Albert Gonzales showed early talent and very easily breezed through computer classes. His remarkable computer skills allowed him to hack into the government.

Slides:



Advertisements
Similar presentations
UNIT 20 The ex-hacker.
Advertisements

SECURITY CHECK Protecting Your System and Yourself Source:
Understand Database Security Concepts
IDENTITY THEFT By Beaudan S and Tazwaar A. Identity Theft Identity theft is hard to protect against because hackers are getting better and better and.
INTERNET SAFETY.
-Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application.
Introduction The concept of “SQL Injection”
1 UNIT 20 The ex-hacker Lecturer: Ghadah Aldehim.
Internet Security Awareness Presenter: Royce Wilkerson.
Acorn.gov.au The ACORN REPORT. PROTECT. PREVENT. acorn.gov.au What is cybercrime? REPORT. PROTECT. PREVENT In Australia, the term 'cybercrime' is used.
1. What is SQL Injection 2. Different varieties of SQL Injection 3. How to prevent it.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
DIYTP What is Cybercrime?  Using the Internet to commit a crime.  Identity Theft  Hacking  Viruses  Facilitation of traditional criminal activity.
L o g o Types of Computer Crime Zhuravlev Alexander 326 MSLU.
Dec 13 th CS555 presentation1 Yiwen Wang --“Securing the DB may be the single biggest action an organization can take to protect its assets” David C. Knox.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
By Carlos G. Coca.  Originally a person who was skilled at programming language who was able to create/alter web content.  Now: “A person who illegally.
Threats to I.T Internet security By Cameron Mundy.
SQL Injection Timmothy Boyd CSE 7330.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Unit 2 - Hardware Computer Security.
An anti-hacking guide.  Hackers are kindred of expert programmers who believe in freedom and spirit of mutual help. They are not malicious. They may.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
(CPSC620) Sanjay Tibile Vinay Deore. Agenda  Database and SQL  What is SQL Injection?  Types  Example of attack  Prevention  References.
CSCI 6962: Server-side Design and Programming Secure Web Programming.
Cyber crime & Security Prepared by : Rughani Zarana.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
The Simple Side of Computer Security for The Brownies That Like To Read!!
Lecture 16 Page 1 CS 236 Online SQL Injection Attacks Many web servers have backing databases –Much of their information stored in a database Web pages.
CYBER CRIME.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Identity Theft.
Watching Software Run Brian ChessNov 18, Success is foreseeing failure. – Henry Petroski.
Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013.
Input Validation – common associated risks  ______________ user input controls SQL statements ultimately executed by a database server
By Sean Rose and Erik Hazzard.  SQL Injection is a technique that exploits security weaknesses of the database layer of an application in order to gain.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Computer crimes.
MORE MONEY FOR CYBER- SECURITY?. CYBER SECURITY: A TICKING TIME BOMB? Richie Sabu G/T Independent Research Howard High School Mr. Brian Price, Advisor.
EECS 354: Network Security Group Members: Patrick Wong Eric Chan Shira Schneidman Web Attacks Project: Detecting XSS and SQL Injection Vulnerabilities.
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
Chapter 1 Real World Incidents Spring Incident Response & Computer Forensics.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
By Collin Donaldson. Hacking is only legal under the following circumstances: 1.You hack (penetration test) a device/network you own. 2.You gain explicit,
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
 Computer Network Attack  “… actions taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
SQL Injection.
Lesson Objectives Aims You should be able to:
Secure Software Confidentiality Integrity Data Security Authentication
Computer Crime CJ 520 / CJ October 27, 2010.
Network security threats
SQL INJECTION ATTACKS.
Threats to computers Andrew Cormack UKERNA.
The Best Way To Secure U R Self
Philip Nichilo Vincent Carestia
Brute force attacks, DDOS, Botnet, Exploit, SQL injection
Lecture 2 - SQL Injection
Introduction to Cybercrime and Security
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
WJEC GCSE Computer Science
Presentation transcript:

Albert Gonzales showed early talent and very easily breezed through computer classes. His remarkable computer skills allowed him to hack into the government network of India, while in his high school library, and his punishment? He was told to say away from a computer for six months.

Albert Gonzales along with two other unnamed Individuals was indicted for conspiring to hack into computer networks supporting major American retail and financial organizations and stealing data relating to more than 130 million credit and debit cards. Albert and this partners used a sophisticated hacking technique called an "SQL (Structured query language) injection attack", which seeks to exploit computer networks by finding ways around the network's firewall, which uncovers privet information, and in this case credit and debit card information

The basic idea behind a injection attack is when a unknown user inputs data into a database, but the program reads that data as a command rather than data information, therefore leaving the database vulnerable to theft, vandalism, pranks esc. This can take place if a input statement is incorrectly filtered for string literal escape characters, escape characters meaning input data met to act as commands and gain access to host capabilities.

What is the Russian business network? The Russian business network is known for its blatant involvement in cybercrime. Cybercrime involves such things as hosting illegal business activity such as personal identity resale, child pornography, spyware, malware, and more. RBN is a non-registered business and yet manages to bring in over $150 million per year. The ironic part is that they don’t go looking for business, business finds them. RBN ‘s hosting is committed to an estimated 60 to 70% of the worlds cybercrimes, and can charge around $1200 for 30 days of service.

Discussion Questions Because this injection attack is so common, who is really at fault? Albert's sentence could be around 20 years, but what about the people responsible and left the doors open for his attack? Should they be liable for anything? Technology is improving, this technique was known and very simple, what does that say about our future involving cybercrime? Will security problems get better or worse?

Albert Gonzales and a few others were indicted and charged for conspiring to hack into computer networks supporting major American retail and financial organizations and stealing data relating to more than 130 million credit and debit cards. Albert and this partners used a sophisticated hacking technique called an "SQL (Structured query language) injection attack", which seeks to exploit computer networks by finding ways around the network's firewall, which uncovers privet information, and in this case credit and debit card information. The basic idea behind a injection attack Is when a unknown user inputs data into a database, but the program reads that data as a command rather than data information, due to incorrect filters, therefore leaving the database vulnerable to theft, vandalism pranks esc.