The History of Hacking By: Monica Flores.

Slides:



Advertisements
Similar presentations
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Advertisements

UNIT 20 The ex-hacker.
*Why should parents care about computers and the Internet? *Technology skills are crucial to childrenÌs future success *By 2000, about 60% of new jobs.
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
INTERNET SAFETY.
PEOPLE’S REPUBLIC OF HACKING By: Lani N, Ashley R, Michael R, Gregory R.
Computer Threats I can understand computer threats and how to protect myself from these threats.
Hacking M***********s!!. Who is this guy? John Draper (aka Captain Crunch)
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Ethical and Social...J.M.Kizza 1 Module 9: Computer Crimes Introduction History of Computer Crimes Computer Systems Attacks Motives Costs and Social Consequences.
Computer Crime Computer and Network Security. Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide 4- 2 Identity Theft.
By Sean Owens. Hacking 101 Hacking has been around pretty much since the development of the first electronic computers. The first computer hackers emerge.
HISTORY OF HACKING AND CYBERCRIME BY BRUCE PHILLIPS CRISSY HUGHES CARLOS BETETTA.
Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 6: Computer and Network Security Ethics for the Information Age Forth.
Computer and Internet Crimes By: Tracey Ross & Tommy Brown.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Security, Privacy, and Ethics Online Computer Crimes.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Threats To A Computer Network
History of the Internet. Origins Late 1950’s: invention of the modem: modulator-demodulator or digital to analog ARPA (Advanced Research Projects Agency)
Malicious Attacks Quinn Male Susan Dou Hanzhang Hu.
Presentation By Timothy Mangas. Why should we worry? Crimes committed using the computer or Internet can be more costly (money wise) than other crimes.
CHAPTER THE INTERNET, THE WEB, AND ELECTRONIC COMMERCE 22.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
BY: JASMIN, PRABHJOT, BANDEEP, SUKHJIT, DAWINDER The Top 10 Most Prominent Hackers.
Cyber Crimes.
Viruses.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Lesson 2 — The Internet and the World Wide Web
Dr. Omar Al Jadaan The Internet. Internet Service Provider (ISP) Content Providers: create and maintained material that can be accessed using the internet.
Bridges To Computing General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited.
Introduction to Internet
1 INTERNET AND WORLD WIDE WEB TECHNOLOGIES BUS Abdou Illia, Spring 2007 (Week 11, Thursday 3/22/2007)
Computer Communications Before the Internet. Pre-Internet Networks and Protocols: Usenet Usenet was developed to allow regular users to transfer files,
Social Media Presented to Dr. Carol Watson Honorary Board Member Emmanuel I Institute, Inc. By Jerome Chenevert.
How did the internet develop?. What is Internet? The internet is a network of computers linking many different types of computers all over the world.
Introduction To Internet
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
History of the Internet and WWW. The Internet (computer network connected to other computer networks) Sputnik - first satellite wanted to create.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
THE INTERNET. Things the Internet Provides  Internet has been around for 25 years  Top Ten Events that got us where we are today World Wide Web (www)
Types of Electronic Infection
The HACKER. TECHNOLOGY: Hacker (computer security) someone who accesses a computer system by circumventing its security system. Hacker (hobbyist) who.
1 Lecture # 21 Evolution of Internet. 2 Circuit switching network This allows the communication circuits to be shared among users. E.g. Telephone exchange.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Huda AL-Omairl - Network91 The Internet. Huda AL-Omairl - Network92 What is Internet? The world’s largest computer network, consisting of millions of.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.
Lecture on Internet Issues and Laws. Topics What is Open source ? What is Open source ? What are the Copyright Issues? What are the Copyright Issues?
Social Media Presented to Dr. Carol Watson Honorary Board Member Emmanuel I Institute, Inc. By Jerome Chenevert.
InternetInternet ISYS 1050 K. Steere. What is the Internet? A collection of local, regional, national, and international computer networks that are linked.
Social Media Presented to Dr. Carol Watson Honorary Board Member Emmanuel I Institute, Inc. By Jerome Chenevert.
 Samy (also known as JS.Spacehero)  XSS worm that was designed to propagate across the MySpace social-networking site. At the time of release, it.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
By: Shannon O’Hara The internet is born! 1971 People communicate over a network for the first time. is invented! A program to send messages.
Online Information Services and Bulleting Board Services (BBS)
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Electronic mail News File transfer protocol Chat Instant messaging Online services Online shopping.
THE INTERNET History and Origin computer filled an entire room Cost = $300,000+ Not found in homes Only in governments, some universities.
A Timeline of HACK TACTICS…
Presented by: Kevin Regaldo Phillip Dai
Lesson # 1 A Practical Guide to Computer Forensics Investigations
COMPUTER CRIME.
A Gift of Fire Third edition Sara Baase
Laws Against Computer Hacking
Presentation transcript:

