Christopher romano & Courtney Sullivan 18 September 2017 Ia445

Slides:



Advertisements
Similar presentations
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Advertisements

Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Computer Viruses.
 The hackers is a persons that they have a many knowledge in the area of ​​ computer and are capable of deceive the security.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Computer Hacking Cybercrime (1).
Threats to I.T Internet security By Cameron Mundy.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Protecting Yourself Online (Information Assurance)
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crimes.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
Hacking and International Investigations Presented By: Nenette Day Harvard University Extension School.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Information Security Sharon Welna Information Security Officer.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Computer Skills and Applications Computer Security.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Cyber Security – The Changing Landscape Erick Weber Department of Public Works Khaled Tawfik Cyber Security.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
PRESENTED BY Raju. What is information security?  Information security is the process of protecting information. It protects its availability, privacy.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Defining your requirements for a successful security (and compliance
To Know what Cyber crime is
Protection of CONSUMER information
CS101 Security.
Level 2 Diploma Unit 11 IT Security
Information Security.
I S P S loss Prevention.
Network security threats
Hackers and Crackers iJacsn.
Cyber Security Awareness Workshop
Computer Security Elaine Munn Introduction to Computer Security.
Joaquin Fuentes MBA, CEH, CPT, CISSP, CISA, NACA
Cybersecurity Awareness
4 ways to stay safe online 1. Avoid viruses and phishing scams
Risk of the Internet At Home
Malware March 26, 2018.
Defense in Depth Web Server Custom HTTP Handler Input Validation
Home Internet Vulnerabilities
Industry Best Practices – Security For Smartphones / Mobile Devices
Information Security Awareness
Protecting Yourself from Fraud including Identity Theft
Computer Security.
CS101 Security.
Faculty of Science IT Department By Raz Dara MA.
Bethesda Cybersecurity Club
How to keep the bad guys out and your data safe
Computer Security By: Muhammed Anwar.
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Who am I?. Information Security and You: Identity Theft and Credit Card Encryption.
Lesson 2- Protecting Yourself Online
Security in mobile technologies
Why Cyber Security is important to SME? Useful Tips on how you protect and secure your business. By Ronald Soh from Win-Pro Consultancy Pte Ltd
CS101 Security.
Presentation transcript:

Christopher romano & Courtney Sullivan 18 September 2017 Ia445 Hackers & hacks Christopher romano & Courtney Sullivan 18 September 2017 Ia445

Definition A person who uses computers to gain unauthorized access into data synonyms: cybercriminal, pirate, computer criminal, keylogger, keystroke logger; informal cyberpunk, hacktivist

https://www.youtube.com/watch?v=shQR85Xyau0

Black Hats https://www.youtube.com/watch?v=GWKB2AeUR04

Why they hack Financial Gain Espionage Internal Terrorism Boredom Hacktivists

Tools used

Ways to get hacked PHISHING DOWNLOADING MALWARE SOCIAL ENGINEERING PUBLIC WIFI PASSWORD REUSE 0-DAY EXPLOITS

TARGETS

WHAT’S VULNERABLE https://www.youtube.com/watch?v=MeXfCNwMG64

A VICTIM’S POV https://www.youtube.com/watch?v=bjYhmX_OUQQ

Prevention Password Managers Secure Communication (HTTPS, VPN) Don’t click suspicious links Encrypt drives Lock Down Social Media Accounts 2-FA Update Software

HAPY 21ST COURT

rEFERENCES http://www.prophethacker.com/2016/11/white-hat-gray-hat-black-hat-hackers.html "Burp Suite Editions and Features." PortSwigger Web Security, PortSwigger, 2017. "Getting Started." Kali Linux Official Documentation, Offensive Security, 2017. "Getting Started with Metasploit." Metasploit Documentation, Rapid7, 2014. "IT Security Standard: Vulnerability Assessment and Management." Information Security Office, CalPoly, Accessed Mar. 2013. http://www.bbc.com/news/business-40957700 http://money.cnn.com/2013/12/22/news/companies/target-credit-card-hack/index.html https://www.geekwire.com/2017/equifax-hack-one-week-later-really-happened-protect/ http://list25.com/25-hacked/ http://www.rasmussen.edu/degrees/technology/blog/types-of-hackers/ http://www.informationsecuritybuzz.com/articles/9-ways-you-can-get-hacked-tips-to-prevent-getting-hacked/ https://digg.com/2016/how-to-not-get-hacked