Presentation is loading. Please wait.

Presentation is loading. Please wait.

White Hat vs. Black Hat White Hat Black Hat

Similar presentations


Presentation on theme: "White Hat vs. Black Hat White Hat Black Hat"— Presentation transcript:

1 White Hat vs. Black Hat White Hat Black Hat
An ethical hacker intending to improve security Black Hat A hacker who breaks into a computer system or network with malicious intent Secret Life of a Hacker Video Consequences of being a Black Hat Jail (Brian Salcedo: “A federal appeals court upheld a nine-year prison term Monday for a hacker who tried and failed to steal customer credit-card numbers from the Lowe's chain of home improvement stores.”) The purpose of these slides to engage the students in a discussion of what is a white hat and black hat hacker. They were introduced to these terms yesterday in the Nova Labs videos and game. You will find that there is differing opinions among the students and that is O.K It is important to point out that this is an ethics vs. morality discussion and not everyone will have the same opinion. There are videos attached to all the history of hacks slides. These will explain the attacks and why they are important in the cybersecurity world. Cyber security experts learn whenever these types of attacks are made. It is an on-going battle in this field of who stays ahead of whom. Brian Salcedo was doing war driving where he parked in the parking lot of a Lowes store and was able to access the Lowes wireless network that he could then capture the data on the wireless network which included Lowes customer’s credit card information. Show video that discusses black hat vs white hat roles in the cyber hacking world

2 History Was the hacker group wearing a White Hat or a Black Hat?
Type of Attack: Malware Target: Sony Entertainment Hacker: The Lizard Squad – a hacking group that has been shown to have ties to North Korea, but also Guardians of Peace claimed responsibility Damages: Many terabytes of deleted data and delay in the release of the controversial movie “ The Interview” VIDEO Sony: Was the hacker group wearing a White Hat or a Black Hat?

3 History Was the CIA wearing a White Hat or a Black Hat?
Type of Attack: Virus called Stuxnet Target: PLCs (Programmable Logic Controllers) in centrifuges used for refining uranium to use in nuclear bombs, specifically Siemens S7 PLCs Hacker: U.S. Central Intelligence Agency (CIA) and Israeli Intelligence Damages: Shut down Iran’s Nuclear Program VIDEO Stuxnet: Was the CIA wearing a White Hat or a Black Hat?

4 History Was The Nashi wearing a White Hat or a Black Hat?
Type of Attack: DDoS Target: Country of Estonia Hacker: The Nashi, a pro-Kremlin youth group in Eastern Europe Damages: What happened to Estonia is considered a model of how vulnerable a nation can be to cyber-attacks during a conflict. In a very brief period of time, a variety of methods were used to take down key banking websites, government websites, news sites and generally flooded the Estonian network to a point that it was useless. VIDEO Estonia: Was The Nashi wearing a White Hat or a Black Hat?

5 Amani Children’s Home and School
You are cyber experts and employed by Women Wearing White Hats, Inc. ( You have been hired (contracted) by Amani Children’s Home and School to perform several cyber security services on their website and computer

6 Background Information
Amani Children’s Home and School was founded in Africa in the year 1985 They support themselves with donations, funding from the government and e-commerce In 2010, they received a donation of older computer equipment

7 Background Info - Continued
In 2014, a team from Engineers without Borders helped create a simple website and it is connected to the World Wide Web via a satellite phone. This has allowed the students at Amani’s to sell their crafts and to connect to the world outside their village Engineers without Borders is a non-profit organization where Engineers volunteers to perform tasks in underdeveloped countries. In past most of their projects have been civil engineering projects. New water lines, sources for clean drinking water, etc. In recent years, there have been other engineers with experience in technology that have also been volunteering their time to help in less developed countries to get them connected to the rest of the world and the internet.

8 WWWH.com has been hired to solve these issues
Amani’s Cyber Issues Problem #1 – Amani’s website and computers have no cyber protection Problem #2 – They are experiencing issues with their website and computers Problem #3 – Have they been attacked? WWWH.com has been hired to solve these issues

9 WWWH.com’s mission You will work in teams of two
You have two days to complete the following tasks: 1. Your team will complete a Cyber Audit of Amani 2. Your team will complete a Penetration Test of Amani’s systems 3. Your team will complete a Forensics report and Presentation that will be delivered to Amani

10 Women Wearing White Hats, Inc.
Our corporation’s mission is to help rid the world of cyber threats and cyber bullies. We are the Cyber Wizards and the Super Heroes of the 21st Century ! Go complete your assignment professionally and thoroughly….

11 Amani Children’s Home and School Update
Since your audit they have successfully expanded their e-commerce business by 25% They have received an increase in donations by 20% They currently have almost 100 girls in residence Their students have used their new technology skills to help other students in nearby village schools


Download ppt "White Hat vs. Black Hat White Hat Black Hat"

Similar presentations


Ads by Google