Prepared by: Nahed Al-Salah

Slides:



Advertisements
Similar presentations
1 UNIT 20 The ex-hacker. 2 Starter Hackers Unite 2.A new phishing scam which substituted a bogus website address for any bank details in the computer.
Advertisements

UNIT 20 The ex-hacker.
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Implications and Security Issues of the Internet By Neelesh Patel.
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
INTERNET SAFETY.
Lecturer: Fadwa Tlaelan
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Unit 18 Data Security 1.
1 UNIT 20 The ex-hacker Lecturer: Ghadah Aldehim.
Security, Privacy, and Ethics Online Computer Crimes.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Threats to I.T Internet security By Cameron Mundy.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Internet Standard Grade Computing. Internet a wide area network spanning the globe. consists of many smaller networks linked together. Service a way of.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Crimes.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
The Simple Side of Computer Security for The Brownies That Like To Read!!
By Ramneek Hundal.. 5 types of Virus.. I LOVE YOUI LOVE YOU. WormsWorms.TROJEN HORES.MELISSA.HAPPY 99 What is a virus. A computer virus is a computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
 a crime committed on a computer network, esp. the Internet.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
1 UNIT 15 Webpage Creator Lecturer: fadwa tlaelan.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
UNIT 12 The Internet By Nahed AlSalah 1 Computer Terminologieg unit12 Nahed AlSalah.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Security By Duncan Hall.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Networks. Learning Objectives: By the end of this lesson you should be able to:
Any criminal action perpetrated primarily through the use of a computer.
By Elena Skupenko.  1. Знать и употреблять лексику по теме: a hacker, programmer, to hack, hacking, hacking group, download, blackmail, security expert,
BY JENNA SAUDER SLIDE OVERVIEW This presentation will discuss the following This presentation will discuss the following : What a Virus is… How a Virus.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Common Methods Used to Commit Computer Crimes
Unit 4 IT Security.
UNIT 19 Data Security 2.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
BCT 2.00 Analyze Technology Issues
UNIT 18 Data Security 1.
Introduction to Computers
HOW DO I KEEP MY COMPUTER SAFE?
Unit 4 IT Security Kerris Davies.
Presentation transcript:

Prepared by: Nahed Al-Salah Unit 20 The ex-hacker Prepared by: Nahed Al-Salah Button

Who is a hacker ? He is a person who attempts to gain unauthorized access to network system. They are often young teenagers through they are usually fairly skilled programmer ( people who write computer programs)   The hackers could be named geek ( an expert lacking in social skills) Note : it now used in computer to mean a dedicated expert. anorak : ( a slang term for an eccentric , socially inept person with little or no fashion sense and having an obsessive interest in a hobby or subject.

People become hackers for many reasons Making many Criminals purposes Expose political informal People hack ( break into a computer system) because it’s an exciting challenge.

Is hacking legal or illegal? Since hacking ( attempting to gain unauthorized access to a network system ) is illegal. Hackers wants to keep their true identity is secret. They like to call themselves by special names such as “ analyzer” . They like to form hacking groups or teams that work together and exchange ideas.  

How hackers attack and penetrated computer systems? hackers like to attack and penetrate the computer systems belonging to large companies such as :- Pentagon’s computer system Computer systems belonging to US military bases. Hotmail “ free email service provided by Microsoft Corporation”

Steps for breaking computer systems Hacking is done gradually : Hackers gaining entry to system gradually. Planting password in the systems , allowing them to gain access to the system more easily.

What are the things done to computer systems ? Most hacks are done by company staff misusing the company network. downloading files ( copying files from a server computer) and leaking confidential information. Posting information is the term used for making information available to a large number of users in a newsgroup( an internet discussion group that uses a restricted area on a server computer to display messages about a common interest) or on bulletin board ( an electronic notice board system that enables users to read ).   exposing email ( electronic email) correspondence managed by well-known email services, causing the services to be shut down while the exposed weakness in the system is repaired.

Programming email server computers to reroute email ( send to different email address than the one it was originally sent to ). Hijacking websites by redirecting the web address ( URL) to point to another website. Defacing websites by changing the text and graphics on the webpages, sometimes leaving very rude messages on the system. Blackmailing ( the owners of websites by threatening to damage their systems by doing something like releasing virus ( a program that can reproduce itself and is written with the purpose of causing damage or causing a computer to behave in an usual way) onto their system, although such a threat often turns out to be nothing more than a hoax.

When the large companies hired the hackers Large companies as security experts employ hackers to test out the companies systems by trying to hack into them and fins any weakness in their system and to make Cyberspace safer ( is the combination of all data on all the computer network throughout the world , accessed by using internet.  “A white hat “ hacker is a person who uses hacker skills to make Cyberspace safer. A computer system can be hacked in various ways Guessing somebody’s password( secret code used to control access to a network system). Finding bug ( a fault in a system ) that allows certain passwords to access information they are not supposed to access. Phoning a company, pretending to be a company employee and asking for a password. People tend to be too trusting.

Different ways of avoiding being hacked Installing firewall ( a combination of hardware and software used to control the data going into and out of a network). Using a callback system ( a system that automatically disconnected a telephone line after receiving a call and then dials the telephone number of the system that made the call, to reconnect the line. It is used to remote access systems to make sure that connections can only be made from permitted telephone numbers.) Having really secure passwords ( secret codes used to control access to a network system ) -don’t use common names or dictionary words. Auditing the system regularly ( checking the system regularly using event logs to find failed access attempts ).

What could you do to avoid credit card theft on the internet Using a separate credit card for internet purchases. Having a small credit card limit on the credit card you use. Buying a pre-paid charge card for small purchases. Note : In the future, smart cards( plastic cards containing a processors and memory chip that can be used to store large amounts of confidential data) will be used instead of credit cards. This will require smart cards readers (devices used for reading smart cards) to be attached to computers.

Exercises Text Book