WHAT IS HACKING ? Hacking is unauthorized use of computer and network resources. The term "hacker" originally meant a very gifted programmer. In recent.

Slides:



Advertisements
Similar presentations
Security Presented by: Mark Davis & Shahein Moussavi.
Advertisements

UNIT 20 The ex-hacker.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Computer Threats I can understand computer threats and how to protect myself from these threats.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Prepared by: Nahed Al-Salah
Computer Viruses.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
1 UNIT 20 The ex-hacker Lecturer: Ghadah Aldehim.
Security, Privacy, and Ethics Online Computer Crimes.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
IT security By Tilly Gerlack.
 a crime committed on a computer network, esp. the Internet.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
Computer Skills and Applications Computer Security.
Computer Security By Duncan Hall.
Joseph Owen.  Aims:  To look at types of hackers  To look at different types of attacks  How to protect your network  Objectives  You will know.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Seminar On Ethical Hacking Submitted To: Submitted By:
Presented by: Kevin Regaldo Phillip Dai
Common Methods Used to Commit Computer Crimes
Secure Software Confidentiality Integrity Data Security Authentication
Answer the questions to reveal the blocks and guess the picture.
Test 3 review FTP & Cybersecurity
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
6. Application Software Security
Presentation transcript:

WHAT IS HACKING ? Hacking is unauthorized use of computer and network resources. The term "hacker" originally meant a very gifted programmer. In recent years though, with easier access to multiple systems, it now has negative implications. A successful hacker looks for poor configuration of Web servers, old or unpatched software, disabled security controls, and poorly chosen or default passwords.

HISTORY OF HACKING Since early 1960’s the positive term “HACKER” started having its negative aftereffects. In one of the first arrests of hackers, the FBI had busted six teen-age hackers. Kevin David Mitnick who is currently behind bars was considered as the world’s famous hacker in late 20 th century.

TYPES OF HACKERS White hat :- A white hat hacker breaks security for non-malicious reasons. Grey hat :- A grey hat hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted. Black Hat :- A black hat hacker is someone who subverts computer security without authorization or who uses technology for terrorism, vandalism, credit card fraud, identity theft, intellectual property theft, or many other types of crime.

TYPES OF HACKERS CONTD. Cyberterrorist :- A Cyberterrorist uses technology to commit terrorism. Their intentions are to cause harm to social, ideological, religious, political, or governmental establishments. Script kiddie :- A script kiddie a non-expert who breaks into computer systems by using pre- packaged automated tools written by others. Hacktivist :- A hacktivist is a hacker who utilizes technology to announce a political message.

COMMON METHODS OF HACKING Security exploit :- A security exploit is a prepared application that takes advantage of a known weakness. Vulnerability scanner :- A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses. These check to see which ports on a specified computer are "open" or available to access the computer, and sometimes will detect what program or service is listening on that port, and its version number. Packet Sniffer :- A packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network..

COMMON METHODS OF HACKING CONTD. :- Spoofing attack :- A spoofing attack involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program Rootkit :- A rootkit is designed to conceal the compromise of a computer's security, and can represent any of a set of programs which work to subvert control of an operating system from its legitimate operators.

COMMON METHODS OF HACKING CONTD. :- Social engineering :- Social Engineering is the art of getting persons to reveal sensitive information about a system. This is usually done by impersonating someone or by convincing people to believe you have permissions to obtain such information. Trojan horse :- Trojan horse is a program which seems to be doing one thing, but is actually doing another. A trojan horse can be used to set up a back door in a computer system such that the intruder can gain access later.

COMMON METHODS OF HACKING CONTD. :- Virus :- A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Worm :- Like a virus, a worm is also a self-replicating program. A worm differs from a virus in that it propagates through computer networks without user intervention. Key loggers :- A keylogger is a tool designed to record ('log') every keystroke on an affected machine for later retrieval.

WHAT MAKES HACKING SO INTRESTING? ● Hobby :- Amateurs and electronic enthusiast are the primary members of this group. These hackers begin by putting together usernames such as the Altair 8800, ABC80 and the ABC800. ● Academic :- Students infact use hacking as a tool to download papers using the networking interface for their benefits. ● Network:- Phone phreaks have developed ways to utilize the phone system to make calls. The old phone system used dozen of switches that were controlled by tone commands. Once these switches were discovered they could be used to control the phone system. Even wi-fi has come under serious threat.

HOW FATAL CAN HACKING BE…. The Chinese military hacked into a Pentagon computer network in June 2007 in the most successful cyber attack on the US defence department. A 15-year-old youth faces charges of hacking into a government computer system that tracks the positions of U.S. Air Force planes worldwide, according to government officials.

