HISTORY OF HACKING AND CYBERCRIME BY BRUCE PHILLIPS CRISSY HUGHES CARLOS BETETTA.

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

Northside I.S.D. Acceptable Use Policy
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
MOBILE DEVICES & THEIR IMPACT IN THE ENTERPRISE Michael Balik Assistant Director of Technology Perkiomen Valley School District.
Technology: Unethical Behavior and Its Consequences Prepared by Tami Genry March 2004.
4 Information Security.
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
2 Language of Computer Crime Investigation
Privacy (or Data) Breaches - Examples South Carolina Department of Revenue Hackers got into the SCDOR’s computers, and stole information on up to 3.2 Million.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Cybercrime and Cyberrelated Crimes Home. Background Cybercrime before networked computers Cybercrime before networked computers Hacker: now a pejorative.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
JOHN DRAPER AMERICAN COMPUTER PROGRAMMER AND “PHONE PHREAK” Presented by Macie Franklin.
1 Telstra in Confidence Managing Security for our Mobile Technology.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 1 Introduction to Security
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Computer Crimes and Abuses1 By: Saad Shwaileh. Computer Crimes and Abuses2 Outline Introduction. Computer crime and computer Abuse ? Types of Computer.
CYBER CRIME AND SECURITY TRENDS
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
BY: JASMIN, PRABHJOT, BANDEEP, SUKHJIT, DAWINDER The Top 10 Most Prominent Hackers.
Combating cyber-crime: the context Justice Canada March 2005.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Defining Security Issues
Information Assurance... Smart Card Interoperability Steve Haynes Phone
A look at networking and its main components. NETWORK A network is a group of connected computers that allow people to share information and equipment.
Cyber crime & Security Prepared by : Rughani Zarana.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
7 Information Security.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
Cybercrime What is it, what does it cost, & how is it regulated?
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter Extension 24 Computer Crime and Forensics.
Safe’n’Sec IT security solutions for enterprises of any size.
Ghost in the Wires Kevin Mitnick 2012 Heather Sliwoski CS
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Securing the Electronic Frontier Ch. 6 Reading: pp ; ; CS 340.
Regional Telecommunications Workshop on FMRANS 2015 Presentation.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
Information Security and Privacy in HRIS
Securing Information Systems
Bellwork Think about this…. Historical Event
Securing Information Systems
E&O Risk Management: Meeting the Challenge of Change
Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker
Chapter 11 crime and security in the networked economy
Year 10 ICT ECDL/ICDL IT Security.
Securing Information Systems
Computer Crime and Security Measures
A Gift of Fire Third edition Sara Baase
Forensic and Investigative Accounting
Security of Data  
Forensic and Investigative Accounting
Laws Against Computer Hacking
Presentation transcript:

HISTORY OF HACKING AND CYBERCRIME BY BRUCE PHILLIPS CRISSY HUGHES CARLOS BETETTA

TECHNOLOGICAL DEVELOPMENTS IPad Blackberry Xbox

TECHNOLOGICAL DEVELOPMENTS Personal Computers Internet & Computer Networks

JOHN DRAPER AKA CAPTAIN CRUNCH

KNOWN AS FATHER OF MODERN HACKING ORIGINALLY RADAR TECHNICIAN SUPPOSDLY CALLED NIXON HACKED PHONE WITH THE USE OF A CAPTAIN CRUNCH CEREAL WHISTLE TAUGHT STEVE WOZNIAK AND STEVE JOBS HOW TO MAKE “BLUE BOXES”

JOHN DRAPER AKA CAPTAIN CRUNCH 70’S SERVED TWO STINTS IN PRISON CURRENTLY UNEMPLOYED HACKED FOR THE FUN OF IT, NOT FOR $$$

STEVE WOZNIAK

CO-FOUNDER OF APPLE 1970’S WAS A STUDENT AT BERKLEY & MEMBER OF “CALIFORNIA’S HOMEBREW COMPUTER CLUB” MASS PRODUCED “BLUE BOXES” FOR TWO REASONS 1) GENERATE ENOUGH CASH FOR THEIR STARTUP COMPANY “APPLE” 2) FASCINATION BEHIND “THE POWER OF IDEAS” “THAT TWO TEENAGERS COULD BUILD A SMALL BOX FOR A HUNDRED DOLLARS AND CONTROL HUNDRED MILLIONS OF DOLLARS OF PHONE INFRASTRUCTURE

