Malicious Attacks Quinn Male Susan Dou Hanzhang Hu.

Slides:



Advertisements
Similar presentations
CLEARER: Security and Privacy Research Roadmap for the CrySyS Lab Levente Buttyán, Márk Félegyházi, Boldizsár Bencsáth Laboratory of Cryptography and System.
Advertisements

Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
CHINESE HACKERS. Where do they come from? In 2007 private security firm Mandiant was hired by the New York Times to trace cyber-attacks on their network.
Computers and WEAPONS. Computers as Weapons or help Weapons.
Computers and Crime Breaking and Entering Eavesdropping Harassment Vandalism Destruction of Private Property Possession of Stolen Goods Theft.
NetSPA A software program aimed to avert cyber hackers Group 8 Tiffany Duhamel Elizabeth Sewell Katherine Watson.
Emerging Trends: Cyber Threats Bryan Sheppard Cyber Security Defense Center.
11 ASSESSING THE NEED FOR SECURITY Chapter 1. Chapter 1: Assessing the Need for Security2 ASSESSING THE NEED FOR SECURITY  Security design concepts 
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
Lecture 17 Introduction to Hacking. WHAT IS NETWORK SECURITY? Security is much larger than just packets, firewalls, and hackers. Security includes: –
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Ji Yeon Chu, Lindsey Fong, Jonathan Bender, Yi Low, and Umang Patel.
Intranet By: Alex Kwan Brian Chang Mike Lim. Content Overview History Current Status Future Expectations.
DuWayne Aikins Information Security Forum May 21, 2015 Cyber, A Militarized Domain: What is Means to Texas.
China Hacks Pentagon Computers September 3 rd, 2007.
 It is a Criminal Activity Committed On The Internet.  A generalized definition of Cyber Crime May Be “Unlawful Acts wherein the computer is either.
By Georgia Toze. Question one Why is not putting any personal information online important?
Norman SecureSurf Protect your users when surfing the Internet.
Threats to I.T Internet security By Cameron Mundy.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Cyber crime & Security Prepared by : Rughani Zarana.
Bridges To Computing General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
 a crime committed on a computer network, esp. the Internet.
1. 2 Tier I/II $Ks Tier III/IV $Ms Tier V/VI $Bs Create New Vulnerabilities Discover New Vulnerabilities Exploit Known Vulnerabilities.
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
The HACKER. TECHNOLOGY: Hacker (computer security) someone who accesses a computer system by circumventing its security system. Hacker (hobbyist) who.
Electronic Commerce By: Shannon McManus. Background  The process of buying, selling, or exchanging products through a computer.  Transactions are usually.
Encryption and Hacking By Steph Garrihy. What is Encryption? Encryption is when data is scrambled by software using a preset key so that anyone viewing.
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Computer security By Isabelle Cooper.
Safety and Security issues of using ICT Alys brooks.
Hurdles in implementation of cyber security in India.
Hacking. What is hacking? A hacker is a person who breaks into computers, usually by gaining access to administrative controls. The subculture that has.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Computer crimes.
University of Sunderland Professionalism and Personal Skills Unit 6 Professionalism and Personal Skills Lecture Ethics.
PREPARED BY : Harsh patel dhruv patel sreejit sundaram.
The Internet MIT2000. Theoretical Predecessors Encyclopaedia ◦Encyclopédie  Denis Diderot ◦Encyclopaedia Britannica (1768) Knowledge and power ◦Political.
Smart City Hacked??? Technology & Society. American cities vulnerable to large-scale cyber attack
Securing the Electronic Frontier Ch. 6 Reading: pp ; ; CS 340.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Denial of Service Attack Pornography Phising Spoofing Salami Attack Forgery Hackers: enjoy intellectual challenges of overcoming software limitations.
From viruses to theft Joakim von Braun Security Consultant von Braun Security Consultants Uppsala universitet
 Define hacking  Types of hackers  History  Intentions  Statistics  Facts  How to Protect yourself.
By: Joshua DeLong Computer Security and Privacy.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Presented by: Kevin Regaldo Phillip Dai
Ethical Hacking By: Erin Noonan.
Identity theft vector of the electronic age
Network Security Analysis Name : Waleed Al-Rumaih ID :
A Project on CYBER SECURITY
Secure Software Confidentiality Integrity Data Security Authentication
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Lab for Internet and Security Technology Yan Chen
משרד התעשייה, המסחר והתעסוקה פעולות המשרד לעידוד מגזר המיעוטים
Matthew Allen Comp 2903 October 28th 2010
Prepared By : Binay Tiwari
Computer Security.
Confronting Cyber Threats: Cybersecurity from the FBI’s Perspective
Honeypots Visit for more Learning Resources 1.
Marcial Quinones-Cardona
IP Addresses & Ports IP Addresses – identify a device on a network
Houston Code Wars Bob Moore March 2, 2019 WWAS 2019 | Confidential.
Presentation transcript:

Malicious Attacks Quinn Male Susan Dou Hanzhang Hu

Overview Malicious attacks on the computer are anything that involves attempting to gain information or virtually attain access to a network without permission. Examples include phishing, hacking, and cyber mischief. We will focus on history, current methods of attack, and prevention, which includes computer security.

History Early 1960s: University facilities with huge mainframe computers, like MIT's artificial intelligence lab, become staging grounds for hackers.

History 1983: In one of the first arrests due to malicious attacks on the computer, the FBI busts six teen-age hackers from Milwaukee, known as the "414s" after the local area code. The hackers are accused of some 60 computer break-ins, including from the Memorial Sloan-Kettering Cancer Center to Los Alamos National Laboratory. One of the hackers gets immunity for his testimony; the other five get probation.

History 1988: The Department of Defense severs the links between the unclassified Military Network, or Milnet, and the Arpanet - the early Internet - after it is discovered that someone has broken into at least one Milnet computer.

Methods of Attack

Prevention