CS301 Discussion Topic. Asmt. 1: Hacking to improve security A Dutch hacker, who said he worked in computer security, sent e-mail to Microsoft warning.

Slides:



Advertisements
Similar presentations
This is only.
Advertisements

Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
Ethical Hacking Pratheeba Murugesan. HACKER AENDA  What is Ethical Hacking?  Who are ethical hackers?  Every Website-A Target  Get out of jail free.
Windows 7 Project and Heartbleed Update Sian Shumway Director, IT Customer Service.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Netiquette Rules.
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Ethical Hacking by Shivam.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Copyright © 2003 Bolton Institute Dept. of Computing and Electronic Technology - Multimedia Integration and Applications Lecture 3 - Project Planning.
Computer Security Fundamentals
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Presenter Deddie Tjahjono.  Introduction  Website Application Layer  Why Web Application Security  Web Apps Security Scanner  About  Feature  How.
Staying Safe Online Keep your Information Secure.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
ETHICS OVERVIEW CS10 Winter Any ethical issues from ICTD discussions?
Enterprise Network Risks Attachments -- Workers opening an attachment could unleash a worm or virus onto the corporate network, and a new evolution.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Computer Security! By Bailey Hoover. Opening: “Computer viruses are an urban legend.” -Peter Norton Actually: Virus: software reproduces itself; causes.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Shelby Foster. Cyber Stalking- Use of internet or electronic devices to harass an individual or organization “Cyber stalking usually involves a course.
NETWORK SECURITY. TextBook William Stallings, Cryptography and Network Security: Principles and Practice, ? Edition.
Front Page Title Name Introduction Appropriate Images The Legal Issues -Personal Data -Freedom of Information -Computer Crimes Ethical Issues -
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Changing Your Case Password And a few other words about IT Security.
CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.
PHP Error Handling & Reporting. Error Handling Never allow a default error message or error number returned by the mysql_error() and mysql_errno() functions.
Computer Security By Duncan Hall.
PROMOTION AND MARKETING Unit 7. Promotion and Marketing Planning involves getting things and people in the right place at the right time Developing and.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
1 Host versus Network Security Steven M. Bellovin
Magic Bullets, Free Lunch, and other myths Ben Staab COSC5010 Computer Security.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
ShapeShifter Jennifer Nguyen, Jordan Travis, Cian Connor, Rebecca Miller.
Security Issues Introduction.. Security All the connectivity schemes you will hear about have security implications. –4 computer security incidents in.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Component D: Activity D.3: Surveys Department EU Twinning Project.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Responsible digital citizenship By: Aiden. What is responsible digital citizenship? Responsible digital citizenship is many things. The topics I am covering.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
A Gift of Fire, 2edChapter 7: Computer Crime1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for Computers and the.
OVERVIEW Virus & Worm overview Virus & Worm Difference CodeRed Worm Impact Detection Prevention.
To Know what Cyber crime is
Common Methods Used to Commit Computer Crimes
Homeland Security: Computer Protection
Error Message Handling
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
Chapter 11 crime and security in the networked economy
Ethical hacking
Year 10 ICT ECDL/ICDL IT Security.
Internet Security Submitted to Professor Mort Anvari
Reconnaissance Report Trillium Technologies
Computer Security.
Ethical Hacking.
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
The Internet: Encryption & Public Keys
COMPLETE BUSINESS TEXTING SOLUTION
Chapter 1 Key Security Terms.
Presentation transcript:

CS301 Discussion Topic

Asmt. 1: Hacking to improve security A Dutch hacker, who said he worked in computer security, sent to Microsoft warning that some of its Web sites were vulnerable to break-ins. Microsoft did not reply until after he broke in to one of the Web sites about a week later and left a taunting message as proof. Was his action ethical? Did he do Microsoft and the public a favor? What might be some reasons why Microsoft did not respond to his ?

Postitions Group 1: Argue in support of the hacker. Group 2: Argue against the hacker

(Hacker Advocate) for the pro hacker position revealed a security hole in MS's websites proved the security hole's existence without "damage" compelled Microsoft to "act" potentially saved MS and others from suffering from more severe attacks

(MS Representative) for the anti-hacker position encourages others to hack there is damage caused by showing that it can be done, it encourages others to do the same forces MS and others to redivert resources to prevent further potential damage this may cause delays with services, release dates, increased costs, etc.