Hacking M***********s!!. Who is this guy? John Draper (aka Captain Crunch)

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Lecture: Malicious Code CIS 3360 Ratan K. Guha. Malicious Code2 Overview and Reading Assignments Defining malicious logic Types Action by Viruses Reading.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer Basics Rabie A. Ramadan, PhD 6. Viruses, Worms, Zombies, and others 2.
Ethical and Social...J.M.Kizza 1 Module 9: Computer Crimes Introduction History of Computer Crimes Computer Systems Attacks Motives Costs and Social Consequences.
The History of Hacking By: Monica Flores.
By Sean Owens. Hacking 101 Hacking has been around pretty much since the development of the first electronic computers. The first computer hackers emerge.
11 ASSESSING THE NEED FOR SECURITY Chapter 1. Chapter 1: Assessing the Need for Security2 ASSESSING THE NEED FOR SECURITY  Security design concepts 
JOHN DRAPER AMERICAN COMPUTER PROGRAMMER AND “PHONE PHREAK” Presented by Macie Franklin.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
ARE COMPUTER HACKER BREAK-INS ETHICAL?. Introduction Virus: –Attaches itself to a program or file so it can spread from one computer to another, leaving.
Hacker Ethics Kim Bissett Sabrina Short. Hacker Ethic: In General  Freedom of Information The web is not physical; it couldn’t be interpreted as property,
Computer and Internet Crimes By: Tracey Ross & Tommy Brown.
Downloading + Viruses. Downloading Modems (56K) V.90 DSL (digital subscriber line) Cable Modem Satellite.
W15D2. Malware = malicious software Viruses, Trojan horses, Worms. Goal: usually financial gain (at the expense of the victim) C-card info disrupt service.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Presentation By Timothy Mangas. Why should we worry? Crimes committed using the computer or Internet can be more costly (money wise) than other crimes.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
L o g o Types of Computer Crime Zhuravlev Alexander 326 MSLU.
Computer Viruses and Worms Dragan Lojpur Zhu Fang.
Viruses & Destructive Programs
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
BY: JASMIN, PRABHJOT, BANDEEP, SUKHJIT, DAWINDER The Top 10 Most Prominent Hackers.
Viruses.
Unit 2 - Hardware Computer Security.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Cyber crime & Security Prepared by : Rughani Zarana.
Bridges To Computing General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited.
computer Viruses Ever MAde To Protect What Matters
CYBER CRIME.
Internet Security: Les Smee Georgia Tech Research Institute.
BY RAJESWARI. 1. JONATHAN JAMES James cracked into NASA computers, stealing software worth approximately $1.7 million. According to the Department of.
Terminology Worm –A computer program that duplicates itself over computer networks. Virus –A computer program that inspects it’s environment and copies.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
Administrative: Objective: –Tutorial on Risks –Phoenix recovery Outline for today.
This Is A PowerPoint Presentation On Computer Viruses. This Presentation Will Show You What Can Be Done To Deal With The Viruses. Mr Owen 10C.
By Michael Carlisle CpSc 420 December 6, Worms – A Definition!  Worm – a program that copies itself from one computer to another.
Viruses Articles Article 1 - Computer virus hits second energy firm Article 2 - Online bank robbers face.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 47 How Viruses Work.
Computer Defining denial of service, worm, virus and hoax. Examples of negligence or incompetence that leads to crime. CI R M E By: Megan Price.
Computer Crimes Career & Technology Education Department.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Topic 5: Basic Security.
CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.
A Failure to Learn from the Past Presented by Chad Frommeyer CSC 493/593 Professors Charles E. Frank/James Walden.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
CSCI-235 Micro-Computers in Science Privacy & Security.
Hacking and Its Mysteries By: Nancy Reyes. Table of Contents  Hacking, Good or Bad?  Hackers and Their Origins  Society/Media and Hackers  Government.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
TANNENBAUM: 9 SECURITY (FOR THE LITTLE FUR FAMILY)
Dogaong, Charlie L. BSIT The Department of Justice categorizes computer crime in three ways: The computer as a target – attacking the computers of others.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
CSCI-235 Micro-Computer Applications Privacy & Security I.
A Timeline of HACK TACTICS…
Presented by: Kevin Regaldo Phillip Dai
Computer Virus’s.
A Gift of Fire Third edition Sara Baase
Internet Worms, SYN DOS attack
Computer Basics Rabie A. Ramadan, PhD 6.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Laws Against Computer Hacking
Presentation transcript:

Hacking M***********s!!

