The Security Circus CNIT 120 Jan 14, 2013. Linus Thorvalds.

Slides:



Advertisements
Similar presentations
Whitehat Vigilante and The Breach that Wasn't HI-TEC July 26, 2012.
Advertisements

Ethical Hacking: New Web 2.0 Attacks and Defenses HI-TEC 2011.
Craig Rimando Luke White. “hacking” - negative connotation Not always that way Originally a compliment Not all hacking necessarily bad “Good” hacking?
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
 Sending nasty s, texts or making nasty phone calls.  This may also take place on:  Facebook  Instant messaging  Twitter  Instagram  Online.
Cyber Crime The current threat to the UK Security Marking.
Ch8 The Judicial Branch 8-2 How Courts Are Organized.
Define and identify unethical practices such as hacking, phone fraud, online piracy, cyberstalking, and data vandalism. Use of employer’s computers for.
Student Administration Unit Liaison Meeting1 M-Pathways Collection of Student Consent to Conduct Business Electronically Elaine Nowak June 27, 2006.
Malicious Attacks Quinn Male Susan Dou Hanzhang Hu.
1 쉽게 접근하자 DoS! Sookmyung Women’s Univ. 최서윤. 2 The DoS?! Sockstress DoS using LOIC Link Local DoS.
Current Topics in IS: NYTimes Technology Pages NYTimes Technology Pages By: Jeremy Brugger, Jim Klein Sam Reinhardt, Anthony Knollhoff Diane Torneire.
The U.S. vs Nixon Blaise Murfitt What is the U.S. vs Nixon? The U.S. vs Nixon was a landmark Supreme Court case in which President Richard M. Nixon was.
Ideal Job.
Cracking down on international cyberterrorism
Anonymous By Kendra Kennedy, Benjamin Fleshman, and Hassan Alsuleiman.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
Viruses.
Hacktavism: Friend or Foe Storyboard Andrew Wells.
#1. Calculating Gross Income Dan works part time at Shopko Dan worked 32 hours this week Dan makes $9.75/hour How much was Dan’s Gross Income?
GP or A&E Kayleigh Evans. Children When to take your Child to A&E 1.If your child has Asthma attack 2.Got very high temperature with Rash as it can be.
Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador.
Stupid Whitehat Tricks HOPE X July 20, How it Started 2011.
Hacking and International Investigations Presented By: Nenette Day Harvard University Extension School.
Crime & Malpractice AS Module Heathcote Ch. 10.
Articles 4 – 7 of the Constitution Let’s get to work.
Hints and Tips for Surviving the MSc Project Mark Anthony MSc ISG Summer Conference September 2014.
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
 Anonymous is a loosely knit internet activist group mainly focusing on standing up against internet censorship.  The group is completely democratic,
Process. TE Lawrence Military Sheet John Walker Lindh Labelled by the American government as "Detainee 001" in the "war on terror", John occupies.
The Watergate Complex The President’s Men When Nixon took office, the executive branch was the most powerful branch in the government – it had taken.
The Security Circus.
Text-a-Tip See something? Do something.. TipSoft SMS – How To Videos
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
Welcome to class. I. Law Enforcement=the people and the agencies responsible for making sure that Americans are following the rules and not breaking.
Government: Monarchy Use of force and terror Anti-Americanism.
Anonymous ACG 6415 Conley, Justin Glenn, Cassady Zhang, Fan.
Get Safe Online Expert advice for everyone In association with.
Cyber Attacks Threaten: privacy reliability safety resiliency 2.
NDACo’s Messaging Communications & Publications Tools.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
Whitehat Vigilante BayThreat Dec. 10, Executive Summary This talk has no – Demos – Exploits – 1337ness It's just a sermon about social skills –
Aim: What is the formal Criminal Process?. The Formal Criminal Process 1. Initial Contact- Citizen and Police contact. 2. Investigation- Identification.
The Security Circus MPICT Summer Conference, June, 2011.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
A firm that had its secure system hacked could have the right to investigate the person who sent s into the hacked system, the sender’s ISP.
Last revised A.A. Degree CNIT 120: Network Security Fundamentals of Network Security Preparation for Security+ Certification Essential for.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
The Security Circus & DoS Attacks. Bio Summary The DoS Circus Layer 4 DDoS: Thousands of attackers bring down one site Layer 7 DoS: One attacker brings.
Pay Employment Law. Wages What is Federal minimum wage? – $7.25 What is Michigan’s minimum wage?Michigan’s minimum wage – $8.15 What is the minimum wage.
REPENTURN July 5, 2015 REPENTURN REPENTURN REPENTURN.
Computer Misuse Act INTRODUCTION The Computer Misuse Act became law in August Under the Act hacking and the introduction of viruses are criminal.
Group 7 (G) Ayo Falomo, Saber Hamidi, Eldar Alasgarov, Kym Hulbert, Aaron Cai, Tim Hodgkins & Joe Burrows Tutor: Dr Gary B Willis.
Ch. 18 – Federal Court System. Basics & Background We have a dual court system in the USA. – Federal Courts – 1 national system. – State Courts – 50 separate.
IT 244 Week 4 Cyber Crime To purchase this material link Week-4-Cyber-Crime For more courses visit our website.
Hands-On Ethical Hacking and Network Defense
Organised Crime in New Zealand
organization and jurisdiction of the federal court system
Computer Misuse Act 1990.
Federal Law Enforcement
GOING PLACES UNIT 10.
Wikileaks, Anonymous, and The Jester
It’s Time for a Break!!!.
Identity Theft By: Wilson.
HOW THE SUPREME COURT HEARS AND DECIDES CASES
3 Week A: May 1 – 19 3 Week B: May 22 – June 9
CE-Notes Law Enforcement
15-5 Automated Fingerprint Identification System
Presentation transcript:

The Security Circus CNIT 120 Jan 14, 2013

Linus Thorvalds

Unethical Hackers Breaking the Law

Anonymous

Th3j35t3r "Hacktivist for Good" Claims to be ex-military Originally performed DoS attacks on Jihadist sites Bringing them down for brief periods, such as 30 minutes Announces his attacks on Twitter, discusses them on a blog and live on irc.2600.net

Westboro Baptist Outage 4 sites held down for 8 weeks From a single 3G cell phone –

LulzSec The skilled group of Anons who hacked H B Gary Federal Hacked – US Senate – Pron.com – Sony – FBI – PBS – Fox News

LulzSec Attacks on Government Sites FBI, CIA, US Senate UK's National Health Service SOCA, the UK's Serious Organised Crime Agency taken down

Ryan Cleary Arrested June 21, 2011 Accused of DDoSing the UK’s Serious Organised Crime Agency bringing-British-FBI-site.html

T-Flow Arrested July 19, hacker-squad-arrested-in-london/

Topiary Arrested On /Free-Radicals-The-Secret-Anarchy- Science-sales-rocket-Jake-Davis-seen- clutching-copy.html

– out-hacked-lulzsec-member.html

Stay Out of Anonymous

Case Studies

Dan Kaminsky Link Ch0a

Jacob Applebaum Link Ch 0b

Boris Sverdlik

Jaded Security Link Ch 0e

Byron Sonne Link Ch 0g

Gregory D. Evans

Sam Bowne