BY: JASMIN, PRABHJOT, BANDEEP, SUKHJIT, DAWINDER The Top 10 Most Prominent Hackers.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
Identity Theft: How Safe Are You? Steven Stone. What is Identity Theft Identity consists of: – Social Security Number – Credit Card Number and Credit.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
INTERNET SAFETY.
Hacker Hunters Plug-In B6 p.341 Matt Spindler CIS 429.
1878 – Two operators hired to man the switchboards on the new ‘telephone system’ are fired whilst attempting to deconstruct the system and find out its.
Presented By The Plano Police Department Crime Prevention Unit.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
A guide to protecting your money and your identity KEEPING MONEY SAFE Keeping money safe Money Works: Level 1 Topic 3.
Hacking M***********s!!. Who is this guy? John Draper (aka Captain Crunch)
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
The History of Hacking By: Monica Flores.
By Sean Owens. Hacking 101 Hacking has been around pretty much since the development of the first electronic computers. The first computer hackers emerge.
HISTORY OF HACKING AND CYBERCRIME BY BRUCE PHILLIPS CRISSY HUGHES CARLOS BETETTA.
JOHN DRAPER AMERICAN COMPUTER PROGRAMMER AND “PHONE PHREAK” Presented by Macie Franklin.
Computers in Society Week 8: Computer Security and Hacking.
Author,Kevin Mitnick and William L. Simon Published by Back Bay Books (2012) Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker Presented.
Safe Information By Eli Salazar. The Government The Internet A strategic way to communicate top secret plans. The government used Internet for its safety.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
W15D2. Malware = malicious software Viruses, Trojan horses, Worms. Goal: usually financial gain (at the expense of the victim) C-card info disrupt service.
Presentation By Timothy Mangas. Why should we worry? Crimes committed using the computer or Internet can be more costly (money wise) than other crimes.
E-Banking is the use of electronic means to conduct banking business, such as telephone, Internet, cell phone, or other device by way of secure internet.
L o g o Types of Computer Crime Zhuravlev Alexander 326 MSLU.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
Greg and Jamie unit 5 internet crime. INTERNET CRIME Computer crime refers to any crime that involves a computer and a network. The computer may have.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Fall 2008CS 334: Computer Security1 Network Security War Stories Fall 2008.
Security: New Trends, New Issues Internet 2 Fall Members Meeting Austin TX September 29, 2004.
CYBER CRIME.
IT Security/Online Loss Prevention Bill Finnerty Assistant Director of Information Technology Cumberland County.
BY RAJESWARI. 1. JONATHAN JAMES James cracked into NASA computers, stealing software worth approximately $1.7 million. According to the Department of.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Viruses Articles Article 1 - Computer virus hits second energy firm Article 2 - Online bank robbers face.
The HACKER. TECHNOLOGY: Hacker (computer security) someone who accesses a computer system by circumventing its security system. Hacker (hobbyist) who.
January 6, 2003 A Gathering of Networks. Network Security Issues & Developments.
CJ416 Eric Salvador. Housekeeping Lets finish strong in Unit 9 discussions Alternative seminars Final submission of work – Tues. May 29 th at midnight.
Unit 9.  Lets finish strong in Unit 9 discussions  Alternative seminars  Final submission of work – Tuesday, October 9 th at midnight.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
Police are not prepared for rising incidence of Identity Fraud By Chris DeVito.
1 A Lesson in Cyber Terrorism. 2 Cyber Terrorism Look up definitions to the listed terms using the website below
CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.
Hacking. What is hacking? A hacker is a person who breaks into computers, usually by gaining access to administrative controls. The subculture that has.
Lecture on Internet Issues and Laws. Topics What is Open source ? What is Open source ? What are the Copyright Issues? What are the Copyright Issues?
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
MORE MONEY FOR CYBER- SECURITY?. CYBER SECURITY: A TICKING TIME BOMB? Richie Sabu G/T Independent Research Howard High School Mr. Brian Price, Advisor.
INTRODUCTION & QUESTIONS.
1 A Closer Look at Cyber Terrorism. 2 Cyber Terrorism Look up definitions to the listed terms using the website below
Ghost in the Wires Kevin Mitnick 2012 Heather Sliwoski CS
CYBER CRIMES Know how's of cyber crimes. I’M HERE………
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
IDENTITY THEFT Nicholas Michalak. Agenda What is Identity Theft? Background of Identity Theft Legislation Against it Different types and Examples What.
Computer Misuse Act INTRODUCTION The Computer Misuse Act became law in August Under the Act hacking and the introduction of viruses are criminal.
Logan Wojcik COSC 101. Overview ~ Both are hackers ~White hats help computer systems become more secure ~Black hats attack and exploit breaches in systems.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Computer Hacking By: Ethan Wolfe. What is Computer Hacking? Computer Hacking- The practice of modifying computer hardware and software to accomplish a.
Identity Theft It’s a crime!
The Art of Deception: Controlling the Human Element of Security
A Timeline of HACK TACTICS…
Presented by: Kevin Regaldo Phillip Dai
Effective Method to Recover Norton Antivirus Key.
Chapter 11 crime and security in the networked economy
Anastasios Papaefthimiou Lefteris Tsabras Dimitris Thomadakis
Presentation transcript:

BY: JASMIN, PRABHJOT, BANDEEP, SUKHJIT, DAWINDER The Top 10 Most Prominent Hackers

Johnathan James (c0mrade) Broke into the Department of Defense’s Defense Threat Reduction Agency At age of 16 he broke into NASA’s systems to steal software Acquired software to gain control of the International Space Station’s living environment

Kevin Poulsen (Dark Dante) Broke into FBI’s database Was given 5 years prison time Hacked telephone lines of a LA radio station to be secured a place as the 102 nd caller Won a trip to Hawaii and a brand new Porsche 944 Considered the “Hannibal Lecter of computer crime”

Gary Mckinnon (Solo) Hacked U.S Department of Defense, Army, Navy, Airforce, and NASA Suffered from Asperger’s syndrome Hacked the government because he believed that the U.S was hiding information on aliens

Kevin Mitnick At one point considered the most wanted cyber criminal Mastermind of computer hacking Gained access to modify the phone systems of Nokia and Motorola

Vladimir Levin Stole 10 million dollars from citibank clients Only $400,000 of the $10 million were recovered by authorities Was said to have coordinated the first ever internet bank raid Stole account numbers and pins then transferred money to his own account

John Draper Realized that a toy whistle emitted the same frequency tones used by AT&T switches to route calls Building off of that, he created “blue boxes” that you can get any amount of long distance calls for free Gained attention of co-founder of ‘Apple’, Steve Wozniak, who wanted to do phone phreaking himself

Albert Gonzalez Accused of the biggest ATM and credit card theft in history Allegedly sold more than 170 million card and ATM numbers Authorities seized $1.6 million in cash and $1.1 million buried in his parents’ backyard Sentenced to 20 years in federal prison

Anonymous

Ug Nazi Responsible for several attacks conducted over the internet Best known for leaking the personal info of government officials