A Timeline of HACK TACTICS…

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

7 Effective Habits when using the Internet Philip O’Kane 1.
INTERNET SAFETY.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Hacking M***********s!!. Who is this guy? John Draper (aka Captain Crunch)
The History of Hacking By: Monica Flores.
By Sean Owens. Hacking 101 Hacking has been around pretty much since the development of the first electronic computers. The first computer hackers emerge.
Computers in Society Week 8: Computer Security and Hacking.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Internet Security Awareness Presenter: Royce Wilkerson.
W15D2. Malware = malicious software Viruses, Trojan horses, Worms. Goal: usually financial gain (at the expense of the victim) C-card info disrupt service.
Presentation By Timothy Mangas. Why should we worry? Crimes committed using the computer or Internet can be more costly (money wise) than other crimes.
L o g o Types of Computer Crime Zhuravlev Alexander 326 MSLU.
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
Threats to I.T Internet security By Cameron Mundy.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Are you safe? Alyssa Caputo & Niki Labella Itech 1101 Dr. Nagel.
BY: JASMIN, PRABHJOT, BANDEEP, SUKHJIT, DAWINDER The Top 10 Most Prominent Hackers.
Social impacts of the use of it By: Mohamed Abdalla.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Viruses.
Online Social Networking. Agenda Survey Results What is Online Social Networking? Popular Online Social Networking Sites Privacy Settings for Facebook.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
computer Viruses Ever MAde To Protect What Matters
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Hackers By- Rima Rai. What are hackers? Hackers are people who hack other people’s account to just have fun or make money. They also do it so they themselves.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
CONTROLLING INFORMATION SYSTEMS
INTRODUCTION & QUESTIONS.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
By : Syed Shabi Ul Hassan. What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet.
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Social Impacts of IT: P6 By André Sammut. Social Impacts IT impacts our life both in good ways and bad ways. Multiplayer Games Social Networks Anti-social.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Internet Safety.
Safety.
Fraud Protection.
Misuses of ICT Malpractice and crime © Folens 2008.
Learn how to protect yourself against common attacks
Computer Network Security
A Project on CYBER SECURITY
Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker
Challenges We Face On the Internet
Chapter 11 crime and security in the networked economy
Anastasios Papaefthimiou Lefteris Tsabras Dimitris Thomadakis
Sissy r. osteen, ph.d., cfp® Oklahoma State University
Issues In media studies: Cyberbullying
Assalamualaikum Today, I am going to give a presentation on
COMPUTER CRIME.
Lesson 2- Protecting Yourself Online
The Art of Deception.
Protecting Yourself from Fraud including Identity Theft
Introduction to Cybercrime and Security
– Communication Technology in a Changing World
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Lesson 2- Protecting Yourself Online
Security in mobile technologies
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as.
Presentation transcript:

A Timeline of HACK TACTICS… Hacking history : A Timeline of HACK TACTICS…

After reading this article you guys are going to get the answer of Hackers - innovative or immoral ??? Hackers have always fascinated the public. Films books, and video games have all attempted to explore the hacker psyche - but just who are these mysterious figures ?? Take a look at this timeline of hacking history, from the phone phreaking to corporate theft.

Hacking begins in the 60s at MIT. 1960 Hacking begins in the 60s at MIT.

1970s 1971 1972 John Draper invents the ‘blue box’ – a method of making free long distance calls. Steve Wozniak and Steve Jobs learn the art of phreaking, taking the names ‘Berkeley Blue’(Wozniak) and ‘Oaf Tobar’ (Jobs) .

1980s 1981 1984 1986 The Chaos Computer Club, Europe’s largest association of hackers, is formed. The first edition of 2600: The hacker Quarterly is published. The Computer Fraud and Abuse Act is passed in the US. 1988 1988 1989 Kevin Poulsen hacked a federal computer network. Robert Morris becomes the first person to be convicted under the Computer Fraud and Abuse Act. Robert Morris developed the ‘Morris Worm’, the first computer worm on the internet.

Valdimir Levin is caught and sentenced to 3 years in prison. 1991 1992 1994 Kevin Poulsen is caught and arrested by police. He is sentenced to 5 years in prison. Kevin Mitnick breaks his probation terms from an earlier conviction and goes on the run. Vladimir Levin accesses the accounts of Citibank’s customers thro’ their dial-up wire transfer service, and steals around $10 million. 1995 1995 1997 Kevin Mitnick is finally arrested after two and a half years and sentenced to over 5 years in prison. Valdimir Levin is caught and sentenced to 3 years in prison. AOHELL, a hacking program, brings the AOL network to its kness, disrupting chat rooms and inboxes..

2000s 2000 The ILOVEYOU computer worm is released It rapidly spreads thro’s email accounts, causing $10billion damage before it is finally stopped. 2000 Michael Calce (MafiaBoy) launces a series of Distributed Denial of service (DDoS) attacks, bringing down Yahoo!, eBay, CNN, Amazon and Dell.com in the space of week.

2001 2001 2002 Gary McKinnon (Solo) hacks into 97 US military and NASA computer, deleting files and posting messages. Michael Calce is arrested and sentenced to open custody, after bragging about his DDoS attacks on internet chat rooms. Gary McKinnon is indicated by the US, who request his extradition. He could face up to 70 years in prison. 2002 2004 Adrian Lamo(The homeless hacker) hacks the website of The New York Times. AOL staff member Jason Smathers steals the details of 92 million customers. This results in 7 billion spam emails, and over a year in prison for Jason.

George Hotz hacks the PlayStation 3. 2004 2007 2008 Adrian Lamo is charged with computer crimes and sentenced to 6 months in prison. George Hotz becomes the first person ever to carrier unlock the iPhone. The Chaos Computer Club publishes fingerprints of German Minister of the Interior, as a protest against the use of biometric data in German identity. 2010 2010 George Hotz hacks the PlayStation 3. Barnaby Jack the Black Hat conference and makes 2 ATMs dispense fake paper money in front of the audience.

2010 2011 2011 The Stuxnet worm causes serious damage to an Iranian nuclear facility, damaging physical equipment as well as computer sysem. Hacker group hacks Sony repeatedly, staling information from 70 million user accounts. Barnaby Jack hacks as insulin pump at the McAfee FOCUS 11 conference. 2012 2012 Home Secretary Theresa May finally blocks Gray McKinnon’s extradition. MasterCard and Visa are hacked. More than 1,5 million customers have their credit card numbers stolen.

Syrian Loyalist hack the Twitter account of the Associated Press. 2013 2013 Hacking group Anonymous hack the Twitter and Flicker accounts of the North Korean governments, Posting insulting pictures and inflammatory comments. Syrian Loyalist hack the Twitter account of the Associated Press.

Facts : 90% of people delete suspicious emails from their PCs. But only 56% do the same on their mobile devices.

On average $113 billion is stolen through cybercrime every year. It would take 10 minutes to hack a 6 – character lowercase password. It would take 44,530 years to hack 9 – character password with lowercase, uppercase letters, numbers and symbols. A quarter of people don’t have any antivirus protection on their PCs. 1 PC = 1,000 Websites, 30,000 websites are hacked every day. More than a million people becomes victims of cybercrime every day. There are 378 million victims a year or 12 victims a second.