information Security and Ethical Hacking. The Program covers all
aspects of Information Security and Ethical Hacking, enabling one to become an
Information Security Expert. Online Security Breaches are happening at a very fast rate
and experts are needed to check and cure these. ITS (IT Security) Experts are in
demand. According to NASSCOM, the demand for ITS Experts will be 10 Lakh by 2011
in India. ITS is a THE next big thing in IT and one should make the best of it.
In today's scenario, everything depends on IT. From tax collections, booking the cheapest
airline tickets, banking online to trading shares online. If one is not a
Chapter of IT revolution yet, he is missing on a lot of ease and opportunities. But as
they say, everything comes at a price, and the price one pays here is risking his privacy
and probably his bank balance! Online Security Breaches are happening at a very fast
rate and experts are needed to check and cure these. The demand for IT Security
Professionals is expected to be 1 million by 2011.
DEFINITIONS
• Hacker – refers to a person who enjoys learning the details of computer systems
and stretch their capabilities.
• Ethical Hacker – refers to security professional who apply their hacking skills
for defensive purposes on behalf of its owners.
CHAPTER
3
FINDINGS &
ANALYSIS
YES-98% NO-2%
Analysis- As per the information collected through the survey, it was found that 98% of
the respondents have e-mail accounts. It shows how involved the respondents are in
internet. The people who would want to secure personal information would want to learn
ethical hacking.
Personal information basically comprise of e-mail accounts and bank accounts , etc.
There would be many who would want to secure there e-mail accounts and would want to
learn ways of doing it.
Hence, It is important to know whether respondents have e-mail accounts or not as it
would eventually show whether they would be interested in ethical hacking or not.
Analysis- - As per the information collected through the survey, it was found that over
60% of the respondents have e-mail accounts on yahoo portal. It shows that majority of
people are grabbed by yahoo. Though yahoo has a good name in the portal segment, but
even it can be infiltrated by hackers. It is a fact that no portal is safe from evil hackers.
Also, it has been seen in the past that e-mail accounts of celebrities being hacked and
there personal information being taken.
This question in a way shows that how involved people are in internet and in which portal
they own there account.
YES-83% NO-17%
Analysis- As per the information collected through the survey, it was found that 83%
of the people own there computer systems. The people who own there computer
systems are the ones who are more involved in internet related activities. Hacking is
an internet related activity and it is more known to those who own there systems and
use it frequently.
Also, the market of ethical hacking would involve more of those people who own
there computer systems.
Home-69% institute/college/workplace-13%
Analysis- As per the information collected through the survey, it was found that 78% of
the people know the meaning of hacking. Though many of the respondents who feel that
they know the meaning are not clear about what hacking really is. As a matter of fact,
market of ethical hacking would involve those people who know the meaning of hacking.
Hence, majority of respondents knowing the meaning of hacking is a positive response.
YES-36% NO-64%
Analysis- As per the information collected through the survey, it was found that just 36%
believe that hacking could be ethical. It shows the scope of market of ethical hacking as
most of the respondents are unaware of the fact that hacking could be ethical. Ethical
hacking basically is use of hacking skills by an ethical hacker for defensive purposes.
Most of the respondents are unaware of ethical hacking, and spreading awareness among
them about ethical hacking and its various courses offered could expand the market of
ethical hacking.
It can be said that its negative and as well as positive point that most of the people are
unaware of hacking being ethical. People being unaware about ethical hacking increases
the scope of ethical hacking, so it is a positive point. Only 36% respondents think that
hacking could be ethical shows the low level of awareness among them. Also, it would
mean that less number of people would be interested in ethical hacking courses as less
number of people feel that hacking could be ethical. Hence, it is a negative point as well.
YES-9% NO-91%
• Analysis- As per the information collected through the survey, it was found that a
meager 9% of the respondents know the difference between hacking and cracking.
It shows that they are unaware about basic hacking definitions. It also shows there
low level of knowledge about hacking. Hacking – describes the rapid
development of new programs or reverse engineering of already existing software
to make the code better and efficient.
Cracker – refers to a person who uses his hacking skills for offensive purposes
People generally misunderstand hacking as cracking. Cracking is use of hacking skills for
offensive purposes , while people think hacking is an offensive activity.
Most of the people do not know about cracking. Thus, there is a lot of scope in the market
of ethical hacking as majority of respondents are unaware about it .
YES-92% NO-8%
Analysis- As per the information collected through the survey, it was found that over
90% of the respondents feel that e-mail account can be hacked. It is a positive result as it
is true. E-mail accounts are easy to hack for the high skilled crackers.
The respondents would be interested to know the ways of securing there e-mail accounts
and personal information. Telling them about ethical hacking would definitely generate
there interest. Most of the respondents would be interested in learning the ways of
securing information.
