By Sean Owens. Hacking 101 Hacking has been around pretty much since the development of the first electronic computers. The first computer hackers emerge.

Slides:



Advertisements
Similar presentations
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
Advertisements

Lecture: Malicious Code CIS 3360 Ratan K. Guha. Malicious Code2 Overview and Reading Assignments Defining malicious logic Types Action by Viruses Reading.
Chapter 1.  Security Problem  Virus and Worms  Intruders  Types of Attack  Avenues of Attack 2 Prepared by Mohammed Saher Hasan.
PEOPLE’S REPUBLIC OF HACKING By: Lani N, Ashley R, Michael R, Gregory R.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Computer Threats I can understand computer threats and how to protect myself from these threats.
Hacking M***********s!!. Who is this guy? John Draper (aka Captain Crunch)
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Security for Internet Every Day Use Standard Security Practices and New Threats.
The History of Hacking By: Monica Flores.
JOHN DRAPER AMERICAN COMPUTER PROGRAMMER AND “PHONE PHREAK” Presented by Macie Franklin.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
Computer and Internet Crimes By: Tracey Ross & Tommy Brown.
BOTNETS/Cyber Criminals  How do we stop Cyber Criminals.
History of the Internet. Origins Late 1950’s: invention of the modem: modulator-demodulator or digital to analog ARPA (Advanced Research Projects Agency)
Chapter 9 Information Systems Ethics, Computer Crime, and Security
W15D2. Malware = malicious software Viruses, Trojan horses, Worms. Goal: usually financial gain (at the expense of the victim) C-card info disrupt service.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
Presentation By Timothy Mangas. Why should we worry? Crimes committed using the computer or Internet can be more costly (money wise) than other crimes.
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
What Is A Web Page? An Introduction to the Internet.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
BY: JASMIN, PRABHJOT, BANDEEP, SUKHJIT, DAWINDER The Top 10 Most Prominent Hackers.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Computer Crime and Information Technology Security
Cyber Crimes.
Viruses.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Dr. Omar Al Jadaan The Internet. Internet Service Provider (ISP) Content Providers: create and maintained material that can be accessed using the internet.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Bridges To Computing General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Introduction to Internet
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Computer & Internet Security Sean Lanham, CISSP - ISO University of Texas at Arlington Information Security Office.
IT Security/Online Loss Prevention Bill Finnerty Assistant Director of Information Technology Cumberland County.
Introduction To Internet
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Types of Electronic Infection
Communication, Networks, The internet and the Worldwide Web.
January 6, 2003 A Gathering of Networks. Network Security Issues & Developments.
Accessing the World Wide Web
CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
1 A Closer Look at Cyber Terrorism. 2 Cyber Terrorism Look up definitions to the listed terms using the website below
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Computer and Network Security Brendan Duncombe Bahein Maung.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Computer Misuse Act INTRODUCTION The Computer Misuse Act became law in August Under the Act hacking and the introduction of viruses are criminal.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
THE INTERNET History and Origin computer filled an entire room Cost = $300,000+ Not found in homes Only in governments, some universities.
CSCI-235 Micro-Computer Applications Privacy & Security I.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
A Timeline of HACK TACTICS…
Presented by: Kevin Regaldo Phillip Dai
Common Methods Used to Commit Computer Crimes
Evolution of Internet.
Chapter 11 crime and security in the networked economy
The KGB the Computer and Me
Crisis and Aftermath Morris worm.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Laws Against Computer Hacking
Presentation transcript:

By Sean Owens

Hacking 101 Hacking has been around pretty much since the development of the first electronic computers. The first computer hackers emerge at MIT. They borrow their name from a term to describe members of a model train group at the school who "hack" the electric trains, tracks, and switches to make them perform faster and differently. A few of the members transfer their curiosity and rigging skills to the new mainframe computing systems being studied and developed on campus.

1970s: Phone Phreaks and Cap'n Crunch Phone hackers (phreaks) break into regional and international phone networks to make free calls. One phreak, John Draper (aka "Cap'n Crunch"), learns that a toy whistle given away inside Cap'n Crunch cereal generates a 2600-hertz signal, the same high-pitched tone that accesses AT&T's long-distance switching system. Draper builds a "blue box" that, when used in conjunction with the whistle and sounded into a phone receiver, allows phreaks to make free calls. Shortly thereafter, Esquire magazine publishes "Secrets of the Little Blue Box" with instructions for making a blue box, and wire fraud in the United States escalates. Among the perpetrators: college kids Steve Wozniak and Steve Jobs, future founders of Apple Computer, who launch a home industry making and selling blue boxes.

