The HACKER. TECHNOLOGY: Hacker (computer security) someone who accesses a computer system by circumventing its security system. Hacker (hobbyist) who.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

E-books and E-journals Off-campus This presentation will show you how to log in and access Oxford Brookes Library e-books and e-journals when youre off.
UNIT 20 The ex-hacker.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
INTERNET SAFETY.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Hacking M***********s!!. Who is this guy? John Draper (aka Captain Crunch)
The History of Hacking By: Monica Flores.
Daniel Blanchette December 1st 2009 Dedicated to Susan Phillips ( )
HISTORY OF HACKING AND CYBERCRIME BY BRUCE PHILLIPS CRISSY HUGHES CARLOS BETETTA.
JOHN DRAPER AMERICAN COMPUTER PROGRAMMER AND “PHONE PHREAK” Presented by Macie Franklin.
Prepared by: Nahed Al-Salah
Computers in Society Week 8: Computer Security and Hacking.
1 UNIT 20 The ex-hacker Lecturer: Ghadah Aldehim.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
W15D2. Malware = malicious software Viruses, Trojan horses, Worms. Goal: usually financial gain (at the expense of the victim) C-card info disrupt service.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Malicious Attacks Quinn Male Susan Dou Hanzhang Hu.
Customer Service and Web Site Personalization Back to Table of Contents.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Presenter Deddie Tjahjono.  Introduction  Website Application Layer  Why Web Application Security  Web Apps Security Scanner  About  Feature  How.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Safe Surfing Tips Internet Safety Tips for Teens By: LaQuacious Garrett.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
BY: JASMIN, PRABHJOT, BANDEEP, SUKHJIT, DAWINDER The Top 10 Most Prominent Hackers.
Fall 2008CS 334: Computer Security1 Network Security War Stories Fall 2008.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Website on Computer Security By: Brittany Freeman.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
By Ksenia Primizenkina 8K
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
XP New Perspectives on The Internet, Fifth Edition— Comprehensive, 2005 Update Tutorial 7 1 Mass Communication on the Internet Using Newsfeeds Tutorial.
Crimes of Negligence or Incompetence Presented By: Lisa R. Williams.
Viruses, Hacking and Backups By Katie Louise Bieber!
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Emily Ansell 8K viruseshackingbackups next. Viruses A virus is harmful software that can be passed to different computers. A virus can delete and damage.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
Suggestions for Parents Take the time to see what your kids are doing online and what their interests are. Let them teach you about the Internet. Surf.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Internet The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Computer Security By Duncan Hall.
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
Hacking and Its Mysteries By: Nancy Reyes. Table of Contents  Hacking, Good or Bad?  Hackers and Their Origins  Society/Media and Hackers  Government.
COMPUTER VIRUSES By James Robins. THE IMPACT OF VIRUSES By James 2.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
GOOGLE PLAY By William Cook April 14, GOOGLE PLAY Marketplace for apps for android Androids “app store” You must make an account on the developer.
Issues for Computer Users, Electronic Devices, Computer and Safety.
 Define hacking  Types of hackers  History  Intentions  Statistics  Facts  How to Protect yourself.
7 Tips To Improve Your Website Security. Introduction Use of Content management systems like WordPress, Joomla & Drupal, utilization of various tools,
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
CSCI-235 Micro-Computer Applications Privacy & Security I.
A Timeline of HACK TACTICS…
Presented by: Kevin Regaldo Phillip Dai
3.6 Fundamentals of cyber security
Crime DOES Pay (Unless you get caught)
Introduction to Computers
Newly designed Provider Center
The Internet: Encryption & Public Keys
How does the deep web work?
Presentation transcript:

The HACKER

TECHNOLOGY: Hacker (computer security) someone who accesses a computer system by circumventing its security system. Hacker (hobbyist) who makes innovative customizations or combinations of retail electronic and computer equipment. Hacker (programmer subculture) who combines excellence, playfulness, cleverness and exploration in performed activities.

ENTERTAINEMENT: Hacker (video game) 1985 computer game by Activision Hacker (card game) 1992 Steve Jackson Games release Hackers (anthology)a 1996 anthology of short stories edited by Jack Dann and Gardner Dozois Hackers (film) 1995 MGM film starring Angelina Jolie and Jonny Lee Miller

NameHandleNationalityConvictionsDatePenalty Chad Davis Mindphasr United States Intentionally hacking a protected computer and willfully causing damage. March 1, 2000 Six months in prison, US$8,054 in restitution and three years probation James Jeffery Pablo Escobar United Kingdom Hacked into the British Pregnancy Advisory Service, stole patient information and defaced the webpage. April 13, months imprisonm ent

Hacking has been around for more than a century. In the 1870s, several teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years.  Early 1960sUniversity facilities with huge mainframe computers, like MIT's artificial intelligence lab, become staging grounds for hackers. At first, "hacker" was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do.

 Early 1970s John Draper makes a long-distance call for free by blowing a precise tone into a telephone that tells the phone system to open a line. Draper discovered the whistle as a give-away in a box of children's cereal. Draper, who later earns the handle "Captain Crunch," is arrested repeatedly for phone tampering throughout the 1970s.Yippie social movement starts YIPL/TAP (Youth International Party Line/Technical Assistance Program) magazine to help phone hackers (called "phreaks") make free long-distance calls. Two members of California's Homebrew Computer Club begin making "blue boxes," devices used to hack into the phone system. The members, who adopt handles "Berkeley Blue" (Steve Jobs) and "Oak Toebark" (Steve Wozniak), later go on to found Apple Computer.Apple Computer

 Early 1980s Author William Gibson coins the term "cyberspace“ in a science fiction novel called Neuromancer. In one of the first arrests of hackers, the FBI busts the Milwaukee-based 414s (named after the local area code) after members are accused of 60 computer break-ins ranging from Memorial Sloan-Kettering Cancer Center to Los Alamos National Laboratory. Comprehensive Crime Control Act gives Secret Service jurisdiction over credit card and computer fraud. Two hacker groups form, the Legion of Doomin the United States and the Chaos Computer Club in Germany.2600: The Hacker Quarterly is founded to share tips on phone and computer hacking.

There are really many reasons why a hacker might attempt to gain access to a small business website, however, most times there is something to be gained by hacking them in the form of cold, hard, cash. While there are some hackers that do it just to say “Look at how l33t I am”, most are doing it as a way to make money. If you’re thinking, “I just have a small website with some information about my business – why would a hacker have any interest in my site?” The answer is actually pretty simple: Hackers have interest in any site that can be accessed online. Even low-traffic, or micro-niche sites are a target. While dynamic sites and popular content management systems are at a higher risk than static sites, there are many variables server-side that could put you at risk.

1. Script-kiddies: - These guys(or girls) are the young padawans of the hacker world. They attempt to hack sites for fun, to deface the site or most likely just to tell their hacker-buddies “look what I did”. These types of attacks are “usually” something you can relatively easily recover from, providing you have a fresh backup of your site available. 2. Affiliate scammers: – These are mid-level hackers. Generally these people have bots that scan for exploitable areas on websites and will attempt to edit your current site’s pages in order to place spammy links on your site to bad-neighborhoods on the web. The links are sometimes hidden and may be hard to spot, but digging through logs can help to find which files were accessed at the time of the breach and allow you to restore them with a backup.

3. Website Hijackers : – These hackers are the worst and probably what all hackers dream about becoming one day. Website hijackers are in it to win it. Most times they have the most sophisticated bots at their disposal to scan for ways to breach your website or server; once they gain access to your site, they can do all kinds of things to change your website into a spam/porn/gambling/bad-neighborhood type of site. Sometimes even, they use a technology called cloaking, where it will load the site normally when you look at it, but will generate a completely different view for search engines etc. This type of an attack can be something irreversible. Even if you are able to restore the database and pages back to their original, unedited state, the repercussions associated with being black listed by search engines can make it pointless to try. 4. Information thieves: – This type of hack is generally used to gain information about the web server and if possible the usernames and passwords associated with the website. Once a hacker has this information at their disposal, they can really do anything they want, including all of the above. There are also instances where they have been able to use this data to gain access to billing, merchant accounts and third party systems. The severity of this type of an attack can no only harm your business, but if you are housing any sensitive information in your database, it could also mean a sizable lawsuit for damages to others.