Presentation is loading. Please wait.

Presentation is loading. Please wait.

 Define hacking  Types of hackers  History  Intentions  Statistics  Facts  How to Protect yourself.

Similar presentations


Presentation on theme: " Define hacking  Types of hackers  History  Intentions  Statistics  Facts  How to Protect yourself."— Presentation transcript:

1

2  Define hacking  Types of hackers  History  Intentions  Statistics  Facts  How to Protect yourself

3  The practice of altering the features of a system in order to achieve a goal outside of their original purpose.  Due to blackhat hackers the hacking term is now frequently mistaken for any security related cyber crime.

4  Computer Security Hacker -one who accesses a computer system by circumventing its security system  Hobbyist Hacker -someone makes innovative customizations or combinations of retail electronic and computer equipment  Programmer Subculture Hacker - someone who shares an anti-authoritarian approach to software development now associated with the free software movement  Grey hat- do not hack for personal gain or have bad intentions but are prepared to commit crimes during the course of hacking  White hat- good guy, especially in computing slang, where it refers to an ethical hacker or penetration tester who focuses on securing and protecting IT systems.

5  First showed up in 1960’s  A hacker was a programmer  People who could create new programs no one could consider  Built everything from small applications to operating systems

6  Information  Fun  Vengeance/revenge  Boredom

7  The Web Hacking Incident Database (2009)  Collects data/statistics on web-application related security incidents

8  “the year of the hacker”  7% increase in phishing attacks  60% of attacks are phishing  Cyber attacks decreased by 1%  35% are cyber threats

9  The average website had about 13 serious vulnerabilities.  The Banking, Insurance, and Healthcare industries did the best overall with the average number of serious vulnerabilities having 5, 6, and 8.  The worst were the IT, Retail, and Education industries with an average of 24, 17, and 17.  Large organizations (over 2,500 employees) had the highest average number of serious vulnerabilities at 13.  Small organizations(Up to 150 employees) at 11.

10 1) Don’t use the same passwords. 2) Don’t use the same security questions. 3) Beware your history. Online shopping is becoming more popular and after every purchase you leave your personal info. behind making you more vulnerable 4) Share Less. (Social networking) 5) Watch for red flag questions. 6) Always read the fine print. We assume that it is meant to protect us, but that is not always the case. 7) Update your firewall

11  Hackers want to get into your system and alter it somehow for some personal goal  Not all hackers are bad  Protect yourself

12

13  http://en.wikipedia.org/wiki/Hacker http://en.wikipedia.org/wiki/Hacker  http://whatishacking.org/ http://whatishacking.org/  http://games.yahoo.com/blogs/plugged-in/six- ways-protect-yourself-online-hackers-701.html http://games.yahoo.com/blogs/plugged-in/six- ways-protect-yourself-online-hackers-701.html  http://blogs.technet.com/b/rhalbheer/archive/201 0/03/12/hacking-incidents-2009-interesting- data.aspx http://blogs.technet.com/b/rhalbheer/archive/201 0/03/12/hacking-incidents-2009-interesting- data.aspx  http://jeremiahgrossman.blogspot.com/2010/09/w ebsite-security-statistics-report-2010.html http://jeremiahgrossman.blogspot.com/2010/09/w ebsite-security-statistics-report-2010.html


Download ppt " Define hacking  Types of hackers  History  Intentions  Statistics  Facts  How to Protect yourself."

Similar presentations


Ads by Google