1 Hacking techniques by John Schmidt, BYU-I Linux/Unix Society June 19, 2008.

Slides:



Advertisements
Similar presentations
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Advertisements

Victoria ISD Common Sense Media Grade 6: Scams and schemes
Name : Ahmed S. Eleyan No. : Teacher : Rasha Attalah Subject : Secure Your Data Date : 20 / 12 / 2010 College of Engineering.
1 Identity Theft and Phishing: What You Need to Know.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Internet Phishing Not the kind of Fishing you are used to.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
How To Protect Your Privacy and Avoid Identity Theft Online.
Quiz Review.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Social Engineering Provide brief background about ourselves i.e. what were are going to school for Ask students what they think social engineering is before.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
CCT355H5 F Presentation: Phishing November Jennifer Li.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
The spoofed . The spoofing The link appears as (i.e NOODLEBANK.com) But actually it links to
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Webmail security.. Webmail security should be of interest to you, because using web based programs like: Gmail, Hotmail, Yahoo, MSN, Rocket, basically.
Phishing Dennis Schmidt, CISSP Director, Office of Information Systems HIPAA Security Officer UNC School of Medicine UNC School of Medicine.
What is Spam? d min.
A Matter of Your Personal Security Phishing Revised 11/30/15.
Social Engineering © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Cybersecurity Test Review Introduction to Digital Technology.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Issues for Computer Users, Electronic Devices, Computer and Safety.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
ARE YOU A CYBER SECURITY RISK?. Pass the Hat Al QaedaFARCHezbollahIRAHAMAS.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Computer Security.
Class Name: Online Safety & Privacy Basics
IT Security  .
Personal spaces.
ISYM 540 Current Topics in Information System Management
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
yahoo mail technical support number
Robert Leonard Information Security Manager Hamilton
Information Security Session October 24, 2005
Staying safe on the internet
Prepared By : Binay Tiwari
Computer Security.
What is Phishing? Pronounced “Fishing”
Presentation transcript:

1 Hacking techniques by John Schmidt, BYU-I Linux/Unix Society June 19, 2008

2 Hacking accounts Password guessing Phishing for account/password information Man-in-the middle Trojan horse/virus OS/Browser security vuneribility Malware/spyware

3 Social Engineering Social networking sites Sholder surfing Piggybacking Dumpster diving /chat contact

4

5 Spoofing Masquerading addresses Fake identification credentials Spoofing data source DomainKeys Yahoo! DomainKeys has confirmed that this message was sent by gmail.com.

6

7

8 Phishing ''Fishing'' for private information Fake websites Malicious Javascript/PHP s from banks, IRS, eBay or PayPal asking for account information ''Fly-by-night'' internet commerce Pleas from Nigerian Princes

9

10

11 Prevention Use very complex passwords and never divulge them to anyone. Use unique passwords for unique accounts, and change them often. Use Linux or Unix (more secure). Keep computer up to date. Scan computer for viruses and spyware/malware often. Clear browser cache. Utilize the phishing tools in browsers to avoid suspect websites. Use common sense.