WAYS TO PREVENT HACKING… Implement a firewall :- A firewall is a barrier that keeps hackers and viruses out of computer networks. Firewalls intercept network traffic and allow only authorized data to pass through. Develop a corporate security policy :- Establish a corporate security policy that details practices to secure the network. The policy should direct employees to choose unique passwords that are a combination of letters and numbers. Passwords should be changed every 90 days to limit hackers’ ability to gain possession of a functioning password. When someone leaves company, immediately delete the user name and password. The corporate policy should outline consequences for network tampering and unauthorized entry.

WAYS TO PREVENT HACKING CONTD.. Install anti-virus software :- All computers should run the most recent version of an anti-virus protection subscription. Ideally a server should be configured to push virus updates out periodically to all client systems. Employees should be educated about viruses and discouraged from opening attachments or from unknown senders. Keep operating systems up to date :- Upgrade operating systems frequently and regularly install the latest patches or versions of software, which are often free over the Web. If you use Microsoft Windows, check periodically for the latest patches. Don’t run unnecessary network services :- When installing systems, any non-essential features should be disabled. If a feature is installed but not actively used, it is less likely to be updated regularly, presenting a larger security threat. Also, allow only the software employees need to do their job effectively.

WAYS TO PREVENT HACKING CONTD.. Conduct a vulnerability test :- Conducting a vulnerability test is a cost-effective way to evaluate the current security program. This test highlights flaws and limitations in the program, and experts can offer suggestions for improvement. The best method for conducting a vulnerability test is to contact a computer consulting company and provide access to your system for a day or two. This will provide ample time for network appraisal and follow-up discussion and planning. Keep informed about network security :- Numerous books, magazines and online resources offer information about effective security tools and “lessons learned.” Also, the Web provides ample and very current information about security – type in the key words “network security.”

PREVENT HACKING OF WIRELESS NETWORKS Use Secure Portals and Payment Gateways :- Banking transactions made on unsecured websites can lead to leaking of credit card details. These details can then be used to generate a card bearing the same data as the original credit card which can then be used fraudulently. It is imperative to use secure portals and trusted payment gateways like Paypal, etc. Be Aware of Phishing :- Phishing is a fraudulent process of attempting to acquire sensitive information like user Ids and passwords by issuing fake s on the pretext of security verification. The s appear to originate from genuine banks and the user is misled into submitting the information. The golden rule to follow is to never share or submit passwords or user Ids.

PREVENT HACKING OF WIRELESS NETWORKS CONTD… Change Wireless Network Passwords :- Most users of wireless networks do not change the default password provided by the router vendor. These default passwords are known to hackers and it makes a hacker’s job easy to intrude any home network from hundreds of meters away. One should change the default password immediately before using the wireless network. Change Service Set ID or SSID :- SSID or Service Set ID is the name of the wireless network. Wireless router vendors leave a default SSID on installation of the router software. Hackers can easily swap a home computer’s default SSID with theirs without the user’s knowledge. Like the network password the SSID also needs to be changed immediately before using the wireless network.

PREVENT HACKING OF WIRELESS NETWORKS CONTD… Hide the Service Set ID or SSID :- Sometimes changing the SSID is also not full proof as hackers have advanced methods to intrude into a wireless network if the SSID is known. To prevent such cases the SSID needs to be hidden. Router configuration softwares allow the SSID to be hidden and the steps are provided in the manuals. Convert to Static IP Instead of Dynamic :- Most home users use IP addresses on the internet that are dynamic and are provided by randomly picking one from on the fly from a pool of IP addresses. Hackers can obtain a valid IP address from this pool and use it to gain access to the home user’s computer. This feature of assigning dynamic IP addresses can be turned off and a fixed IP can be used instead. Additionally if firewall access rules on the router and computer are limited to this static IP address, then the home computer is secure.

BENEFITS OF HACKING  Industry related :- The computer industry was virtually founded on the ideals of hacking. From the very first hackers that began assembling those early machines to the innovations that have changed computers forever, hacking has always been a part of the computer field. The benefits that the industry has gained from hacking are:- Rapid advancement An inability to stagnate Diversification Innovation

BENEFITS OF HACKING CONTD…  Individual related :- Consumers benefit everyday from hackers and their endless search for knowledge. Although, the hackers mainly seem to compete against one another, society benefits from the discoveries that are made. The benefits that individuals have gained from hacking are:- Continually improving security Product improvements Increased attention to consumer's needs Reliable, free software Free computer and software assistance

INDIAN INITIATIVE AGAINST CYBER ATTACKS Section 66 of Information Technology Act :- Whoever with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person, destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hacking. Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both. National Anti-Hacking Group(NAG ) is a Cyber/Information Security consultancy team backed by a large number of computer buffs, security experts, computer gurus, students and ethical hackers. This Indian based team is working to create awareness in the field of Cyber & Information Security.

HACKING N PREVENTION – A TOM N JERRY TALE As technological advancements are made, the hackers update themselves and in most cases are ahead of the technology to find loopholes. Commercial and home users of the internet should therefore get educated and become aware of basic do’s and don’ts to combat fraudulent activity through wireless networks on the internet.