AGAINST HACKING Lysia Moua CIS1055 Sec 005 November 20, 2012.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Primary Threats to Computer Security
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Craig Rimando Luke White. “hacking” - negative connotation Not always that way Originally a compliment Not all hacking necessarily bad “Good” hacking?
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
The Internet = A World of Opportunities
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
INTERNET SAFETY FOR EVERYONE
Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Viruses.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Unit 19 INTERNET SECURITY
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Staying Safe Online Keep your Information Secure.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Ryan B Lauren C Luisa C Joey F.  Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s.
Computer security By Isabelle Cooper.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
What is Spam? d min.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Computer Skills and Applications Computer Security.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Introduction to Security Dr. John P. Abraham Professor UTPA.
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
A Quick and Easy Crash Course Internet Safety for Everyone.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
 Define hacking  Types of hackers  History  Intentions  Statistics  Facts  How to Protect yourself.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Lesson 3 Safe Computing.
Cyber Security By: Pratik Gandhi.
The Impact Of ICT “Hacking”
Protect Your Computer Against Harmful Attacks!
Presentation transcript:

AGAINST HACKING Lysia Moua CIS1055 Sec 005 November 20, 2012

Background Information  What is hacking?  “practice of modifying computer hardware and software to accomplish a goal outside of the creators original purpose”- Hinders  What is a hacker?  People who engage in the act of hacking computers  Who can hack?  Anyone

Types of Hackers  White Hat  Non-malicious intention  Security experts  Test the system  Ethical hackers  Black Hat  Also known as “crackers”  Malicious intention  Grey Hat  Will take advantage of vulnerable system  Elite Hacker  Hackers among all hackers  Script Kiddie  Amateur hacker

Ways To Protect Yourself From Hackers  Firewall  Keep firewall on  Helps protect the computer from hackers who tries to gain access to crash it, delete information, or even steal passwords or other sensitive information.  Antivirus Software  If it detects malicious code, like a virus or a worm, it works to disarm or remove it viruses.

Ways To Protect Yourself From Hackers Cont.  Keep Operating System Up to Date  Updated from time to time to stay in tune with technology requirements and to fix security holes.  Be Careful Of What Is Being Download  Carelessly downloading attachments can dodge even the most alert anti-virus software.  Never open an attachment from an unknown user, and be distrustful of forwarded attachments from unknown users.  Turn Off The Computer  The downside to having always leaving the computer makes computers more susceptible to hackers..

Ways To Protect Yourself From Hackers Cont.  Antispyware Technology  Collects information without  consent or produces unwanted pop-up ads on  web browser.

List of Famous Hackers   Chaos Computer Club   Found in Germany and other German-speaking countries.   This is popular among the older hackers generation.   Masters of Deception   w00w00   One of the largest non-profit security teams in the world with more than 30 active participants.   TESO   was a famous hacker group, which originated in Austria and quickly became international. It was active from 1998 to 2004, and during its peak around 2000, it was responsible for a significant share of the exploits on the bugtraq mailing list.   L0pht   was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area.

List Of Famous Hackers Cont.   Cult of the Dead Cow   This group is also known as the cDc or the cDc Communications   They are computer hackers and DIY media organization found in Lubbock, Texas.   milw0rm   A group of hacktivists   Known for penetrating the computers of the Bhabha Atomic Research Centre in Mumbai.   TeaMp0isoN   A group of Black-Hat Computer Hackers   Anonymous   A group of hackers created in 2003.

List of Famous Hackers Cont.   LulzSec   Group of hackers created and separated in 2011   Claimed to hack "for the lulz".   Decocidio   An anonymous, autonomous collective of hacktivists which is part of Earth First, a radical environmental protest organization   Climate Justice Action   Goatse Security (aka GoatSec)   A loose-knit, 9-person grey hat hacker group that specializes in uncovering security flaws.   Global kos   grey hat computer hacker group   globalHell   A group of hackers that disbanded in 1999 when 12 members were prosecuted for computer intrusion

List of Famous Hackers Cont.  Hackweiser  Underground hacking group and hacking magazine  Honker Union  Known for hacktivism  Found in Mainland China  Series of attacks on websites in the United States  mostly government-related sites.  Level Seven  A hacking group from the mid to late 90's but eventually separated in early 2000 when searched by the FBI  NCPH  Chinese hacker group found in Zigong in Sichuan Province.

The Cons of Hacking  Hackers often hack into computers and steal people’s identities and other important information  Hackers learn about how to become a cracker and get into an operating system in order to bypass the security  Many hackers are malicious hackers which they will spam a computer or send out viruses  attacks attacks attacks

The Cons of Hacking Cont.  Too many people who hack into the system  Causes people to feel unsafe with saving their information on their computers  Causes people to question the safety of the internet and computer world

More Information  "Essence of Hacking In Today's World." Techi Warehouse. N.p., July-Aug Web. 18 Nov  Giridhar. "5 Most Notorious Hacking Groups Of All Time." HackDigital. N.p., July-Aug Web. 18 Nov  Hinders, Dana, and O. Wallace. WiseGeek. Conjecture, 08 Nov Web. 18 Nov  Murphy, Kate. "Build Up Your Phone's Defenses Against Hackers." The New York Times. The New York Times, 26 Jan Web. 18 Nov  "Protect Your Computer." FBI. Web. 18 Nov  "Protecting Your Website Against Hacking." Squidoo.Web. 18 Nov  "Types of Hacker." SecPoint. Web. 18 Nov