KEVIN MITNIK

STARTED AT AGE 12 HACKED: LA’s BUS PUNCH CARD SYSTEM CELL PHONES FAST FOOD SPEAKER SYSTEMS DEC COMPUTER SYSTEM WENT ON TWO AND A HALF YEAR HACKING SPREE ACROSS THE COUNTRY CAUGHT BY “CELLULAR FREQUENCY DIRECTION-FINDING ANTENNA HOOKED UP TO A LAPTOP TO NARROW THE SEARCH TO AN APARTMENT COMPLEX” SENTENCED TO FIVE YEARS OF PRISON AND EIGHT MONTHS OF SOLITARY

KEVIN MITNIK OWNS HIS OWN COMPUTER SECURITY CONSULTING COMPANY (MITNIK SECURITY CONSULTING, LLC) NOW CAN LEGALLY HACK INTO SERVERS STATED “IF I HAD PERFORMED THE SAME HACKS THAT I HAD DONE IN THE PAST TODAY, I WOULD MOST LIKELY BE IN GUANTANAMO BAY, CONSIDERING ALL THE SECURITY LAWS PASSED AFTER 9/11

HACKER LAWS Why do we have hacker laws? Development of New Technologies for business and / or personal use Computers and Microchips

HACKER LAWS Old Days Thief’s Tools Crow Bar

HACKER LAWS Today Computer Wireless Sniffer Device

FIRST COMPUTER HACKER LAWS Computer Fraud and Abuse Act of 1984  to protect from cybercrimes  Defined illegal acts with computer  Computer Espionage  Computer Trespassing  Damage and Fraud with Computer

FIRST COMPUTER HACKER LAWS Computer Fraud and Abuse Act of 1984  Defined Criminal Conduct  Accessing computers without authorization  Accessing computers in excess of authority  ** Company must have a good DBA and access policy  And using stolen information to cause loss, damage or fraud

FIRST COMPUTER HACKER LAWS Computer Fraud and Abuse Act of 1984 In 1984, why the need for new computer hacker laws? Latest High Tech Device: Personal Computer  IBM-PC  Bill Gates and Windows

FIRST COMPUTER HACKER LAWS Computer Fraud and Abuse Act of 1984  In 1984, Expansion of Programming  Writing computer code to develop ‘Apps’ (software tools)  Some Programmers succumb to the Dark Side and developed worms and viruses

PATRIOT ACT OF 2001  Disclosure of Electronic Communications to Law Enforcement  Authorities can get permission to intercept communications on Protected Computers  Bypassing Wiretap Statutes  Including Computers outside the United States

CALIFORNIA COMPREHENSIVE COMPUTER DATA ACCESS AND FRAUD ACT  State Specific Law  Allows Civil Actions (Lawsuits) and Compensatory Damages  Fines of $10,000 per offense and / or prison time

SARBANES-OXLEY ACT 2002  created to improve corporate and auditing responsibilities  Section 404 establishing and maintaining internal controls  Results: Better internal controls and higher protection standards for all companies  Most companies implemented COSO

CRITICS OF SARBANES-OXLEY ACT 2002  requirements are too strict and waste precious company resources  Association of Certified Fraud Examiners  Argued waste of company resources  2010 Restoring American Financial Stability Act – removed Sect 404 requirement for non-accelerated filers

SARBANES-OXLEY ACT & PCAOB  Audit Standard 5 provides guidance for conducting audits of the effectiveness of Internal Controls of Financial Reporting  Critics complain about the vagueness of the guidance and reporting standards

People are the problem!

Getting Into The Network Keeping attackers out of your IT network all together provides the best protection. Hackers are continually finding new ways to get beyond corporations’ IT security. Employee education What needs to be protected? What are the procedures and policies to follow? When an attack is successful, data and applications can be affected.

Inside the Network Barrier USB thumb drives Laptops Netbooks

Inside the Network Barrier MP3 players Digital Cameras Printers Scanners

Inside the Network Barrier Smart Phones are carried in and out of corporations on a daily basis.

Inside the Network Barrier Cloak and Dagger! A hacker disguised as a repairman? Do they look like they should be there?

Inside the Network Barrier Identity Theft Is your home network safe. Do you understand and know the threats that are out there. Corporate protection of customer data.

Inside the Network Barrier Employee Threats Can be intentional or unintentional. Work stations left unattended. Allowing a fellow employee access to an unauthorized area. Education of employees is essential.

History of Hacking and Cybercrime Questions?