The History of Hacking By: Monica Flores

What is hacking? Hacking is the intentional unauthorized access to computer systems Illegal activities from harmless pranks to huge thefts and shutdowns of services Three phases of hacking: Phase 1: the 1960’s and 1970’s Phase 2: period from 1970’s to 1990’s Phase 3: Beginning in the mid 1990’s with growth of the Web

1960s: The Dawn of Hacking The first computer hackers emerge at MIT Hacking was a positive term Push programs beyond what they were designed to do They "hack" the electric trains, tracks, and switches to make them perform faster and differently

1970s: Phone Phreaks and Captain Crunch Phone hackers (phreaks) break into regional and international phone networks to make free calls John Draper ("Captain Crunch") Draper builds a "blue box" Esquire magazine publishes "Secrets of the Little Blue Box" with instructions for making a blue box Steve Wozniak and Steve Jobs,

1980: Hacker Message Boards and Groups Phone phreaks begin to move into the realm of computer hacking First electronic bulletin board systems (BBSs) spring up The precursor to Usenet newsgroups and e-mail, the boards become the venue of choice for phreaks and hackers Hacking groups begin to form Legion of Doom in the United States Chaos Computer Club in Germany

1983: Kids' Games The movie "War Games" introduces the public to hacking the legend of hackers as cyberheroes (and anti-heroes) is born Authorities arrest six teenagers known as the 414 gang gang breaks into some 60 computers computers at the Los Alamos National Laboratory, which helps develop nuclear weapons.

1984: Hacker 'Zines The hacker magazine 2600 begins regular publication Editor "Emmanuel Goldstein" (Eric Corley) takes handle from George Orwell's "1984“ Both provide tips for would-be hackers and phone phreaks A year later the online 'zine Phrack comes out

Late 1980’s Congress passes the Computer Fraud and Abuse Act makes it a crime to break into computer systems Gives more power to federal authorities The law does not cover juveniles

1988: The Morris Worm Robert T. Morris, Jr., a graduate student at Cornell University launches a self-replicating worm on the government's ARPAnet (precursor to the Internet) to test its effect on UNIX systems The worm gets out of hand and spreads to some 6,000 networked computers Clogging government and university systems

1990: Operation Sundevil Secret Service agents swoop down on hackers in 14 U.S. cities, conducting early-morning raids and arrests The arrests involve organizers and prominent members of BBSs The result is a breakdown in the hacking community, with members informing on each other in exchange for immunity

1993: Why Buy a Car When You Can Hack One? Hacker-fugitive Kevin Poulsen and two friends rig the stations' phone systems They "win" two Porsches, vacation trips and $20,000 Poulsen was already wanted for breaking into phone-company systems He serves five years in prison for computer and wire fraud

1994: The new venue The Internet begins to take off as a new browser, Netscape Navigator information on the Web more accessible move all their how-to info and hacking programs The face of hacking begins to change as information and easy-to-use tools become available to anyone with Net access

1995: The Mitnick Takedown Serial cybertrespasser Kevin Mitnick is captured by federal agents Is charged with stealing 20,000 credit card numbers In prison for four years without a trial Becomes a celebrity in the hacking underground Pleads guilty to seven charges at his trial in March 1999

1997: Hacking AOL AOHell is released A freeware application that allows a burgeoning community of unskilled hackers to wreak havoc on AOL Hundreds of thousands of AOL users find their mailboxes flooded with multi-megabyte mail bombs Their chat rooms are disrupted with spam messages

2000: Service Denied In one of the biggest denial-of-service attacks to date, hackers launch attacks against eBay, Yahoo!, CNN.com., Amazon and others Hackers break into Microsoft's corporate network and access source code for the latest versions of Windows and Office

2001: DNS Attack Microsoft becomes the prominent victim of a new type of hack that attacks the domain name server The DNS paths that take users to Microsoft's Web sites are corrupted The hack is detected within a few hours, but prevents millions of users from reaching Microsoft Web pages for two days.