1988: The Morris Worm Robert T. Morris, Jr., a graduate student at Cornell University and son of a chief scientist at a division of the National Security Agency, launches a self- replicating worm on the government's ARPAnet (precursor to the Internet) to test its effect on UNIX systems. The worm gets out of hand and spreads to some 6,000 networked computers, clogging government and university systems. Morris is dismissed from Cornell, sentenced to three years' probation and fined $10,000.

1989 The Germans and the KGB In the first cyberespionage case to make international headlines, hackers in West Germany (loosely affiliated with the Chaos Computer Club) are arrested for breaking into U.S. government and corporate computers and selling operating- system source code to the Soviet KGB. Three of them are turned in by two fellow hacker spies, and a fourth suspected hacker commits suicide when his possible role in the plan is publicized. Because the information stolen is not classified, the hackers are fined and sentenced to probation. In a separate incident, a hacker is arrested who calls himself "The Mentor." He publishes a now-famous treatise that comes to be known as the Hacker's Manifesto. The piece, a defense of hacker antics, begins, "My crime is that of curiosity... I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all."

1994: Hacking Tools R Us The Internet begins to take off as a new browser, Netscape Navigator, makes information on the Web more accessible. Hackers take to the new venue quickly, moving all their how-to information and hacking programs from the old BBSs to new hacker Web sites. As information and easy-to-use tools become available to anyone with Net access, the face of hacking begins to change.

1995: Serial cybertrespasser Kevin Mitnick is captured by federal agents and charged with stealing 20,000 credit card numbers. He's kept in prison for four years without a trial and becomes a celebrity in the hacking underground. After pleading guilty to seven charges at his trial in March 1999, he's eventually sentenced to little more than time he had already served while he wait for a trial. Russian crackers siphon $10 million from Citibank and transfer the money to bank accounts around the world. Vladimir Levin, the 30-year- old ringleader, uses his work laptop after hours to transfer the funds to accounts in Finland and Israel. Levin stands trial in the United States and is sentenced to three years in prison. Authorities recover all but $400,000 of the stolen money.

1997: Hacking AOL AOHell is released, a freeware application that allows a burgeoning community of unskilled hackers -- or script kiddies -- to wreak havoc on America Online (AOL). For days, hundreds of thousands of AOL users find their mailboxes flooded with multi-megabyte mail bombs and their chat rooms disrupted with spam messages. (AOL Time Warner is the parent company of CNN.com.)

1998: The Cult of Hacking and the Israeli Connection The hacking group Cult of the Dead Cow releases its Trojan horse program, Back Orifice -- a powerful hacking tool -- at Def Con. Once a hacker installs the Trojan horse on a machine running Windows 95 or Windows 98, the program allows unauthorized remote access of the machine. During heightened tensions in the Persian Gulf, hackers touch off a string of break-ins to unclassified Pentagon computers and steal software programs. Then-U.S. Deputy Defense Secretary John Hamre calls it "the most organized and systematic attack" on U.S. military systems to date. An investigation points to two American teens. A 19-year-old Israeli hacker who calls himself "The Analyzer" (aka Ehud Tenebaum) is eventually identified as their ringleader and arrested. Today Tenebaum is chief technology officer of a computer consulting firm.

1999: Software Security Goes Mainstream In the wake of Microsoft's Windows 98 release, 1999 becomes a banner year for security (and hacking). Hundreds of advisories and patches are released in response to newfound (and widely publicized) bugs in Windows and other commercial software products. A host of security software vendors release anti-hacking products for use on home computers.

In one of the biggest denial-of-service attacks to date, hackers launch attacks against eBay, Yahoo!, CNN.com., Amazon and others. Activists in Pakistan and the Middle East deface Web sites belonging to the Indian and Israeli governments to protest oppression in Kashmir and Palestine. Hackers break into Microsoft's corporate network and access source code for the latest versions of Windows and Office.

2001: DNS Attack Microsoft becomes the prominent victim of a new type of hack that attacks the domain name server. In these denial-of-service attacks, the DNS paths that take users to Microsoft's Web sites are corrupted. The hack is detected within a few hours, but prevents millions of users from reaching Microsoft Web pages for two days.