Hacking and Its Mysteries By: Nancy Reyes. Table of Contents  Hacking, Good or Bad?  Hackers and Their Origins  Society/Media and Hackers  Government.

Slides:



Advertisements
Similar presentations
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
Advertisements

Hacking M***********s!!. Who is this guy? John Draper (aka Captain Crunch)
Ethical and Social...J.M.Kizza 1 Module 9: Computer Crimes Introduction History of Computer Crimes Computer Systems Attacks Motives Costs and Social Consequences.
Steve Jobs By Chris Brady. The life of Steve Jobs in a Nutshell Born February 24, 1955 Died October Married Laurene Powel and had 3 kids Attended.
The History of Hacking By: Monica Flores.
Daniel Blanchette December 1st 2009 Dedicated to Susan Phillips ( )
HISTORY OF HACKING AND CYBERCRIME BY BRUCE PHILLIPS CRISSY HUGHES CARLOS BETETTA.
JOHN DRAPER AMERICAN COMPUTER PROGRAMMER AND “PHONE PHREAK” Presented by Macie Franklin.
Hacker Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st semester By :wejad.n.mansour.
Computers in Society Week 8: Computer Security and Hacking.
~How they can help~ us in the Industry. Using linkedin can give you many advantages within the media industry what ever you chosen area is. Companies.
1 Phishing the Open Net Lure 101 Zane Brys, Nicholas Bingell,and Omar Heniene.
W15D2. Malware = malicious software Viruses, Trojan horses, Worms. Goal: usually financial gain (at the expense of the victim) C-card info disrupt service.
History of Attitudes Towards Children PSY 356 Schuetze.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
How Newton Unified the Motions of the Moon, Sun, and Apples.
Computer Hacking Cybercrime (1).
BY: JASMIN, PRABHJOT, BANDEEP, SUKHJIT, DAWINDER The Top 10 Most Prominent Hackers.
Fall 2008CS 334: Computer Security1 Network Security War Stories Fall 2008.
Jacob Comerford. This picture was taken in 2005 when Pope John Paul was announced. This picture was taken in 2013 when Pope Benedict was announced. Apple.
Bridges To Computing General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited.
By: Justin Hansen There are many different eras since the future. There are five Generations. Each Generation gave the computer world something.
Agenda Welcome: 19h Start: 19h30 Round table: 20h Networking: 21h.
Social Media Presented to Dr. Carol Watson Honorary Board Member Emmanuel I Institute, Inc. By Jerome Chenevert.
Ice Skating. WHAT TO WEAR! You would need a dress to perform in and ice skates to skate in.
By: Marcus Owens. Introduction Lights! Camera! Action! No, I'm not talking about just films. I am talking about animated feature films. They actually.
STEVE JOBS BY: BROOKE F.. HOW IS STEVE JOBS FAMOUS? Steve Jobs was a man who made the life for a human much easier. He invented Apple Incorporations and.
History of the Computer and Internet By: Logan Period: 4.
Task 1 Research on any 2 of the following: Online shopping Online banking Web broadcasting Social networking sites Discuss the disadvantages and advantages.
Prepared by: Dr. Faustino Reyes II
Classical Criminology  Based on the assumption that individuals choose to commit crimes after weighing the consequences of their actions.  Grew out of.
The HACKER. TECHNOLOGY: Hacker (computer security) someone who accesses a computer system by circumventing its security system. Hacker (hobbyist) who.
THE JOURNEY OF THE SLAVE HOW TO SHOW ORDINARY PEOPLE, THAT THE HUMAN TRAFFICKING IS EVERYWHERE AROUND US?
The History of the Mystery. What is a Mystery? According to Webster’s Dictionary, a mystery is any event that remains so secret or obscure as to excite.
Pika and Maltese Chapter 3. People develop attitudes towards three major components of a political system: 1.Their political community 2.The political.
1 A Lesson in Cyber Terrorism. 2 Cyber Terrorism Look up definitions to the listed terms using the website below
By Zach Thomas.  Computers, like all technology, make daily life easier.  Computers are used in every job field, from the military to food production.
Lecture on Internet Issues and Laws. Topics What is Open source ? What is Open source ? What are the Copyright Issues? What are the Copyright Issues?
Riley M. Period: 7 2/22/11 music: Freeplay Music, chic chick, 3/3/11,
Social Media Presented to Dr. Carol Watson Honorary Board Member Emmanuel I Institute, Inc. By Jerome Chenevert.
Multiplication Facts Table of Contents 0’s 1’s 2’s 3’s 4’s 5’s 6’s 7’s 8’s 9’s 10’s.
Chapter 4 Concepts of Mass Communication. Introduction of Mass Communication The term ‘mass communication’ may be considered as a 20th century development.
Social Media Presented to Dr. Carol Watson Honorary Board Member Emmanuel I Institute, Inc. By Jerome Chenevert.
Security Debate Why cracking should be criminalized.
HACKERS: HEROES OF THE COMPUTER REVOLUTION 25 TH ANNIVERSARY By: Brett Delaney Living in a Networked World: The Good, the Bad, and the Ugly CS 408 Section.
 The original hackers who disliked the IBM machines preferring machines like TX-0 and PDP- 1.  Hacked for the fun of hacking  Felt all code was free.
Social Media Presented to Dr. Carol Watson Honorary Board Member Emmanuel I Institute, Inc. By Jerome Chenevert.
1 A Closer Look at Cyber Terrorism. 2 Cyber Terrorism Look up definitions to the listed terms using the website below
The American Family 50 years of change. Change… The American family has undergone tremendous change in the last 50 years. Some argue that family life.
John H. Gonzaga presents: THE EVOLUTION OF SOCIAL MEDIA.
Hackers: Heroes of the Computer Revolution By: Steven Levy.
Computer Misuse Act INTRODUCTION The Computer Misuse Act became law in August Under the Act hacking and the introduction of viruses are criminal.
Logan Wojcik COSC 101. Overview ~ Both are hackers ~White hats help computer systems become more secure ~Black hats attack and exploit breaches in systems.
History of Computers Past and Present.
CSCI-235 Micro-Computer Applications Privacy & Security I.
CJA 204 Week 5 Learning Team Cybercrime Paper Write a 1,050- to 1,400-word paper about three true cybercrime or hacking cases. Include the following: ·
The American Family 50 years of change.
A Timeline of HACK TACTICS…
Multiplication table. x
Lesson # 1 A Practical Guide to Computer Forensics Investigations
Hackers and Crackers iJacsn.
Steve jobs: an Idealized Influencer
Ethical hacking
A Gift of Fire Third edition Sara Baase
Safer computing week Create, connect and share respect.
Using Sources in History
STEVE JOBS Feb. 24, 1955 To Oct. 5, 2011.
“Hacking” and Computer System Security
ATES NEWS Educational and Informative News! $1.00
Presentation transcript:

