Presentation is loading. Please wait.

Presentation is loading. Please wait.

Christopher romano & Courtney Sullivan 18 September 2017 Ia445

Similar presentations


Presentation on theme: "Christopher romano & Courtney Sullivan 18 September 2017 Ia445"— Presentation transcript:

1 Christopher romano & Courtney Sullivan 18 September 2017 Ia445
Hackers & hacks Christopher romano & Courtney Sullivan 18 September 2017 Ia445

2 Definition A person who uses computers to gain unauthorized access into data synonyms: cybercriminal, pirate, computer criminal, keylogger, keystroke logger; informal cyberpunk, hacktivist

3

4 Black Hats

5 Why they hack Financial Gain Espionage Internal Terrorism Boredom
Hacktivists

6 Tools used

7 Ways to get hacked PHISHING DOWNLOADING MALWARE SOCIAL ENGINEERING
PUBLIC WIFI PASSWORD REUSE 0-DAY EXPLOITS

8 TARGETS

9 WHAT’S VULNERABLE

10 A VICTIM’S POV

11 Prevention Password Managers Secure Communication (HTTPS, VPN)
Don’t click suspicious links Encrypt drives Lock Down Social Media Accounts 2-FA Update Software

12 HAPY 21ST COURT

13 rEFERENCES "Burp Suite Editions and Features." PortSwigger Web Security, PortSwigger, 2017. "Getting Started." Kali Linux Official Documentation, Offensive Security, 2017. "Getting Started with Metasploit." Metasploit Documentation, Rapid7, 2014. "IT Security Standard: Vulnerability Assessment and Management." Information Security Office, CalPoly, Accessed Mar. 2013.


Download ppt "Christopher romano & Courtney Sullivan 18 September 2017 Ia445"

Similar presentations


Ads by Google