Presentation is loading. Please wait.

Presentation is loading. Please wait.

Prepared by: Nahed Al-Salah

Similar presentations


Presentation on theme: "Prepared by: Nahed Al-Salah"— Presentation transcript:

1 Prepared by: Nahed Al-Salah
Unit 20 The ex-hacker Prepared by: Nahed Al-Salah Button

2 Who is a hacker ? He is a person who attempts to gain unauthorized access to network system. They are often young teenagers through they are usually fairly skilled programmer ( people who write computer programs) The hackers could be named geek ( an expert lacking in social skills) Note : it now used in computer to mean a dedicated expert. anorak : ( a slang term for an eccentric , socially inept person with little or no fashion sense and having an obsessive interest in a hobby or subject.

3 People become hackers for many reasons
Making many Criminals purposes Expose political informal People hack ( break into a computer system) because it’s an exciting challenge.

4 Is hacking legal or illegal?
Since hacking ( attempting to gain unauthorized access to a network system ) is illegal. Hackers wants to keep their true identity is secret. They like to call themselves by special names such as “ analyzer” . They like to form hacking groups or teams that work together and exchange ideas.

5 How hackers attack and penetrated computer systems?
hackers like to attack and penetrate the computer systems belonging to large companies such as :- Pentagon’s computer system Computer systems belonging to US military bases. Hotmail “ free service provided by Microsoft Corporation”

6 Steps for breaking computer systems
Hacking is done gradually : Hackers gaining entry to system gradually. Planting password in the systems , allowing them to gain access to the system more easily.

7 What are the things done to computer systems ?
Most hacks are done by company staff misusing the company network. downloading files ( copying files from a server computer) and leaking confidential information. Posting information is the term used for making information available to a large number of users in a newsgroup( an internet discussion group that uses a restricted area on a server computer to display messages about a common interest) or on bulletin board ( an electronic notice board system that enables users to read ). exposing ( electronic ) correspondence managed by well-known services, causing the services to be shut down while the exposed weakness in the system is repaired.

8 Programming server computers to reroute ( send to different address than the one it was originally sent to ). Hijacking websites by redirecting the web address ( URL) to point to another website. Defacing websites by changing the text and graphics on the webpages, sometimes leaving very rude messages on the system. Blackmailing ( the owners of websites by threatening to damage their systems by doing something like releasing virus ( a program that can reproduce itself and is written with the purpose of causing damage or causing a computer to behave in an usual way) onto their system, although such a threat often turns out to be nothing more than a hoax.

9 When the large companies hired the hackers
Large companies as security experts employ hackers to test out the companies systems by trying to hack into them and fins any weakness in their system and to make Cyberspace safer ( is the combination of all data on all the computer network throughout the world , accessed by using internet.  “A white hat “ hacker is a person who uses hacker skills to make Cyberspace safer. A computer system can be hacked in various ways Guessing somebody’s password( secret code used to control access to a network system). Finding bug ( a fault in a system ) that allows certain passwords to access information they are not supposed to access. Phoning a company, pretending to be a company employee and asking for a password. People tend to be too trusting.

10 Different ways of avoiding being hacked
Installing firewall ( a combination of hardware and software used to control the data going into and out of a network). Using a callback system ( a system that automatically disconnected a telephone line after receiving a call and then dials the telephone number of the system that made the call, to reconnect the line. It is used to remote access systems to make sure that connections can only be made from permitted telephone numbers.) Having really secure passwords ( secret codes used to control access to a network system ) -don’t use common names or dictionary words. Auditing the system regularly ( checking the system regularly using event logs to find failed access attempts ).

11 What could you do to avoid credit card theft on the internet
Using a separate credit card for internet purchases. Having a small credit card limit on the credit card you use. Buying a pre-paid charge card for small purchases. Note : In the future, smart cards( plastic cards containing a processors and memory chip that can be used to store large amounts of confidential data) will be used instead of credit cards. This will require smart cards readers (devices used for reading smart cards) to be attached to computers.

12 Exercises Text Book


Download ppt "Prepared by: Nahed Al-Salah"

Similar presentations


Ads by Google