Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally.

Similar presentations


Presentation on theme: "Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally."— Presentation transcript:

1 Computer Hacking By: Caleb Herring Katie Edom

2 What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally or illegally, to a computer or file. The term for computer hacker can also mean one who is skilled in programming, but the actual definition is that from above. The term can also mean those who modify software or hardware to use outside the original purpose it was designed for.

3 Types of Computer Hackers White Hats – Break security for non-malicious purposes, usually to test a security system for themselves or a company. Black Hats – Breaks security for little reason other than malicious use and personal gain. (What we think of. ILLEGAL!!!!) Gray Hats – Those who lie between white and black. They could hack merely to notify the administrator of a whole in security and offer to fix it for a fee, or take that information and give it to a group of people.

4 Types continued Elite Hacker – Social status among Hackers. Newly discovered exploits circulate among these people. Include groups such as Masters of Deception Script Kiddie – an unskilled hacker who breaks into systems using automated tools written by others. Usually with little understanding of what theyre doing. Neophyte (noob) – Someone new to hacking who has little to no knowledge of the workings of hacking. Hacktivist – Those who use their skills for political activism

5 How do people computer Hack? There are many ways people can hack into a system, either using the “front door” or the “backdoor”. The “Front door” is used by the hacker getting a hold of the password for whatever they are after, and entering, disguised as you. The “backdoor” is a route left in a program for programmers to utilize to change things about the code.

6 Why do people Hack? Some are hired by companies to test their security systems to see how strong their defense is. (White Hats) Others want personal gain. Whether this includes stealing identity, money, etc. it does not matter to these people. (Black Hats) Others merely enjoy the challenge. It could be as simple as they have nothing better to do.

7 What can you do to protect yourself? In all practicality, on the Internet, if someone really REALLY wants your information, there is nothing you can really do to stop them. However, you can make it difficult by: Make sure your firewall is always on Install/update antivirus software Keep OS up to date Be careful what you download Turn off your computer.

8 Other Tips Use Passwords on everything Don’t back up sensitive Data online Don’t link accounts Security Questions Spread misinformation

9 Famous Groups of Hackers Anonymous (A more recent and famous one) Masters of Deception Lizard Squad (against Playstation and Xbox) Legion of Doom TeslaTeam

10 Recent Cases of Computer Hacking With the more famous group, Anonymous, many computer hackings have happened within the last decade. In 2010, Anonymous became aware of Aiplex Software, an Indian Software Company that contracted with film studios to launch DDoS attacks against websites offering such as The Pirate Bay. Thus launch an operation known as “Payback is a B****” Anonymous coordinated and launched a DDoS attack against Aiplex’s website that shut it down for a day.

11 Anonymous Operation Cont. Other Companies were targeted which include Recording Industry Association of America (RIAA) and the Motion Picture Association of America. (MPAA) in which their websites were also shut down. The group issued a press release stating: “Anonymous is tired of corporate interests controlling the internet and silencing the people’s rights to spread information, but more importantly, the right to SHARE with one another. The RIAA and the MPAA feign to aid the artists and their cause; yet they do no such thing. In their eyes is not hope, only dollar signs. Anonymous will not stand for this any longer.” Eventually, the number of targets increased and the united operation split, one group increasing the number of targets hit, including paypal. This led to be known as the Paypal 14, when 14 members were found and arrested, 13 pleading guilty.

12 http://www.thefreedictionary.com/Computer+hackin g http://www.thefreedictionary.com/Computer+hackin g http://www.wisegeek.org/what-is-computer- hacking.htm http://www.wisegeek.org/what-is-computer- hacking.htm http://www.webroot.com/us/en/home/resources/artic les/pc-security/computer-security-threats-hackers http://www.webroot.com/us/en/home/resources/artic les/pc-security/computer-security-threats-hackers http://en.wikipedia.org/wiki/Hacker_(computer_secu rityhttp://en.wikipedia.org/wiki/Hacker_(computer_secu rity) http://en.wikipedia.org/wiki/Hacker_(computer_secu rity

13 https://ethics.csc.ncsu.edu/abuse/hacking/study.php http://cybercrime-defense.whocanisue.com/hacking- considered-cyber-crime/ http://cybercrime-defense.whocanisue.com/hacking- considered-cyber-crime/ http://www.fbi.gov/scams-safety/computer_protect http://thenextweb.com/insider/2014/09/03/protect- hackers-least-make-difficult/ http://thenextweb.com/insider/2014/09/03/protect- hackers-least-make-difficult/


Download ppt "Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally."

Similar presentations


Ads by Google