Author,Kevin Mitnick and William L. Simon Published by Back Bay Books (2012) Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker Presented.

Slides:



Advertisements
Similar presentations
Chapter 8: News Production. News Production Radio news people produce their own material. News personnel can receive wire stories, write/rewrite, record.
Advertisements

Chapter 7 Accounts and Notes Receivable 7-1. Some customers may not pay their account. Uncollectible amounts are referred to as bad debts. There are two.
An educational and informative presentation by Mr. Scott Wilson Of the Oklahoma State University.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Aleksandra Kurbatova IVCM.  What is social engineering?  Types  Pretexting  …  Summary  Conclusion.
Keeper By: Mal Peet Date/year published: February 13, 2007 Genre: Realistic Fiction Ryan Nixon Period 2 11/29/12.
Kevin Mitnick Home Internet Security Course Today, Internet criminals are going after families. They try to guess your passwords and steal your credit.
Job Interview Flash Cards WORK-BASED LEARNING VIRTUAL CAMPUS 1.
Internet Security Awareness Presenter: Royce Wilkerson.
Safe Information By Eli Salazar. The Government The Internet A strategic way to communicate top secret plans. The government used Internet for its safety.
The Art of Deception - Controlling Human Element of Security - Shohei Hagiwara November 17th, 2009.
Information Security Steven Hall 21 st Jan Today’s Presentation Why do this now? What is information? The effects of lost information Newcastle.
Malicious Attacks Quinn Male Susan Dou Hanzhang Hu.
Computer Hacking Cybercrime (1).
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
BY: JASMIN, PRABHJOT, BANDEEP, SUKHJIT, DAWINDER The Top 10 Most Prominent Hackers.
Rolling Through the Great Depression A choose your own adventure story Written by: Team 100.
Agony in the Garden To describe Jesus’ agony and arrest in the garden
Identity Theft.  What is it?  How is it perpetrated?  Can you avoid it?  What if you become a victim?
Staying Safe Online Keep your Information Secure.
Senior Computer Club. Computer News Folders Your Computer Problems Keep the meeting to an hour Changing and Website –
Read Across America Celebrates Dr. Seuss Birthday.
CIS Computer Security Kasturi Pore Ravi Vyas.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
Task 1 Research on any 2 of the following: Online shopping Online banking Web broadcasting Social networking sites Discuss the disadvantages and advantages.
Change A Child’s Story The Challenge  A new state law mandates 3 rd grade students not reading at grade level to not be allowed to move on to 4 th grade.
The Omnivorous Reader in Me. My Learning Styles Results Intra-personal/reflective - Like to work on my own - This has proven to be the best way I learn.
Lyddie Katherine Paterson By Deanna Hernandez. Summary Lyddie is about a girl who lives on a farm with her family. However, Lyddie gets sent to work to.
Writing Your Introduction English 6 My First Argumentative Essay Ms. Butler.
The Right to Vote Packet 16. Your packet says we live in a democracy, but we really don’t It’s more of a “republic” Our country is run by people who are.
He was born August 29, 1958 in Garry, Indiana "King of Pop" recognized as legendary American singer, musician, composer, songwriter, dancer, and pop.
By Louis Sachar Published by Publishers Weekly Copyright 1998 Genre: Realistic Fiction Report by Shane Goehler.
Hackers And Hacking.
What is hacking? Hacking is the use of a computer and its files with out being allowed by the owner. Hacking is used to find out peoples passwords and.
Whitney Houston By: Kimberlyn Molina.
FAMILY LITERACY : IT CAN CHANGE A CHILD’S LIFE. WHAT IS FAMILY LITERACY? Family Literacy studies show that a literacy-rich home contributes more powerfully.
The Art of Deception: Controlling the Human Element of Security by Kevin D. Mitnick, William L. Simon, Steve Wozniak Kevin D. MitnickWilliam L. SimonSteve.
Mission Computers Inc.  In 2013 ◦ 1,000,000,000 phones were hacked  because of ◦ lack of a secure password or ◦ no password at all Source:
My career choices Game designer, Software designer, Engineer.
Ghost in the Wires Kevin Mitnick 2012 Heather Sliwoski CS
Copyright © by Houghton Mifflin Harcourt Publishing Company Next Previous Chapter 10 US History: Civil War to the Present Americans Face Hard Times The.
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
DYING TO MEET YOU BY GILLIAN TITLE AND AUTHOR TITLE-Dying To Meet You Author-Kate Klise.
By: Cyntiha Lord. Characters  Eben  Tess  Libby  Aaron  Mom  Dad.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
1. 动名词作主语 Reading in bed is a bad habit. Planting trees can help to prevent the soil from being washed away by rainwater. 在下列句型中,我们可以用 it 作形式主语, 而把动名词放在句末。
Computer Misuse Act INTRODUCTION The Computer Misuse Act became law in August Under the Act hacking and the introduction of viruses are criminal.
In Your Own Words … Summarizing The Purpose of our lesson is to learn… oHow to put a passage in your own words without changing the meaning oHow to find.
Social Engineering as a Means of Exploitation Carrie Estes.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
By: Micah Stevens Identity Theft in the World Today.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
The Art of Deception: Controlling the Human Element of Security
Social Engineering Dr. X.
Presented by: Kevin Regaldo Phillip Dai
SOCIAL ENGINEERING.
CS Presentation Michael Retrum.
Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker
Computer Security Elaine Munn Introduction to Computer Security.
The Art of Deception.
Social Engineering No class today! Dr. X.
Securing your hack-free work environment

Presentation transcript:

Author,Kevin Mitnick and William L. Simon Published by Back Bay Books (2012) Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker Presented by, Zach Smargon

General summary of the book Memoir of Kevin Mitnick and his life story Goes through his progression of hacks Gives the reader a good view of Mitnick uncensored opinion

Background info on Kevin Mitnick Born August 6, 1963 Born and raised in Los Angeles California Raised by a single mother Stared showing signs of hacker mentality at an early age

Mitnick’s hacks Punching his own transfer card for the bus Social Engineering Grey hat Hacker Phone Phreaking Computer Hacking

False Accusations Running away to Israel to avoid a juvenile warrant Being able to whistle into a pay phone and cause world war three Hacked into Police Department computers and erased my prior arrest records Repeatedly harassed and turned off the phone service of actress Kristy McNichol Planted a false news story about Security Pacific National Bank’s having lost millions of dollars, after he had an employment offer withdrawn.

Relation to class Shows the bad part of technology Social Engineering and its connection to phishing As technology advanced so did Mitnick’s hacking Was involved in my different types of hacking

Mitnick Today Mitnick is currently staying out of trouble and is using his talents as a computer hacking consultant

Recommendation I would definitely recommend Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker