BY RAJESWARI. 1. JONATHAN JAMES James cracked into NASA computers, stealing software worth approximately $1.7 million. According to the Department of.

Slides:



Advertisements
Similar presentations
Linux Operating System Linux is a free open-source operating system based on Unix. Linux was originally created by Linus Torvalds with the assistance of.
Advertisements

Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Database Woes Plague Homeland Security and Law Enforcement.
Tim Berners-Lee & the World Wide Web LCC 2700: Intro to Computational Media Fall 2005 David Jimison.
& Mark Zuckerberg. How it all began. Facemash, the predecessor to Facebook was created by Mark Zuckerberg on October 28, In contrast to what we.
Hacking M***********s!!. Who is this guy? John Draper (aka Captain Crunch)
GNU / Linux A free operating system. Summary History What can you find on a Linux OS Linux Economy.
Tim Berners Lee -- Founder of the World Wide Web.
The History of Hacking By: Monica Flores.
Prepared by: Nahed Al-Salah
Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.
Computers in Society Week 8: Computer Security and Hacking.
Computer and Internet Crimes By: Tracey Ross & Tommy Brown.
____________________ Linus Torvalds. ____________________ Linus: Family Man Born December 28, 1969 in Helsinki. Finland Part of 6% Swedish speaking minority.
Akamai OS War Stories Bruce Maggs Gratuitous Quote of the Day Well you’re not hardcore (No you’re not hardcore) Unless you live hardcore (Unless.
History of the Internet. Origins Late 1950’s: invention of the modem: modulator-demodulator or digital to analog ARPA (Advanced Research Projects Agency)
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Tim Berners-Lee: World Wide Web Xiang Lai COMP 1631 Winter 2011.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
Internet Basics مهندس / محمد العنزي
AN INTRODUCTION TO LINUX OPERATING SYSTEM Zihui Han.
What the hell is. Free software is software that anyone is free to use, copy, improve, examine or distribute, either free of cost or for a price. More.
Linux Basics CS 302. Outline  What is Unix?  What is Linux?  Virtual Machine.
INTRODUCTION Patrick Norman. World Trends Smart World – Smart Grids (Power, etc.) – Mobile – Integration between physical and digital world.
BY: JASMIN, PRABHJOT, BANDEEP, SUKHJIT, DAWINDER The Top 10 Most Prominent Hackers.
Internet Fundamentals and Background
Apple Vs. Microsoft By Brichrandlyn. Apple!!! Apple Inc  Formerly Apple Computer Inc  Known for Ipods, Iphones and Ipad  Established on April 1, 1976.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Career Opportunities in Information Technology There are four main categories of IT jobs, grouped by the main focus of the job: Sales and support Software.
Inventor of the World Wide Web By Aenghus.  Early Life  Invention  University  Pictures  More Pictures  Fact file  Awards and Honours  Effects.
The Internet When was it created and why?. What Is the Internet? A network of computer networks. It connects networks all over the world through the use.
The History of Computers and the Internet A short history lesson in the history of the world of technology.
Open Source Software In the beginning, all software was free –in the 1960s,when IBM and others sold the first large-scale computers, these machines came.
HACKER Someone who attempts to break into computer system. Typically, this kind of hacker would be a proficient programmer or engineer with sufficient.
Unix Background. Introducing Unix Brief Unix History u In 1969, Ken Thompson at AT&T Bell Labs began developing Unix. –First done in assembly language.
Enterprise Network Risks Attachments -- Workers opening an attachment could unleash a worm or virus onto the corporate network, and a new evolution.
Decades Presentation 1960’s BY: AMY, JUSTIN, JAKE.
How we got web design:. Where it all began October 4 th 1957 Sputnik is launched by the USSR.
CONTENTLEARNING OBJECTIVES ORIGIN OF INTERNETDefine Internet and its milestones INTERNET TERMINOLOGYIdentify the key terms associated with Internet INTERNET.
Free and Open Source Software Aruna Lorensuhewa Contact Details:
TECHNOLOGY TERMS BY:SHAQUILLA WATSON&SIMONE TAYLOR.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
A Brief History of the Internet: The Timeline 1958: ARPA, the Advanced Research Projects Agency, is created by the U.S. Defense Department in response.
CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.
Lecture on Internet Issues and Laws. Topics What is Open source ? What is Open source ? What are the Copyright Issues? What are the Copyright Issues?
Under The Hood By Alyssa Curtis. Places to Save Files Flash Drive Hard Drive Student File Edline File .
Open Source Software. Chris Moylan Group 5...I think.
Agenda UNX122_022_w1_p3 Overview of UNIX
Ghost in the Wires Kevin Mitnick 2012 Heather Sliwoski CS
 Samy (also known as JS.Spacehero)  XSS worm that was designed to propagate across the MySpace social-networking site. At the time of release, it.
Matthew Baillie, Luke Day THE INTERNET. HISTORY OF THE INTERNET J.C.R. Licklider authored a series of memos concerning theoretical network structures.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
ULI101 – XHTML Basics (Part I) Internet / Web Concepts Brief History TCP/IP Web Servers / Web Browsers URL HTTP / HTML.
Egyptians vote in historic presidential election.
OPS224 Operating Systems - Unix Instructor: MURRAY SAUL.
Logan Wojcik COSC 101. Overview ~ Both are hackers ~White hats help computer systems become more secure ~Black hats attack and exploit breaches in systems.
How the internet works Notes for Computer Applications.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
UNIT II COMPUTER AND INTERNET CRIME. OBJECTIVES 1.Identify key trade-offs and ethical issues associated with safeguarding of data and information systems.
Computer Hacking By: Ethan Wolfe. What is Computer Hacking? Computer Hacking- The practice of modifying computer hardware and software to accomplish a.
7 Mavericks and Hacking 1.
Introduction to Computers
Presented by: Kevin Regaldo Phillip Dai
Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker
Computer Basics Technology’s Impact.
The KGB the Computer and Me
A Gift of Fire Third edition Sara Baase
Laws Against Computer Hacking
Unit 3: Physical Evidence
Presentation transcript:

