White Hat vs. Black Hat White Hat Black Hat

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

UNIT 20 The ex-hacker.
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
Computer Threats I can understand computer threats and how to protect myself from these threats.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Prepared by: Nahed Al-Salah
1 UNIT 20 The ex-hacker Lecturer: Ghadah Aldehim.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Ethical Hacking by Shivam.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
2015 Predicted Threats C YBER S ECURITY I NTELLIGENCE You got to be careful if you don’t know where you’re going, because you might not get there. – Yogi.
ETHICS IN COMPUTER SCIENCE Hacking and identity theft.
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
A sophisticated Malware Arpit Singh CPSC 420
Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Cyber Security Nevada Businesses Overview June, 2014.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
INTRODUCTION & QUESTIONS.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Security Mindset Lesson Introduction Why is cyber security important?
Cybersecurity Test Review Introduction to Digital Technology.
CHAPTER 18 TECHNOLOGY ADVANCEMENTS IN THE WORKPLACE.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
The Cyber Wars BRIAN ABDO. Geopolitical Agendas  Upswing in hacking with governmental agendas.  Their purpose is to discover information from the targeted.
 Define hacking  Types of hackers  History  Intentions  Statistics  Facts  How to Protect yourself.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Cyber Security Foundations Part 1. Cyber Security defined:  Protects computer base information and equipment  Deals with confidentiality of data  Protects.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
Industrial Control System Cybersecurity
International Conflict & Cyber Security
Seminar On Ethical Hacking Submitted To: Submitted By:
Simple Threat Management For IT Teams and MSPs
Presented by: Kevin Regaldo Phillip Dai
3.6 Fundamentals of cyber security
Ethical Hacking By: Erin Noonan.
HACKING VS PENTESTING NURUL HAFIZAH HAZWNI BINTI HASHIM (MCS151019)
STUXNET A Worm With A Purpose.
Common Methods Used to Commit Computer Crimes
COMPUTER ENGINEERING.
Level 2 Diploma Unit 11 IT Security
Hacking: The Good and Bad sides
Cybersecurity Case Study STUXNET worm
Lecture 14: Business Information Systems - ICT Security
The Impact Of ICT “Hacking”
EVOLVING THREATS, VULNERABILITIES AND COUNTERMEASURES
Year 10 ICT ECDL/ICDL IT Security.
Forensics Week 11.
Computer Security Elaine Munn Introduction to Computer Security.
John Butters Running Tiger Teams
Unit 7 – Organisational Systems Security
SEC 420 StrCompetitive Success/tutorialrank.com
Object Oriented Programming and Software Engineering CIS016-2
Information Systems for Health:
Faculty of Science IT Department By Raz Dara MA.
Introduction to Cybercrime and Security
Network Traffic and Cybersecurity
Computer Security.
LAZARUS | GLOBAL kOS | MAFIABOY
Information Technology and E-Commerce
Presentation transcript:

White Hat vs. Black Hat White Hat Black Hat An ethical hacker intending to improve security Black Hat A hacker who breaks into a computer system or network with malicious intent Secret Life of a Hacker Video Consequences of being a Black Hat Jail (Brian Salcedo: “A federal appeals court upheld a nine-year prison term Monday for a hacker who tried and failed to steal customer credit-card numbers from the Lowe's chain of home improvement stores.”) The purpose of these slides to engage the students in a discussion of what is a white hat and black hat hacker. They were introduced to these terms yesterday in the Nova Labs videos and game. You will find that there is differing opinions among the students and that is O.K It is important to point out that this is an ethics vs. morality discussion and not everyone will have the same opinion. There are videos attached to all the history of hacks slides. These will explain the attacks and why they are important in the cybersecurity world. Cyber security experts learn whenever these types of attacks are made. It is an on-going battle in this field of who stays ahead of whom. Brian Salcedo was doing war driving where he parked in the parking lot of a Lowes store and was able to access the Lowes wireless network that he could then capture the data on the wireless network which included Lowes customer’s credit card information. Show video that discusses black hat vs white hat roles in the cyber hacking world http://www.pbslearningmedia.org/resource/nvcy-sci-slhackers/the-secret-lives-of-hackers/

History Was the hacker group wearing a White Hat or a Black Hat? Type of Attack: Malware Target: Sony Entertainment Hacker: The Lizard Squad – a hacking group that has been shown to have ties to North Korea, but also Guardians of Peace claimed responsibility Damages: Many terabytes of deleted data and delay in the release of the controversial movie “ The Interview” VIDEO Sony: https://www.youtube.com/watch?v=1eC99sN31HM Was the hacker group wearing a White Hat or a Black Hat?

History Was the CIA wearing a White Hat or a Black Hat? Type of Attack: Virus called Stuxnet Target: PLCs (Programmable Logic Controllers) in centrifuges used for refining uranium to use in nuclear bombs, specifically Siemens S7 PLCs Hacker: U.S. Central Intelligence Agency (CIA) and Israeli Intelligence Damages: Shut down Iran’s Nuclear Program VIDEO Stuxnet: https://www.youtube.com/watch?v=7g0pi4J8auQ Was the CIA wearing a White Hat or a Black Hat?

History Was The Nashi wearing a White Hat or a Black Hat? Type of Attack: DDoS Target: Country of Estonia Hacker: The Nashi, a pro-Kremlin youth group in Eastern Europe Damages: What happened to Estonia is considered a model of how vulnerable a nation can be to cyber-attacks during a conflict. In a very brief period of time, a variety of methods were used to take down key banking websites, government websites, news sites and generally flooded the Estonian network to a point that it was useless. VIDEO Estonia: https://www.youtube.com/watch?v=sWKgcxHyS10 Was The Nashi wearing a White Hat or a Black Hat?

Amani Children’s Home and School You are cyber experts and employed by Women Wearing White Hats, Inc. (www.WWWH.com) You have been hired (contracted) by Amani Children’s Home and School to perform several cyber security services on their website and computer

Background Information Amani Children’s Home and School was founded in Africa in the year 1985 They support themselves with donations, funding from the government and e-commerce In 2010, they received a donation of older computer equipment

Background Info - Continued In 2014, a team from Engineers without Borders helped create a simple website and it is connected to the World Wide Web via a satellite phone. This has allowed the students at Amani’s to sell their crafts and to connect to the world outside their village Engineers without Borders is a non-profit organization where Engineers volunteers to perform tasks in underdeveloped countries. In past most of their projects have been civil engineering projects. New water lines, sources for clean drinking water, etc. In recent years, there have been other engineers with experience in technology that have also been volunteering their time to help in less developed countries to get them connected to the rest of the world and the internet.

WWWH.com has been hired to solve these issues Amani’s Cyber Issues Problem #1 – Amani’s website and computers have no cyber protection Problem #2 – They are experiencing issues with their website and computers Problem #3 – Have they been attacked? WWWH.com has been hired to solve these issues

WWWH.com’s mission You will work in teams of two You have two days to complete the following tasks: 1. Your team will complete a Cyber Audit of Amani 2. Your team will complete a Penetration Test of Amani’s systems 3. Your team will complete a Forensics report and Presentation that will be delivered to Amani

Women Wearing White Hats, Inc. Our corporation’s mission is to help rid the world of cyber threats and cyber bullies. We are the Cyber Wizards and the Super Heroes of the 21st Century ! Go complete your assignment professionally and thoroughly….

Amani Children’s Home and School Update Since your audit they have successfully expanded their e-commerce business by 25% They have received an increase in donations by 20% They currently have almost 100 girls in residence Their students have used their new technology skills to help other students in nearby village schools