HACKING.

Slides:



Advertisements
Similar presentations
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Advertisements

Net security - budi rahardjo Overview of Network Security Budi Rahardjo CISCO seminar 13 March 2002.
HACKING. Contents (1)  VARIOUS DEFINITIONS OF HACKING.  Who is hacker? (various definitions).  What does he do?.  Why does he do?  Who is a cracker?
Is There a Security Problem in Computing? Network Security / G. Steffen1.
KX-NS1000 Initial Set Up For step by step : 16 May,
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
-Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application.
1. AGENDA History. WHAT’S AN IDS? Security and Roles Types of Violations. Types of Detection Types of IDS. IDS issues. Application.
What is hacking? Taeho Oh
Hacking And Cracking ICT Project.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Extranet for Security Professionals Intrusion Scenarios Heather T. Kowalski Tong Xu Ying Hao Hui Huang Bill Halpin Nov. 14, 2000.
1 UNIX Postmortem Mark Henman. 2 Introduction For most system administrators, there is no question that at some point at least one of their systems is.
Principles of Information Technology
Using the WWW in Teaching and Learning Barbara Watson Andrew Stansfield IT Service.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
Threats to I.T Internet security By Cameron Mundy.
Lecture 18 HACKING (CONTINUED). WHY DO PEOPLE HACK ?  JUST FOR FUN.  SHOW OF THEIR KNOWLEDGE.  HACK OTHER SYSTEM SECRETLY.  DESTROY ENEMY’S COMPUTER.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Protecting your Family From the dark places on the Internet Going beyond the standard PC Filter, and dealing with the multiple devices that access the.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Cyber crime & Security Prepared by : Rughani Zarana.
Staying Safe Online Keep your Information Secure.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
29.1 Lecture 29 Security I Based on the Silberschatz & Galvin’s slides And Stallings’ slides.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
LAN Devices  Purposes: Dividing the network into subnets Dividing the network into subnets Joining two networks together Joining two networks together.
Security CS Introduction to Operating Systems.
Stephanie Mercury.  A firewall allows or blocks traffic into and out of a private network or the user's computer.
What is hacking? Hacking is the use of a computer and its files with out being allowed by the owner. Hacking is used to find out peoples passwords and.
1. 2  Students will find areas of triangles and parallelograms.  Why? So you can plan a jewelry making project, as seen in Ex. 44.  Mastery is 80%
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
By :Mitchell Christie by :Mitchell Christie safety.
science/internet-intro
1 Host versus Network Security Steven M. Bellovin
Amazing Features A Real Tool for Spying on and Monitoring a Smartphone Call Interception Call History Instant Messaging SMS Tracking Feature Gps.
PRESENTED BY : Bhupendra Singh
Digital Citizenship (Cyber bullying, Identity Theft and Hacker) By Gabby and Heidi.
ENGLISH EXERCISE. WHY WORK WITH VIDEO CLIPS? PURPOSE – VIDEO CLIPS The purpose is to:  Practice English by presenting, watching and discussing the clips.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Why don’t programmers have to program in machine code?
Computer Security and Ethical Hacking
Firmware threat Dhaval Chauhan MIS 534.
Operating Systems Services provided on internet
(A CORPORATE NETWORK APPROACH)
Operating Wide-Area Ethernet Networks
How to build a good reputation online
Server Concepts Dr. Charles W. Kann.
Anastasios Papaefthimiou Lefteris Tsabras Dimitris Thomadakis
Answer the questions to reveal the blocks and guess the picture.
Unit 9 Network Fundamentals
CIS 106 Innovative Education-- snaptutorial.com
Teaching Listening and STEM
Intrusion detection systems?
إدارة مصادر المعلومات جرائم الحاسب ومبادئ الأمن للعاملين في نظم المعلومات إعداد الطالبة: غادة فوزي مطر إشراف أ. محمود رفيق الفرا
Unit 6 Digital Literacy Study S3 Obj 2-2
Fire-wall.
INTERNET SECURITY.
Overview What Are Cause & Effect Diagrams?
Unit 6 Digital Literacy Study S3 Obj 2-2
Unit 1: Introduction to Social Studies
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
DD Sir-Infomatics Web Development Part-1.
Identity Theft By: Wilson.
IP Addresses & Ports IP Addresses – identify a device on a network
Principles of Information Technology
Presentation transcript:

HACKING

Who is hacker Hack Hacker Cracker Cut with repeated irregular blows Examine something very minutely Hacker The person who hacks Cracker System intruder/destroyer

History of hacking Telephone hacking Computer virus Network hacking Use telephone freely It’s called phreaking Computer virus Destroy many computers Network hacking Hack the important server remotely and destroy/modify/disclose the information

Types of hacking Normal data transfer Interruption Interception Modification Fabrication

Why do hackers hack? Just for fun Show off Hack other systems secretly Notify many people their thought Steal important information Destroy enemy’s computer network during the war

Why can’t Korean kid hack? Almost all Korean kids don’t know English well Almost all hacking program manuals are written in English However, many hacking program manuals are being translated

How can be a real hacker? Study C/C++/assembly language Study computer architecture Study operating system Study computer network Examine the hacking tools for a month Think the problem of the computer

How can protect the system? Use switch hub Setup firewall Ex) ipchains Setup IDS Ex) snort Check unintentional changes Ex) tripwire

How to translate the hackers’ language 1 -> i or l 3 -> e 4 -> a 7 -> t 9 -> g 0 -> o $ -> s | -> i or l |\| -> n |\/| -> m s -> z z -> s f -> ph ph -> f x -> ck ck -> x

How to translate the hackers’ language Ex) 1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3n 1 h4ck3d 1n I did not hack this page, it was like this when I hacked in

THANK YOU