1 UNIT 20 The ex-hacker Lecturer: Ghadah Aldehim.

Slides:



Advertisements
Similar presentations
1 UNIT 20 The ex-hacker. 2 Starter Hackers Unite 2.A new phishing scam which substituted a bogus website address for any bank details in the computer.
Advertisements

UNIT 20 The ex-hacker.
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
The Internet.
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protection from Internet Theft By James Seegars. What Is Hacking? Definition – A)To change or alter(Computer Program) – B) To gain access to (a computer.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
INTERNET SAFETY.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Computer Threats I can understand computer threats and how to protect myself from these threats.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Prepared by: Nahed Al-Salah
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
FIT3105 Security and Identity Management Lecture 1.
Internet Security Passwords.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
By Carlos G. Coca.  Originally a person who was skilled at programming language who was able to create/alter web content.  Now: “A person who illegally.
Software. stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message.
Threats to I.T Internet security By Cameron Mundy.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Lecturer: Ghadah Aldehim
Chapter 11 Security and Privacy: Computers and the Internet.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Cyber Crimes.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
 a crime committed on a computer network, esp. the Internet.
UNIT 14 1 Websites. Introduction 2 A website is a set of related webpages stored on a web server. Webmaster: is a person who sets up and maintains a.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
According to netiquette simply refers to our behavior the internet.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
1 UNIT 15 Webpage Creator Lecturer: fadwa tlaelan.
By Demi Gardiner 8P Who’s been on your computer??
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Safety and Security issues of using ICT Alys brooks.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Security By Duncan Hall.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
INTRODUCTION & QUESTIONS.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
By Elena Skupenko.  1. Знать и употреблять лексику по теме: a hacker, programmer, to hack, hacking, hacking group, download, blackmail, security expert,
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Social Impacts of IT: P6 By André Sammut. Social Impacts IT impacts our life both in good ways and bad ways. Multiplayer Games Social Networks Anti-social.
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
Common Methods Used to Commit Computer Crimes
UNIT 19 Data Security 2.
How And The Internet Work
Chapter 11 crime and security in the networked economy
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Introduction to Computers
Presentation transcript:

1 UNIT 20 The ex-hacker Lecturer: Ghadah Aldehim

Introduction 2

A hacker is a person who attempts to gain unauthorized access to a network system. They are often young teenagers although they are usually fairly skilled programmers (People who write programs) Sometimes the kind of person who becomes a hacker is referred to as a geek, or as an anorak. An expert lacking in social skills A slang term for an eccentric, socially inept person with little or no fashion sense and having an obsessive interest in a hobby or subject

Geek is now used in computing to mean a dedicated expert. Although hacking is illegal, people become hackers for different reasons including: making money, criminal purposes or to expose political information. But often people hack (break into a computer system) just because it is an exciting challenge. Parents are often unaware that their children are hackers although they pay very high phone bills. Introduction

Young hackers are often caught by boasting about their success to their friends. Since hacking is illegal, hackers want to keep their true identity secret but they often like to call themselves by special names such as “The Analyser”. The Internet has made hacking more common and hackers are found throughout the world. They sometimes form hacking groups or teams with names such as “Hackers Unite” and work together and exchange ideas. Introduction

Hackers like to attack and penetrate computer systems belonging to large, important organizations such as the Pentagon’s computer systems, computer systems belonging to US military bases and Hotmail (the free service provided by the Microsoft Corporation). They compete with each other to be the first to hack into really powerful systems. Introduction

Often, breaking into a system is done gradually, with the hacker gaining entry to a system then planting passwords in the system, allowing them to gain access to the system more easily in the future. When a hacker gains access to a system they don’t usually break into the system using the Internet and steal all the data on the system, as shown in movies. Introduction

Most hacks (break-ins) are done by company staff missusing the company network system. Hackers have been known to do a variety of things to computer systems such as: A.Downloading files and leaking confidential information. Posting information is the term used for making information available to a large number of users in a newsgroup or on a bulletin board. An Internet discussion group that uses a restricted area on the server computer to display messages about a common interest An electronic noticeboard system that enables users to display messages for other users to read Introduction

B.Programming server computers to reroute (send to a different address than the one it was originally sent to). C.Hijacking websites by redirecting the web address (URL) to point to another website. D.Defacing websites by changing the text and graphics on the WebPages, sometimes leaving very rude messages on the system. Introduction

E.Blackmailing the owners of websites by threating to damage their systems by doing something like releasing a virus onto their system, although such a threat often turns out to be nothing more than a hoax. Introduction

Sometimes young hackers put their experience and knowledge to good use when they become older. Many former hackers have been hired by large companies as security experts. They are employed to test out the company systems by trying to hack into them to find any weakness in the systems. Introduction

Cyberspace is the combination of all the data on all the computer networks throughout the world, accessed using the Internet. A person who uses their skills to make cyberspace safer is referred to as a white hat hacker. Introduction

A computer system can be hacked in various ways including: A.Guessing somebody’s password (secret code used to control access to a network system). B.Finding a bug (a fault in a system) that allows certain passwords to access information they are not supposed to access. C.Phoning a company, pretending to be a company employee and asking for a password. Introduction

Connecting to a computer network involves logging in (or sometimes referred to as logging on) by typing a username or ID (identification username) and a password. To avoid a computer system being hacked into, the people managing the system must work hard to keep ahead of the hackers. Introduction

There are different ways of avoiding being hacked into including: A.Installing a firewall. B.Using a callback system. C.Having really secured passwords – don’t use common names or dictionary words. D.Auditing the system regularly (checking the system regularly using the event logs to find failed access attempts). Introduction

Some people don’t like to give out their credit card numbers on the Internet. Hackers can get databases of credit card numbers by hacking computer systems. There are various things you can do to avoid credit card theft on the Internet including: A.Using a separate credit card for Internet purchases. B.Having a small credit limit on the credit card you use. C.Buying a pre-paid charge card for small purchases. Introduction

In the future, smart cards will be used instead of credit cards. This will require smart card readers to be attached to computers. Introduction