Who is this guy? John Draper (aka Captain Crunch)

World’s first ‘phreaker’ In 1972, he discovered a toy whistle in a box of Cap’n Crunch cereal produced a 2600 hz tone which provided access to ATT’s long distance network Developed the ‘blue box’ tone generator

John Draper (aka Captain Crunch) Arrested by the FBI and sent to prison numerous times for phreaking Stephen Wozniak, a student at Berkeley, manufactured and sold the blue box to make money to finance the first Apple computer Wozniak also called the Pope using a blue box Where is Captain Crunch now? Founder of ShopIP which sells the CrunchBox firewall system (endorsed by Steve Wozniak)

Who is this Guy? Robert Morris, Jr.

Released Morris worm in 1988 First major Internet Worm Cornell University student (released the worm through MIT) Morris worm exploited vulnerabilities in sendmail, fingerd, rsh/rexec and weak passwords Infected 6000 Unix machines Damage estimate: $10m - $100m Robert Morris, Jr.

First person to be tried and convicted under the 1986 Computer Fraud and Abuse Act Received 3 years probation and a $10,000 fine CERT was created in response to the Morris worm Morris’s father was chief security officer for the National Security Agency (NSA) Where is he now? A professor at MIT, of course!

Who is this Guy? Fugitive Hacker Started as a ‘phreaker’ Inspired by John Draper (Captain Crunch) Using a modem and a PC, he would take over a local telephone switching office Kevin Mitnick

Arrested multiple times Breaking into Pacific Bell office to steal passwords and operator’s manuals Breaking into a Pentagon computer Stealing software from Santa Cruz Operation (SCO) Stealing software from DEC Fled when FBI came to arrest him for breaking terms of probation

“ The Lost Boy of Cyberspace”

Tsutomu Shimomura helped track down the fugitive Mitnick in This was documented in the book and movie Takedown.

Kevin served 5 years in federal prison

Where is he now? Author and co- founder of security firm called ‘Defensive Thinking’

His book

Kevin Mitnick “The simple truth is that Kevin never sought monetary gain from his hacking, though it could have proven extremely profitable. Nor did he hack with the malicious intent to damage or destroy other people's property. Rather, Kevin pursued his hacking as a means of satisfying his intellectual curiosity and applying Yankee ingenuity. These attributes are more frequently promoted rather than punished by society.” …excerpt from Kevin’s WEB site

Hacker party Captain Crunch with ‘friends’ Kevin Mitnick and Stephen Wozniak

Who is this Guy?  David Smith : Author of the Melissa Virus

Virus released in March, 1999 A ‘macro virus’ Infects Microsoft Word document Spread via Microsoft Outlook Requires user to open attachment Sends itself to first 50 entries in address book Relatively non-destructive Melissa Virus

Damage estimated at $80 million One of earliest viruses to be spread by Smith was caught within a week FBI working with AOL Smith sentenced to 20 months in jail and a $5000 fine Could have been 10 years in jail, but he agreed to help FBI catch other hackers Melissa Virus

"When I posted the virus, I expected that any financial injury would be minor and incidental," he said. Where is he now? Serving time at the federal prison in Fort Dix, N.J. David Smith (Melissa virus)

Onel de Guzman – accused of releasing the I LOVE YOU (Love Bug) virus Who is this Guy?

Infected 45 million computers in May 2000 Clogged world-wide Destroyed music/graphics files Damage estimated as high as $10 billion Replicates itself through: Internet Chat Shared drives I Love You Virus

De Guzman was a former student at the AMA Computer College in the Philippines. Failed to graduate because AMA professors rejected his thesis which described a program which steals internet passwords Admitted he may have ‘accidentally’ released the virus Where is Guzman now? All charges were dismissed because the Philippines had no anti- hacking laws in place when the crime occurred I Love You virus