Computer Hacking Cybercrime (1).

Slides:



Advertisements
Similar presentations
ETHICAL HACKING.
Advertisements

Craig Rimando Luke White. “hacking” - negative connotation Not always that way Originally a compliment Not all hacking necessarily bad “Good” hacking?
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Physical Security Logical/Computer Security What other examples?
Cybercrime and Cyberrelated Crimes Home. Background Cybercrime before networked computers Cybercrime before networked computers Hacker: now a pejorative.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Computer Threats I can understand computer threats and how to protect myself from these threats.
1 Presented by Ahmad Bahaitham Mohammad Felemban.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Computer Security and Penetration Testing
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
HACKER NOT CRACKER. HACKER IS  A person who enjoys exploring the details of programmable systems and how to stretch their capabilities  Most often programmers.
Hacking and Hacktivism Elizabeth Guerry John Medzerian Patrick Thomas.
Hands-On Ethical Hacking and Network Defense
1 An Overview of Computer Security computer security.
Chapter 1 Introduction to Security
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
DIYTP What is Cybercrime?  Using the Internet to commit a crime.  Identity Theft  Hacking  Viruses  Facilitation of traditional criminal activity.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Introduction and Security Trends Chapter 1.
Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Securing Information Systems
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Cyber crime & Security Prepared by : Rughani Zarana.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD NUR’ ARINA ATIQAH BT ASRAR
Ethical Hacking
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
HACKER Someone who attempts to break into computer system. Typically, this kind of hacker would be a proficient programmer or engineer with sufficient.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Introducing the networks and the Internet By Cody Gibbs.
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
12015/10/20 Muhammad Salman University of Indonesia.
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
“The act of gaining unauthorized access to computer systems (cracking) should not be criminalized assuming that there is no damage.” Dan Garrison Megan.
Lecture 21 Computer Security Ethics
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
Topic 5: Basic Security.
Presents Ethical Hacking For Inplant Training / Internship, please download the "Inplant training registration form" from our website.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Computer Security By Duncan Hall.
Presents Ethical Hacking 1 For Inplant Training / Internship, please download the "Inplant training registration form" from our.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
Cyber Security – The Changing Landscape Erick Weber Department of Public Works Khaled Tawfik Cyber Security.
Network Security and Security in Industry Paul Curtis.
 Define hacking  Types of hackers  History  Intentions  Statistics  Facts  How to Protect yourself.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
UNIT II COMPUTER AND INTERNET CRIME. OBJECTIVES 1.Identify key trade-offs and ethical issues associated with safeguarding of data and information systems.
Computer Hacking By: Ethan Wolfe. What is Computer Hacking? Computer Hacking- The practice of modifying computer hardware and software to accomplish a.
Seminar On Ethical Hacking Submitted To: Submitted By:
Presented by: Kevin Regaldo Phillip Dai
Chapter 11 crime and security in the networked economy
The Impact Of ICT “Hacking”
Answer the questions to reveal the blocks and guess the picture.
Ethical hacking
Prepared By : Binay Tiwari
Introduction to Cybercrime and Security
Entering the World of Cybercrime
Crime Behind The Keyboard(Dark Web)
Presentation transcript:

Computer Hacking Cybercrime (1)

Table of Contents What is Computer Hacking? Types of Computer Hackers

What is Computer Hacking? Origins Motivation Consequences Major Crimes Ethical Stands (2)

Computer Hacking - History 1960 MIT (Massachusetts Institute of Technology) Tools & Hackers Tools (nerdy student) Hackers (lazy student) Personal Computer Telephone Systems – Phreak Software – Crackers

Computer Hacking - Motivation Imaginative pursue – Hobbyists (modifications of electronic hardware) Financial means – Job & Crime Hackers vs. Crackers

Computer Hacking - Consequences Unauthorized use of a computer or network Kevin Mitnick (Sentencing depending on the seriousness of the offence) Little to no-time served (3)

Computer Hacking – Major Crimes Adrian Lamo (New York 2003) Unauthorized access to a computer and possession of illegal stolen access devices Kevin Mitnick Most wanted computer criminal (U.S) 1979 Unauthorized access (age 16) Valuable info/ (Cellular telephone and computer companies, computer passwords)

Computer Hacking – Ethical Stands Hacker ethics (Whether they can do it or not?) When they can do it would they go further? Hackers and Crackers (4)

Types of Computer Hackers Attitudes Methods (5)

Types of Computer Hackers - Attitudes White Hat Non-malicious reasons, enjoy learning (ex. testing their own security system) Grey Hat Beyond the point of a malicious intend Black Hat/Cracker Malicious reasons, uses technology for a wrong end, linked to illegal activity Script kiddie Non-expert, uses automated tools by other creators Hacktivist Defends ideological, religious or political means

Types of Computer Hackers - Methods Network enumeration Discovering information about the intended target. Vulnerability analysis Test the system. Exploitation Exploit vulnerabilities on the system. Accessing Tools Social engineering, Virus, Trojans, Worms, Key Loggers, etc. (6)

Summary & Conclusion Computer hacking was once an apt crime for a person whose computer skills exceeded others’. Now computer hacking could be performed by anybody that knows how to use the internet. Furthermore this crime is one of the hardest to detect, because the criminals do not leave any mark behind.

References http://www.britannica.com/blogs/2009/02/cybercrime-on-the-rise/ (1) http://miklasnjor.com/en/2009/photography/illustration/computer-hacking-id-theft-common/ (2) http://www.orkut-scrapping.com/Computer-Humor-14/default.aspx (3) http://www.teentechguru.com/password-and-network-hacking-tools/ (4) http://www.clipartguide.com/_pages/0511-0906-2321-1306.html (5) http://www.voipcentral.org/entry/pc-hacking-though-voip-is-possible/ (6)