Presentation is loading. Please wait.

Presentation is loading. Please wait.

AGAINST HACKING Lysia Moua CIS1055 Sec 005 November 20, 2012.

Similar presentations


Presentation on theme: "AGAINST HACKING Lysia Moua CIS1055 Sec 005 November 20, 2012."— Presentation transcript:

1

2 AGAINST HACKING Lysia Moua CIS1055 Sec 005 November 20, 2012

3 Background Information  What is hacking?  “practice of modifying computer hardware and software to accomplish a goal outside of the creators original purpose”- Hinders  What is a hacker?  People who engage in the act of hacking computers  Who can hack?  Anyone

4 Types of Hackers  White Hat  Non-malicious intention  Security experts  Test the system  Ethical hackers  Black Hat  Also known as “crackers”  Malicious intention  Grey Hat  Will take advantage of vulnerable system  Elite Hacker  Hackers among all hackers  Script Kiddie  Amateur hacker

5 Ways To Protect Yourself From Hackers  Firewall  Keep firewall on  Helps protect the computer from hackers who tries to gain access to crash it, delete information, or even steal passwords or other sensitive information.  Antivirus Software  If it detects malicious code, like a virus or a worm, it works to disarm or remove it viruses.

6 Ways To Protect Yourself From Hackers Cont.  Keep Operating System Up to Date  Updated from time to time to stay in tune with technology requirements and to fix security holes.  Be Careful Of What Is Being Download  Carelessly downloading e-mail attachments can dodge even the most alert anti-virus software.  Never open an e-mail attachment from an unknown user, and be distrustful of forwarded attachments from unknown users.  Turn Off The Computer  The downside to having always leaving the computer makes computers more susceptible to hackers..

7 Ways To Protect Yourself From Hackers Cont.  Antispyware Technology  Collects information without  consent or produces unwanted pop-up ads on  web browser.

8 List of Famous Hackers   Chaos Computer Club   Found in Germany and other German-speaking countries.   This is popular among the older hackers generation.   Masters of Deception   w00w00   One of the largest non-profit security teams in the world with more than 30 active participants.   TESO   was a famous hacker group, which originated in Austria and quickly became international. It was active from 1998 to 2004, and during its peak around 2000, it was responsible for a significant share of the exploits on the bugtraq mailing list.   L0pht   was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area.

9 List Of Famous Hackers Cont.   Cult of the Dead Cow   This group is also known as the cDc or the cDc Communications   They are computer hackers and DIY media organization found in Lubbock, Texas.   milw0rm   A group of hacktivists   Known for penetrating the computers of the Bhabha Atomic Research Centre in Mumbai.   TeaMp0isoN   A group of Black-Hat Computer Hackers   Anonymous   A group of hackers created in 2003.

10 List of Famous Hackers Cont.   LulzSec   Group of hackers created and separated in 2011   Claimed to hack "for the lulz".   Decocidio   An anonymous, autonomous collective of hacktivists which is part of Earth First, a radical environmental protest organization   Climate Justice Action   Goatse Security (aka GoatSec)   A loose-knit, 9-person grey hat hacker group that specializes in uncovering security flaws.   Global kos   grey hat computer hacker group   globalHell   A group of hackers that disbanded in 1999 when 12 members were prosecuted for computer intrusion

11 List of Famous Hackers Cont.  Hackweiser  Underground hacking group and hacking magazine  Honker Union  Known for hacktivism  Found in Mainland China  Series of attacks on websites in the United States  mostly government-related sites.  Level Seven  A hacking group from the mid to late 90's but eventually separated in early 2000 when searched by the FBI  NCPH  Chinese hacker group found in Zigong in Sichuan Province.

12 The Cons of Hacking  Hackers often hack into computers and steal people’s identities and other important information  Hackers learn about how to become a cracker and get into an operating system in order to bypass the security  Many hackers are malicious hackers which they will spam a computer or send out viruses  http://www.applicure.com/solutions/hacking- attacks http://www.applicure.com/solutions/hacking- attacks http://www.applicure.com/solutions/hacking- attacks

13 The Cons of Hacking Cont.  Too many people who hack into the system  Causes people to feel unsafe with saving their information on their computers  Causes people to question the safety of the internet and computer world

14 More Information  "Essence of Hacking In Today's World." Techi Warehouse. N.p., July-Aug. 2004. Web. 18 Nov. 2012..  Giridhar. "5 Most Notorious Hacking Groups Of All Time." HackDigital. N.p., July-Aug. 2011. Web. 18 Nov. 2012..  Hinders, Dana, and O. Wallace. WiseGeek. Conjecture, 08 Nov. 2012. Web. 18 Nov. 2012..  Murphy, Kate. "Build Up Your Phone's Defenses Against Hackers." The New York Times. The New York Times, 26 Jan. 2012. Web. 18 Nov. 2012..  "Protect Your Computer." FBI. Web. 18 Nov. 2012..  "Protecting Your Website Against Hacking." Squidoo.Web. 18 Nov. 2012..  "Types of Hacker." SecPoint. Web. 18 Nov. 2012..


Download ppt "AGAINST HACKING Lysia Moua CIS1055 Sec 005 November 20, 2012."

Similar presentations


Ads by Google