By Carlos G. Coca.  Originally a person who was skilled at programming language who was able to create/alter web content.  Now: “A person who illegally.

Slides:



Advertisements
Similar presentations
UNIT 20 The ex-hacker.
Advertisements

What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Understand Database Security Concepts
Protection from Internet Theft By James Seegars. What Is Hacking? Definition – A)To change or alter(Computer Program) – B) To gain access to (a computer.
Physical Security Logical/Computer Security What other examples?
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
-Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application.
Computer Security and Penetration Testing
Prepared by: Nahed Al-Salah
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
1 UNIT 20 The ex-hacker Lecturer: Ghadah Aldehim.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
 The hackers is a persons that they have a many knowledge in the area of ​​ computer and are capable of deceive the security.
James Tam Computer Security Concepts covered Malicious computer programs Malicious computer use Security measures.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
1. What is SQL Injection 2. Different varieties of SQL Injection 3. How to prevent it.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
By Hassan Abu daqen & montaser elsabe3 & Nidal Abu saif.
Classification of Viruses. A Government Report from Gibb, McMillan and Wylie.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Data Storage. Database structure 1 What is a database system? Answer 1 a database is a system for managing a collection of data. Answer 2 data bases are.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Hacking Phishing Passwords Sourendu Gupta (TIFR).
Ashley Chambliss ED 505 Fall 2. “Digital Citizenship is a way for teachers to prepare you for a world full of technology.” (Ribble, ) “A means.
Unit 19 INTERNET SECURITY
(CPSC620) Sanjay Tibile Vinay Deore. Agenda  Database and SQL  What is SQL Injection?  Types  Example of attack  Prevention  References.
IT security By Tilly Gerlack.
CIS 450 – Network Security Chapter 8 – Password Security.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Analysis of SQL injection prevention using a proxy server By: David Rowe Supervisor: Barry Irwin.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
10/20/2015 ©2006 Scott Miller, University of Victoria 1 User Authentication Content Generation The Use of Cookies Content Pooling Rev 1.5.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Computer Skills and Applications Computer Security.
Computer Security By Duncan Hall.
Joseph Owen.  Aims:  To look at types of hackers  To look at different types of attacks  How to protect your network  Objectives  You will know.
Secure Authentication. SQL Injection Many web developers are unaware of how SQL queries can be tampered with SQL queries are able to circumvent access.
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
Computer and Network Security Brendan Duncombe Bahein Maung.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Information Systems Design and Development Security Precautions Computing Science.
By Collin Donaldson Man in the Middle Attack: Password Sniffing and Cracking.
 Computer Network Attack  “… actions taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers.
Group 18: Chris Hood Brett Poche
Answer the questions to reveal the blocks and guess the picture.
Ethical hacking
Big Picture How many ways can a system be attacked? What can we do about it?
Teaching Computing to GCSE
Defense in Depth Web Server Custom HTTP Handler Input Validation
PHP: Security issues FdSc Module 109 Server side scripting and
Unit 1.6 Systems security Lesson 2
Brute force attacks, DDOS, Botnet, Exploit, SQL injection
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Presentation transcript:

By Carlos G. Coca

 Originally a person who was skilled at programming language who was able to create/alter web content.  Now: “A person who illegally gains access to and sometimes tampers with information in a computer system.”  Merriam-Webster definition

White Hat  Help prevent weak systems from being hacked.  Make web safer for individuals. Black Hat  Cause problems for individuals, companies and government.  Steal identities, money and add viruses.

 SQL injections  Worms  Encryption

 SQL = Structured Query Language  Used to interact with databases.  Step 1: Hackers find holes in coding design.  Step 2: Add their own SQL into a database.  Step 3: Obtain information.

Whitelisting  Enables a program to check through a list of allowed characters.  Harder to give the database orders since they’re not allowed in the application. Blacklisting  Tells program to immediately deny:  Certain characters.  Combinations of characters.

 Infect systems and search for other systems to infect without user interaction.  Starts slow then “snowballs” and becomes more and more devastating.  Conflicker worm.

 Encryption is used to hide passwords.  Hackers attack in three ways.  Brute force attack:  Program goes through every possible combination.  Dictionary attack:  Uses a downloaded list of common passwords and enters them rapidly.  Cryptanalysis attack:  Takes a long hash and breaks it down into smaller segments and tries answering smaller pieces of the puzzle at one time.