Presented by: Kevin Regaldo Phillip Dai

Slides:



Advertisements
Similar presentations
UNIT 20 The ex-hacker.
Advertisements

Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
Protection from Internet Theft By James Seegars. What Is Hacking? Definition – A)To change or alter(Computer Program) – B) To gain access to (a computer.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Computer Threats I can understand computer threats and how to protect myself from these threats.
Hacking M***********s!!. Who is this guy? John Draper (aka Captain Crunch)
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Computer Security and Penetration Testing
What is hacking? Taeho Oh
Prepared by: Nahed Al-Salah
WHAT IS HACKING ? Hacking is unauthorized use of computer and network resources. The term "hacker" originally meant a very gifted programmer. In recent.
1 UNIT 20 The ex-hacker Lecturer: Ghadah Aldehim.
Hands-On Ethical Hacking and Network Defense
Business Data Communications, Fourth Edition Chapter 10: Network Security.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Computer Security and Penetration Testing
Computer Hacking Cybercrime (1).
Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally.
ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.
Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Bridges To Computing General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited.
PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD NUR’ ARINA ATIQAH BT ASRAR
HACKER Someone who attempts to break into computer system. Typically, this kind of hacker would be a proficient programmer or engineer with sufficient.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Eng. Hector M Lugo-Cordero, MS CIS4361 Department of Electrical Engineering and Computer Science February, 2012 University of Central Florida.
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website
1 Copyright © 2014 M. E. Kabay. All rights reserved. Taxonomy of Computer Security Breaches CSH6 Chapter 8 “Using a Common Language for Computer Security.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
The Art of Deception: Controlling the Human Element of Security by Kevin D. Mitnick, William L. Simon, Steve Wozniak Kevin D. MitnickWilliam L. SimonSteve.
Ghost in the Wires Kevin Mitnick 2012 Heather Sliwoski CS
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
Network Security and Security in Industry Paul Curtis.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Christopher Simpson. Road Map Definition of wiretapping Laws concerning wiretapping Legal justifications of wiretapping What wiretapping means to you.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Computer Hacking By: Ethan Wolfe. What is Computer Hacking? Computer Hacking- The practice of modifying computer hardware and software to accomplish a.
The Art of Deception: Controlling the Human Element of Security
Seminar On Ethical Hacking Submitted To: Submitted By:
Ethical Hacking By: Erin Noonan.
HACKING VS PENTESTING NURUL HAFIZAH HAZWNI BINTI HASHIM (MCS151019)
Network Security Fundamentals
IT Security  .
Threats By Dr. Shadi Masadeh.
Systems Security Keywords Protecting Systems
Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker
Wiretapping Christopher Simpson.
Computer Basics Technology’s Impact.
Click to edit Master subtitle style
Chapter 11 crime and security in the networked economy
The Impact Of ICT “Hacking”
Ethical hacking
CertStore Solution is a platform of 100+ IT professionals and having 500+ IT/Security and Academic courses. Cert Store is the Gold and Accredited partner.
Tool Server Workstation Router Universal
Computer Security Elaine Munn Introduction to Computer Security.
The KGB the Computer and Me
The Art of Deception.
BCT 2.00 Analyze Technology Issues
Computer Crime and Security Measures
Societal Issues in Computing (COMP466)
Faculty of Science IT Department By Raz Dara MA.
Introduction to Cybercrime and Security
Computer Security By: Muhammed Anwar.
Presentation transcript:

Presented by: Kevin Regaldo Phillip Dai Hackers Presented by: Kevin Regaldo Phillip Dai

Hacker Defined… Hack (used with computers) verb : to devise or modify (a computer program), usually skillfully. Hacker: Person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular. Hacker definition controversy: Good Hacking vs. Bad Hacking

Kinds of Hackers Black Hat: White Hat: Grey Hat: Script Kiddie: Specialize in accessing networks, remote computers, and/or uses of technology without interest in legality of action. White Hat: Specialize in penetration testing, such as testing own security system, often work as security consultants. Grey Hat: Hacker with borderline ethics may or may not commit crimes during course of exploits. Script Kiddie: Derogatory term used to describe those who use programs developed by others to attack computer systems.

Common Programs Vulnerabilty Scanner: Packet Sniffer: Trojan Horse: Check computers on a network for know weaknesses, Comparable to a port scanner which looks for open “ports” on a computer. Packet Sniffer: Captures data packets used to capture passwords and other data. Trojan Horse: Sets up a back door in a system which allows the intruder access later. Keyloggers: Tool designed to record keystrokes, usually combined with virus, worm, or Trojan horse to remain hidden.

Tech Model Railroad Club Tech Model Railroad Club (TMRC) Where “hackers” originated. Signals and Power Subcomittee would literally ‘hack’ into the power and relays to either improve performance or fix a problem. TMRC “hackers” became the nucleus of MIT’S Artificial Intelligence Lab in early 80’s.

Phreaking Phreaking : Phone + Freak Single Frequency Phone Lines Multi-Frequency Phone Lines 1957, Joe Engressia discovered whistling forth E above middle C or 2600HZ would cause the switch to think the call was over which left the system open to exploitation. Provided free long-distance and international calls

Bulletin Board Systems Computerized Bulletin Board System Started in Chicago 1978 by Ward Christensen and Randy Suess. Went online in Feb 16, 1978 Computer system running software that allows users to connect and log into system. Predecessor to internet forums/chat rooms. Accessed only over a phone line using a modem.

Dawn of modern computational hacking BBS became popular, served as a meeting ground for previously scattered phreakers to share discoveries and experiments. Since BBS was accessed through phone lines, early hackers would use phreaking methods to find open lines and modem numbers belonging to businesses .

Kevin Mitnick Black Hat Started exploiting bus punch cards to get free rides. Hacked: Computers Stole corporate secrets Scrambled phone networks National defense warning system

Aftermath… 2 ½ year coast-to-coast hacking spree “The most wanted computer criminal in United States history” –The Department of Justice Arrested in 1995 Charged with breaking into the Digital Equipment Corporation’s network and stealing software. 5 years in prison (8 months of solitary confinement)

Today Inspired 2 movies: Computer security consultant Author/Speaker Freedom Downtime Takedown Computer security consultant Author/Speaker The Art of Intrusion The Art of Deception

Tsutomu Shimomura Research scientist in computational physics Got hacked by Kevin Mitnick White Hat Helped FBI track down Mitnick Computer security expert for NSA.

Tim Berners-Lee Computer scientist MIT Professor World Wide Web Works for UK govt. to help make data more open and accessible on the web Net Neutrality: “Connectivity with no strings attached.”

References http://dictionary.reference.com/browse/hack?&qsrc=2939 http://en.wikipedia.org/wiki/Phreaking#Computer_hacking http://en.wikipedia.org/wiki/Bulletin_board_systems#Content_and_access http://www.itsecurity.com/features/top-10-famous-hackers-042407/ http://en.wikipedia.org/wiki/Kevin_Mitnick http://en.wikipedia.org/wiki/Tsutomu_Shimomura http://en.wikipedia.org/wiki/Tim_Burners_Lee