Computer Hacking By: Ethan Wolfe. What is Computer Hacking? Computer Hacking- The practice of modifying computer hardware and software to accomplish a.

Slides:



Advertisements
Similar presentations
Chapter 1: Fundamentals of Security JV Note: Images may not be relevant to information on slide.
Advertisements

Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Unit 4.2. Wednesday, November 6 17 Days Until Culmination! Objective: I will learn how to use in-text citations in my essay and give sources credit in.
Understanding and Building Basic Networks Chapter 4 Protecting Yourself Online.
Cybercrime and Cyberrelated Crimes Home. Background Cybercrime before networked computers Cybercrime before networked computers Hacker: now a pejorative.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
INTERNET SAFETY FOR STUDENTS
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Kevin Mitnick Home Internet Security Course Today, Internet criminals are going after families. They try to guess your passwords and steal your credit.
Internet Safety/Cyber Ethics
Prepared by: Nahed Al-Salah
Safe Information By Eli Salazar. The Government The Internet A strategic way to communicate top secret plans. The government used Internet for its safety.
Computer Hacking Cybercrime (1).
INTERNET SAFETY FOR STUDENTS
Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
INTRODUCTION Patrick Norman. World Trends Smart World – Smart Grids (Power, etc.) – Mobile – Integration between physical and digital world.
Basic Internet Concepts EDU 6606 VICKI PORTER History of the Internet  1960s  The internet begins with the U.S. Department of Defense’s Advanced Research.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Section 6 Theory Software Copyright, Viruses and Hacking.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD NUR’ ARINA ATIQAH BT ASRAR
By zeeShan Yaqoob. What’s the Internet? The Internet is built on a chaotic mishmash of hardware, governed by minimal standards and even fewer rules. Thousands.
BY RAJESWARI. 1. JONATHAN JAMES James cracked into NASA computers, stealing software worth approximately $1.7 million. According to the Department of.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
HACKER Someone who attempts to break into computer system. Typically, this kind of hacker would be a proficient programmer or engineer with sufficient.
Files are at risk from loss if your computer breaks or if you get a virus. Files can also become corrupted. Solutions: Make regular back ups of files Use.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Viruses... a big problem with small solutions.
Computer security By Shreya Houji. VirusesViruses.
Emily Ansell 8K viruseshackingbackups next. Viruses A virus is harmful software that can be passed to different computers. A virus can delete and damage.
PREPARED BY: SYAIDATUL SYAZANA BT PAUZI INTRODUCTION What is the definition of Phishing Hacking.
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
Hackers By- Rima Rai. What are hackers? Hackers are people who hack other people’s account to just have fun or make money. They also do it so they themselves.
Computer security By Isabelle Cooper.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
All you need to know to keep you and your computer safe!!!
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Cyber Safety Jamie Salazar.
CONTROLLING INFORMATION SYSTEMS
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Logan Wojcik COSC 101. Overview ~ Both are hackers ~White hats help computer systems become more secure ~Black hats attack and exploit breaches in systems.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Responsible digital citizenship By: Aiden. What is responsible digital citizenship? Responsible digital citizenship is many things. The topics I am covering.
Digital Citizenship (Cyber bullying, Identity Theft and Hacker) By Gabby and Heidi.
UNIT II COMPUTER AND INTERNET CRIME. OBJECTIVES 1.Identify key trade-offs and ethical issues associated with safeguarding of data and information systems.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Plagiarism, Fair Use and Copyright Laws
7 Mavericks and Hacking 1.
Presented by: Kevin Regaldo Phillip Dai
Hacking Computer crime and cyber security.
HACKING VS PENTESTING NURUL HAFIZAH HAZWNI BINTI HASHIM (MCS151019)
Backdoor Attacks.
Hackers and Crackers iJacsn.
The Impact Of ICT “Hacking”
Sissy r. osteen, ph.d., cfp® Oklahoma State University
CertStore Solution is a platform of 100+ IT professionals and having 500+ IT/Security and Academic courses. Cert Store is the Gold and Accredited partner.
COMPUTER CRIME.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Scams, Identity Theft, and Viruses Kelly & Caitlin
Computer Security.
Choosing a book for Daily 5
KEEP SAFE I will NOT give out personal information: Name -- create a screen name Address Phone number Password School address Pictures.
Introduction to Cybercrime and Security
Presentation transcript:

Computer Hacking By: Ethan Wolfe

What is Computer Hacking? Computer Hacking- The practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. To be accused of hacking, it must be proven that someone gained access to the computer, intending to hack it without permission.

Who? Anyone can be a computer hacker however, computer hacking is most common in teenagers and young adults. Computer hackers are often people who enjoy learning more about how computers work and consider computer hacking a form of art.

Different types of Hackers There are three different types of hackers: – White hat hacker Breaks security for non-malicious purposes – Black hat hacker People who go into a computer security system without authorization, by using different types of viruses. They use technology for vandalism (Credit card Fraud/Identity theft) – Grey hat hacker A mix of white and black hat hackers.

You know you are hacked when: There is a decline in your computer’s performance level for no reason. Your file size has increased for no reason. There are modifications to files that are unexplained. There are changes in network settings. There are popups that will not go away. Your software is not booting up.

Top 10 Hackers Black Hat Jonathan James Adrian Lamo Kevin Mitnick Kevin Poulsen Robert Tappan Morris White Hat Stephen Wozniak Tim Berners-Lee Linus Torvalds Richard Stallman Tsutomu Shimomura

Protection Click here to see how to protect yourself. – How to protect yourself How to protect yourself

Why I Chose this Topic One of the main reasons I chose this topic was to learn more about what computer hacking is. While researching this topic, I learned about computer hacking and also got tips on how to keep my own computer protected from hackers.

The Websites While researching this topic I have used several different websites to inform people about what computer hacking actually is. The websites I used gave me plenty of information about different topics; The definition of hacking, who does it, the different types of hackers, how you know if you have been hacked, the top 10 hackers and how to protect yourself from hackers. I have made the websites URLs available for you to check them out and see where I got my information.

Articles The articles I have chosen are recent and provide actual cases where people have been victims of computer hacking. I chose these articles because I thought they were very informative. The writers of these articles seem to know what they are talking about.

Question How many people get hacked each year?

Work Cited (Article 2011) (Article 2011) Computers-Been-Hacked&id= (Article 2011) Computers-Been-Hacked&id= hacking.htm hacking.htm