Presentation is loading. Please wait.

Presentation is loading. Please wait.

Protection from Internet Theft By James Seegars. What Is Hacking? Definition – A)To change or alter(Computer Program) – B) To gain access to (a computer.

Similar presentations


Presentation on theme: "Protection from Internet Theft By James Seegars. What Is Hacking? Definition – A)To change or alter(Computer Program) – B) To gain access to (a computer."— Presentation transcript:

1 Protection from Internet Theft By James Seegars

2 What Is Hacking? Definition – A)To change or alter(Computer Program) – B) To gain access to (a computer file or network) illegally or without authorization.

3 Who are the Hackers Stereotype – Anti-social, creepy, maybe (Fat), person in the basement of their parents house, usually very intelligent or good with computers Truth – Anybody can be hackers now.

4 How Does one Hack? This can be answered in a variety of different ways. – Spyware- is a software that aids in gathering of information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.

5 Hacking Cont. Vulnerability scanner – A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses. Hackers also commonly use port scanners. Port scanner- Software that probes a server or host for open ports.

6 Still Cont. Password cracking – Process of getting passwords from data that has been stored in or transmitted by a computer system. – Can also be done by just guessing passwords.

7 Packet Sniffer A packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.

8 Rootkit A rootkit is designed to conceal a attack of a computer's security, and can represent any of a set of programs which work to take control of an operating system from its owners. Usually, a rootkit will hide its installation and attempt to stop its removal through a subversion of standard system security. Rootkits may include replacements for system binaries so that it becomes impossible for the owner to detect the program on the system by looking at process tables.

9 Social Engineering This is when hackers use alternative methods to get into systems. By emailing spyware by masquerading as a customer or any variety of thing to get information on the system.

10 Trojans I’m not talking bout the condoms either. It’s usually a virus that looks like one thing but is something else. Try to open up a backdoor to systems.

11 Viruses We all now what these are. At least I hope.

12 Worms Similar to a virus but doesn't attach itself to any program to replicate. It also goes through entire networks.

13 Key logger Well kind of self explanatory. It is a program like a virus or trojan that installs itself on a computer and records key strokes for later uses.

14 What can we do to stop this? Update your computer regularly along with your virus protection(Norton etc). Don’t download unsafe programs or open email from people you don’t know. Have a firewall on your computer. Check your firewall and make sure there have not been any attacks on your computer or network.

15 Identity Theft This happens when you get hacked and they get important info(Solcial Security Number, Address, Phone Number etc.) When this happens 1 of 2 things happened – 1) you got hacked and information about you was stolen and they used that to steal your identity. – 2) Or a company that has your information got hacked and they are at fault for you losing credit or money.

16 Things that help Have a company that can protect from identity theft (Lifelock etc.)

17 Problem with hackers If they are good enough and actually want in your system, they can get in. It’s impossible to make a perfect system that will protect you completely from hackers. All you can do is make it harder for them to get at you.

18 References Record Data Breaches in 2007. (2008). Information Management Journal, 42(2), 16. Gilman, N. N. (2009). Hacking goes pro [engineering security]. Engineering & Technology (17509637), 4(3), 26-29. doi:10.1049/et.2009.0304 The Cybersecurity Risk. (2012). Communications of the ACM, 55(6), 29-32. doi:10.1145/2184319.2184330 Sturdevant, C. (2005). Best defense is good offense. Eweek, 22(12), 45-46. Hacking Attacks - Prevention. (n.d.). High Traffic Web Hosting | Dedicated Hosting | Dedicated Servers | Web Hosting | Reseller Hosting | Managed Hosting | Remote Backup Storage | Server Security // Crucial Paradigm. Retrieved May 8, 2013, from http://www.crucialp.com/resources/tutorials/website-web-page-site- optimization/hackingattacks- prevention.php


Download ppt "Protection from Internet Theft By James Seegars. What Is Hacking? Definition – A)To change or alter(Computer Program) – B) To gain access to (a computer."

Similar presentations


Ads by Google