Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally.

Slides:



Advertisements
Similar presentations
UNIT 20 The ex-hacker.
Advertisements

Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer Threats I can understand computer threats and how to protect myself from these threats.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Computer Security and Penetration Testing
Prepared by: Nahed Al-Salah
Wireless Security Threats and Solutions By: Shirene Turpin & Rob Waight.
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
AGAINST HACKING Lysia Moua CIS1055 Sec 005 November 20, 2012.
1 UNIT 20 The ex-hacker Lecturer: Ghadah Aldehim.
Security, Privacy, and Ethics Online Computer Crimes.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
Computer Hacking Cybercrime (1).
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Unit 19 INTERNET SECURITY
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
IT security By Tilly Gerlack.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
 a crime committed on a computer network, esp. the Internet.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
HACKER Someone who attempts to break into computer system. Typically, this kind of hacker would be a proficient programmer or engineer with sufficient.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Virus hacking Stuxnet Backups. Computer SecurityComputer Security Catch it, kill it, bin it.
This is a presentation about viruses, Hacking and back ups!! By Alice Daniels 7P.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
Encryption and Hacking By Steph Garrihy. What is Encryption? Encryption is when data is scrambled by software using a preset key so that anyone viewing.
Ryan B Lauren C Luisa C Joey F.  Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s.
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Hackers And Hacking.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
NT SECURITY: HACKING AND HOW TO PREVENT IT BY GREG WATSON.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Security By Duncan Hall.
Joseph Owen.  Aims:  To look at types of hackers  To look at different types of attacks  How to protect your network  Objectives  You will know.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Technical Implementation: Security Risks
Seminar On Ethical Hacking Submitted To: Submitted By:
Common Methods Used to Commit Computer Crimes
Backdoor Attacks.
Ways to protect yourself against hackers
The Impact Of ICT “Hacking”
Computer Security Elaine Munn Introduction to Computer Security.
Test 3 review FTP & Cybersecurity
Botnets and Remote Administration Tools
Presentation transcript:

Computer Hacking By: Caleb Herring Katie Edom

What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally or illegally, to a computer or file. The term for computer hacker can also mean one who is skilled in programming, but the actual definition is that from above. The term can also mean those who modify software or hardware to use outside the original purpose it was designed for.

Types of Computer Hackers White Hats – Break security for non-malicious purposes, usually to test a security system for themselves or a company. Black Hats – Breaks security for little reason other than malicious use and personal gain. (What we think of. ILLEGAL!!!!) Gray Hats – Those who lie between white and black. They could hack merely to notify the administrator of a whole in security and offer to fix it for a fee, or take that information and give it to a group of people.

Types continued Elite Hacker – Social status among Hackers. Newly discovered exploits circulate among these people. Include groups such as Masters of Deception Script Kiddie – an unskilled hacker who breaks into systems using automated tools written by others. Usually with little understanding of what theyre doing. Neophyte (noob) – Someone new to hacking who has little to no knowledge of the workings of hacking. Hacktivist – Those who use their skills for political activism

How do people computer Hack? There are many ways people can hack into a system, either using the “front door” or the “backdoor”. The “Front door” is used by the hacker getting a hold of the password for whatever they are after, and entering, disguised as you. The “backdoor” is a route left in a program for programmers to utilize to change things about the code.

Why do people Hack? Some are hired by companies to test their security systems to see how strong their defense is. (White Hats) Others want personal gain. Whether this includes stealing identity, money, etc. it does not matter to these people. (Black Hats) Others merely enjoy the challenge. It could be as simple as they have nothing better to do.

What can you do to protect yourself? In all practicality, on the Internet, if someone really REALLY wants your information, there is nothing you can really do to stop them. However, you can make it difficult by: Make sure your firewall is always on Install/update antivirus software Keep OS up to date Be careful what you download Turn off your computer.

Other Tips Use Passwords on everything Don’t back up sensitive Data online Don’t link accounts Security Questions Spread misinformation

Famous Groups of Hackers Anonymous (A more recent and famous one) Masters of Deception Lizard Squad (against Playstation and Xbox) Legion of Doom TeslaTeam

Recent Cases of Computer Hacking With the more famous group, Anonymous, many computer hackings have happened within the last decade. In 2010, Anonymous became aware of Aiplex Software, an Indian Software Company that contracted with film studios to launch DDoS attacks against websites offering such as The Pirate Bay. Thus launch an operation known as “Payback is a B****” Anonymous coordinated and launched a DDoS attack against Aiplex’s website that shut it down for a day.

Anonymous Operation Cont. Other Companies were targeted which include Recording Industry Association of America (RIAA) and the Motion Picture Association of America. (MPAA) in which their websites were also shut down. The group issued a press release stating: “Anonymous is tired of corporate interests controlling the internet and silencing the people’s rights to spread information, but more importantly, the right to SHARE with one another. The RIAA and the MPAA feign to aid the artists and their cause; yet they do no such thing. In their eyes is not hope, only dollar signs. Anonymous will not stand for this any longer.” Eventually, the number of targets increased and the united operation split, one group increasing the number of targets hit, including paypal. This led to be known as the Paypal 14, when 14 members were found and arrested, 13 pleading guilty.

g g hacking.htm hacking.htm les/pc-security/computer-security-threats-hackers les/pc-security/computer-security-threats-hackers rityhttp://en.wikipedia.org/wiki/Hacker_(computer_secu rity) rity

considered-cyber-crime/ considered-cyber-crime/ hackers-least-make-difficult/ hackers-least-make-difficult/