Thus, those respondents would be the potential customers of the organizations like
innobuzz knowledge solutions . It can be said that those potential customers depict the
market of ethical hacking.
YES-5% NO-95%
Analysis- As per the information collected through the survey, it was found that 5% of
the respondents has experienced there account being hacked.
These 5% people would be the definite people who would want to learn to secure there
personal accounts and information.
These respondents would be a part in the market of ethical hacking as they would be
interested in the different courses offered of ethical hacking.
11. Do you think Hacking can cause damage to you in Monetary terms?
12. Who would you approach if in case your account got hacked?
Analysis- As per the information collected through the survey, it was found that most of
the people would approach a computer professional if there account got hacked(43%).
Also, a significant number of respondents(34%) opted to approach the local police.
According to law, cyber crimes like account hacking are punishable. So, it is a good step
to approach the police. But a computer professional who is an expert in ethical hacking
could even examine how the account got hacked.
Here, it can be seen that respondents would approach professionals for solving there
cyber problems.
Hence, it can be said that a considerable number of respondents would be interested in
ethical hacking courses in order o tackle cyber crimes.
13. Do you think that your local Police would be of any use if your account has
been hacked?
Analysis- As per the information collected through the survey, it was found that almost
70% respondents feel that local police would be of no help. According to information
technology act 2000 any cyber crime like account hacking are punishable under law. So,
to approach the police would be a right step, but a majority number of respondents do not
feel the same as they don’t trust the police in solving cyber crimes, and also among them
are people who are unaware about the information technology act.
YES-14% NO-86%
Analysis- As per the information collected through the survey, it was found that 75% of
the respondents are unaware about the information technology act, 2000. According ti IT
Act 2000, any cyber crime like hacking e-mail accounts are punishable under Indian
laws.
Three in four respondents are not aware about IT Act 2000. It gives a strong message
depicting the level of unawareness about cyber crimes and laws against them.
It shows that people need to learn about these issues and ethical hacking courses are a
good prospect for them. These respondents would form a part of market of ethical
hacking.
15. Would you like to know the ways to make your system more secure?
YES-74% NO-26%
Analysis- As per the information collected through the survey, it was found that over
80% of the respondents are interested in knowing the ways to make there system more
secure. It is a positive response as more number of respondents would be interested in
learning to secure information and ethical hacking. These respondents could be the
potential customers of ethical hacking trainers like innobuzz.. They all would form a part
of market of ethical hacking.
CHAPTER
4
SUGGESTIONS
SUGGESTIONS
Company should alter its training programs /courses according to the needs of the
customers. It would make the courses more customer friendly. Also, it would
result in increased productivity.
Company should tell the customers about their System and Information Security
so that they can self analyze that there is no unethical information are being used.
Company should make the website where customers can put there views and
show what actually they want. It would give the customers a chance to tell what
they think and what should be introduced.
They should also use effective ways of advertising like computer based
magazines where they would find more people interested in there training
programs.
CHAPTER
5
CONCLUSION
CONCLUSION
This study indicates that awareness level of most of the people is low reharding
ethical hacking. It shows that they are willing to learn new ways of securing there
systems. Also, it is seen that there is a wide scope of ethical hacking, as more
number of people are unaware about it and need to learn it. According to
NASSCOM, the demand of IT Security professionals is expected to be one
million by 2011.
To conclude, there is a vast scope of ethical hacking in India and there is a need of
more IT Security companies like Innobuzz in India.
BIBLIOGRAPHY
Books Referred:
1. Hacking Dummies
By Kevin Beaver
By Ankit Fadia
By Kevin Metnick
4. Hacking Expose
By Kurtz
Website Referred:
www.innobuzz.in
www.hackersden.com
www.hackingtruths.in
www.onlineaccount.co.in
www.go4expert.com
ANNEXURE
Query form
(ONLINE)
Name : *
Address : *
City : *
State : *
Country : *
Telephone No. : *
Fax :
E-Mail ID : *
Information Required : *
(limited to 50 words)
SUBMIT RESET
QUESTIONNAIRE
(FORM)
………………………………………………………………………………
Name of respondent :
Contact no. :
City :
State :
Country :
E-mail ID :
………………………………………………………………………………
YES NO
YES NO
Yahoo En Gmail
Rediff AOL
Others
4. Do you know the meaning of “Hacking”?
YES NO
YES NO
YES NO
YES NO
YES NO
YES NO
10.Would you approach your local police in case your account got
hacked?
YES NO
11.Do you think that your local Police would be of any use if your
account has been hacked?
YES NO
13.Would you like to know the ways to make your system more secure?
YES NO
__________________________________________________________
__________________________________________________________
__________________________________________________________