報告者:劉旭哲 Anonymous: We didn't hack PlayStation Network.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

UNIT 20 The ex-hacker.
Cyber Security and the Global Business Environment Jeremy Schaar:)
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
IDENTITY THEFT By Beaudan S and Tazwaar A. Identity Theft Identity theft is hard to protect against because hackers are getting better and better and.
INTERNET SAFETY.
1Balaji.S. 2 COMPUTER NETWORK AND SECURITY 3Balaji.S.
Hacker Hunters Plug-In B6 p.341 Matt Spindler CIS 429.
PEOPLE’S REPUBLIC OF HACKING By: Lani N, Ashley R, Michael R, Gregory R.
WikiLeaks Mirror Sites Lose Web Hosting Services 報告者:劉旭哲.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
The iPremier Company, Inc.
Trojan Horse Program Presented by : Lori Agrawal.
1 UNIT 20 The ex-hacker Lecturer: Ghadah Aldehim.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Safe Information By Eli Salazar. The Government The Internet A strategic way to communicate top secret plans. The government used Internet for its safety.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
INFORMATION WARFARE Written by: Larry Druffel Presented by: Frank Dang TCOM 614 Introduction to Telecommunication University of Redlands.
The iPremier Company: Denial of Service Attack
Researcher Finds Google Android Data Stealing Vulnerability 報告者:劉旭哲.
SMARTER. TOGETHER. Skimming Prevention: Overview of Best Practices August 5, 2014.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Threats to I.T Internet security By Cameron Mundy.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
資安新聞簡報 報告者:劉旭哲、曾家雄. Spam down, but malware up 報告者:劉旭哲.
Viruses.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
1 ● Plant Automation Security Review of Cyber Security Attack at Maroochy Water Services ● Bradley Yager ● National Business Development Manager – Telemetry.
Presented by: Dr. Munam Ali Shah
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Researchers turn USB cable into attack tool 報告人:劉旭哲.
CYBER CRIME.
-Tyler. Social/Ethical Concern Security -Sony’s Playstation Network (PSN) hacked in April Hacker gained access to personal information -May have.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Password Security Everything (well… a lot, anyway) you didn’t know, or want to, but really actually need to.
According to netiquette simply refers to our behavior the internet.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Name:Neha Madgaonkar Roll no:  What are intruders?  Types  Behavior  Techniques.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
Lulzsec’s Sony ownage 報告者:劉旭哲. Sony finally partially restored the PlayStation Network in mid-May in the US and Europe – Japan and Asian countries 於五月底部分修復.
Electronic Commerce By: Shannon McManus. Background  The process of buying, selling, or exchanging products through a computer.  Transactions are usually.
Anonymous ACG 6415 Conley, Justin Glenn, Cassady Zhang, Fan.
Safety and Security issues of using ICT Alys brooks.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
PandaLab Quarterly Report (January-March 2011) 報告者:劉旭哲.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Digital Millennium Copyright Act (DMCA) The Digital Millennium Copyright Act is a United States copyright law that was signed into law by Bill Clinton.
MORE MONEY FOR CYBER- SECURITY?. CYBER SECURITY: A TICKING TIME BOMB? Richie Sabu G/T Independent Research Howard High School Mr. Brian Price, Advisor.
Mobile Security By Jenish Jariwala. What is Mobile Security?  Mobile Security is the protection of smartphones, tablets, laptops and other portable computing.
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
Identity Theft Project By: Timmy Townsend And Eric Fields.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Miloš Kotlar 2012/115 Single Layer Perceptron Linear Classifier.
 Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
Prof. I. J. Chung Dept. of Computer & Information Science, Korea Univ. 컴퓨터와 인터넷 윤리 Professor I. J. Chung.
You’ve Been Hacked! What to do when your personal information has been compromised Paul T. Yoder, Information Systems Security Specialist.
COMPUTER CRIME.
Cybersecurity Samuel Mizener Kings High School, Computer Science, 9th
Cyber Security Case Study 2011 Playstation Network Hack
The Art of Deception.
The iPremier Company: Denial of Service Attack
Marcial Quinones-Cardona
Presentation transcript:

報告者:劉旭哲 Anonymous: We didn't hack PlayStation Network

前情提要 Anonymous Against hacker George Hotz alleging that his jailbreaking the Sony PlayStation Denial-of-service PSN Personal information have been stolen

Sony said They found a file planted on a Sony Online Entertainment server during the computer intrusion was named "Anonymous“ 'We are Legion' Evidence found during the investigation point toward the group, even if it wasn't directly responsible.

One or more cybercriminals gained access to PSN servers at or around the same time that these servers were experiencing denial-of-service attacks. security teams were working hard to defend against denial-of- service attacks That may have made it more difficult to detect this intrusion quickly Major credit card companies have not reported any fraudulent transactions that are believed to be related to the attack.

Anonymous ( OpSony ) said The hacker that did this was supporting OpSony’s movements We are a "decentralized" group operating around the globe without any clear hierarchy. While we are a distributed and decentralized group, our 'leadership' does not condone credit card theft "We are Anonymous. We are Legion. We do not Forgive. We do not Forget. Expect Us.“

Conclusion “If you say you are Anonymous, and do something as Anonymous, then Anonymous did it” Anybody can join it and act under its secretive umbrella. Normally, somebody posts an idea for a campaign on Anonymous’ chat rooms and if enough people support it, the group takes it on. The ones behind Operation Sony started denying everything when FBI and Homeland security was put on the case They were afraid they were going to get caught A few operators disappeared.

Now : Anonymous planned a third major attack The hackers claim they currently have access to some of Sony's servers. Sony needed more testing before PlayStation relaunch

Reference 83.html?part=rss&tag=feed&subj=News-Security 83.html?part=rss&tag=feed&subj=News-Security html?part=rss&tag=feed&subj=News-Security html?part=rss&tag=feed&subj=News-Security 17.html?part=rss&tag=feed&subj=News-Security 17.html?part=rss&tag=feed&subj=News-Security feabdc0.html#axzz1LpKzGI2a feabdc0.html#axzz1LpKzGI2a html?part=rss&tag=feed&subj=News-Security html?part=rss&tag=feed&subj=News-Security html?part=rss&tag=feed&subj=News-Security html?part=rss&tag=feed&subj=News-Security