Hacking and Its Mysteries By: Nancy Reyes

Table of Contents  Hacking, Good or Bad?  Hackers and Their Origins  Society/Media and Hackers  Government Reaction towards Hackers  Hacking, Good or Bad?  Hackers and Their Origins  Society/Media and Hackers  Government Reaction towards Hackers

Hacking, Good or Bad  Hackers have multiple definitions.  Hackers used to be viewed as heroes.  Hackers used to be benign.  As time progressed their attitudes and mischief changed and therefore began to be viewed as criminals.  Some older hackers distanced themselves from those abusers, “Crackers.”  Hackers have multiple definitions.  Hackers used to be viewed as heroes.  Hackers used to be benign.  As time progressed their attitudes and mischief changed and therefore began to be viewed as criminals.  Some older hackers distanced themselves from those abusers, “Crackers.”

Hackers and Their Origins  Has been around for more than a century.  It wasn’t until the early 1960’s that hacking became popular.  1970’s John Draper aka “Captain Crunch” becomes infamous and opens way for “Phreaks”  The “Blue Boxes’ are invented by Steve Jobs & Steve Wozniak (future founders of Apple).  1980’s brings about many hacking events.  1990’s Hackers objectives become more serious.  Has been around for more than a century.  It wasn’t until the early 1960’s that hacking became popular.  1970’s John Draper aka “Captain Crunch” becomes infamous and opens way for “Phreaks”  The “Blue Boxes’ are invented by Steve Jobs & Steve Wozniak (future founders of Apple).  1980’s brings about many hacking events.  1990’s Hackers objectives become more serious.

Media/Society on Hacking  Media has exploited and publicized hacking.  Has made a variety of films applauding the act.  Society has accepted and praised such films  Media has exploited and publicized hacking.  Has made a variety of films applauding the act.  Society has accepted and praised such films

Government Reaction towards Hackers G The Comprehensive Crime Control Act G Computer Fraud Abuse Act G Computer Emergency Response Team is formed G National Crackdown day G Although it seems as though there are many acts against hackers, hacking is still not (seriously) punishable. G The Comprehensive Crime Control Act G Computer Fraud Abuse Act G Computer Emergency Response Team is formed G National Crackdown day G Although it seems as though there are many acts against hackers, hacking is still not (seriously) punishable.

Credits G St. Petersburg Times Online G CNN.COM/SCI-TECH G Lauckner, Kurt F., and Mildred D. Lintner. The Computer Continuum. Boston, 2003 G St. Petersburg Times Online G CNN.COM/SCI-TECH G Lauckner, Kurt F., and Mildred D. Lintner. The Computer Continuum. Boston, 2003