BY RAJESWARI

1. JONATHAN JAMES James cracked into NASA computers, stealing software worth approximately $1.7 million. According to the Department of Justice, "The software supported the International Space Station’s physical environment, including control of the temperature and humidity within the living space.” NASA was forced to shut down its computer systems, ultimately racking up a $41,000 cost. James explained that he downloaded the code to supplement his studies on C programming, but contended,” The code itself was crappy... certainly not worth $1.7 million like they claimed.”

JONATHAN JAMES

2.ADRIAN LAMO Adrian Lamo around computers as a very young child. He had a Commodore 64 when he was like 6 or so. And his first interest in seeing how things worked behind the scenes wasn’t all about technology necessarily, and his interest in what you might call hacking isn’t really primarily about. There’s a certain amount of tunnel vision there.” Last year, Lamo earned the disapproval of his probation officer in the closing months of his two year probation term when he refused to provide a blood sample for the FBI’s DNA database.

The Combined DNA Index System, or CODIS, was created to catalog violent criminals and sexual predators, but the 2004 ustice for All Act expanded the system to include samples from all newly convicted federal felons, including drug offenders and white-collar criminals.

ADRIAN LAMO

3.KEVIN MITNICK Kevin David Mitnick (born August 6, 1963) is a computer security consultant and author. In the late 20th century, he was convicted of various computer- and communications- related crimes. At the time of his arrest, he was world- famous as the most-wanted computer criminal in the United States.Mitnick gained unauthorized access to his first computer network in 1979, at 16, when a friend gave him the phone number for the Ark, the computer system Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. He broke into DEC’s computer network and copied DEC’s software, a crime he was charged with and convicted of in 1988.

3.KEVIN MITNICK

4.KEVIN POULSEN Kevin Poulsen was among the most accomplished, multi- talented hackers. He worked for SRI International by day, and hacked at night under the handle "Dark Dante”. He trained to be the complete hacker, and even taught himself lock picking. Among other things, Poulsen reactivated old Yellow Page escort telephone numbers for an acquaintance that then ran a virtual agency. When the FBI started pursuing Poulsen, he went underground as a fugitive. When he was featured on NBC’s Unsolved Mysteries, the show’s telephone lines mysteriously crashed. He was finally arrested in February, 1995.

Kevin Poulsen

5. ROBERT TAPPAN MORRIS Morris, son of former National Security Agency scientist Robert Morris, is known as the creator of the Morris Worm, the first computer worm to be unleashed on the Internet. As a result of this crime, he was the first person prosecuted under the 1986 Computer Fraud and Abuse Act. Morris wrote the code for the worm while he was a student at Cornell.

ROBERT TAPPAN MORRIS

1.STEPHEN WAZNIAK Stephen Wazniak, one of the founders of Apple Computer and a long-time hacker hero, recalled the days when a young hacker could twiddle the phone system and make a free phone call to the pope without fear that a goofy prank would turn into an international incident. Steve Wozniak got the first inspirations by its father Jerry, which worked as an engineer at Lockheed, and by the fiktionalen miracle boy Tom Swift. Its father stuck on it with the fascination for electronics and examined frequently the inventions of its son.

1.STEPHEN WAZNIAK

TIM BERNERS-LEE Berners-Lee is famed as the inventor of the World Wide Web, the system that we use to access sites, documents and files on the Internet. He has received numerous recognitions, most notably the Millennium Technology Prize. While working with CERN, a European nuclear research organization, Berners-Lee created a hypertext prototype system that helped researchers share and update information easily. He later realized that hypertext could be joined with the Internet. Berners-Lee recounts how he put them together: "I just had to take the hypertext idea and connect it to the TCP and DNS ideas and "ta-da!” the World Wide Web.”

TIM BERNERS-LEE

LINUS TORVALDS In 1991 Linus Torvalds was a college student at the University of Helsinki. Starting with the basics of a UNIX system, he wrote the kernel — original code — for a new system for his x86 PC that was later dubbed Linux (pronounced Linux). Torvalds revealed the original source code for free — making him a folk hero among programmers — and users around the world began making additions and now continue to tweak it. Linux is considered the leader in the practice of allowing users to re-program their own operating systems.

LINUS TORVALDS

RICHARD STALLMAN Richard Matthew Stallman (born March 16, 1953), often abbreviated "rms”,*1+ is an American software freedom activist, and computer programmer. In September 1983, he launched the GNU Project to create a free Unix-like operating system, and has been the project’s lead architect and organizer. With the launch of the GNU Project, he initiated the free software movement and, in October 1985, set up the Free Software Foundation. Stallman’s life continues to revolve around the promotion of free software. He works against movements like Digital Rights Management

RICHARD STALLMAN

TSUTOMU SHIMOMURA Shimomura reached fame in an unfortunate manner: he was hacked by Kevin Mitnick. Following this personal attack, he made it his cause to help the FBI capture him. Shimomura’s work to catch Mitnick is commendable, but he is not without his own dark side. Author Bruce Sterling recalls: "He pulls out this AT&T cellphone, pulls it out of the shrinkwrap, fingerhacks it, and starts monitoring phone calls going up and down Capitol Hill while an FBI agent is standing at his shoulder, listening to him.”