Download presentation
Presentation is loading. Please wait.
Published byIda Atmadja Modified over 6 years ago
1
Christopher romano & Courtney Sullivan 18 September 2017 Ia445
Hackers & hacks Christopher romano & Courtney Sullivan 18 September 2017 Ia445
2
Definition A person who uses computers to gain unauthorized access into data synonyms: cybercriminal, pirate, computer criminal, keylogger, keystroke logger; informal cyberpunk, hacktivist
4
Black Hats
5
Why they hack Financial Gain Espionage Internal Terrorism Boredom
Hacktivists
6
Tools used
7
Ways to get hacked PHISHING DOWNLOADING MALWARE SOCIAL ENGINEERING
PUBLIC WIFI PASSWORD REUSE 0-DAY EXPLOITS
8
TARGETS
9
WHAT’S VULNERABLE
10
A VICTIM’S POV
11
Prevention Password Managers Secure Communication (HTTPS, VPN)
Don’t click suspicious links Encrypt drives Lock Down Social Media Accounts 2-FA Update Software
12
HAPY 21ST COURT
13
rEFERENCES "Burp Suite Editions and Features." PortSwigger Web Security, PortSwigger, 2017. "Getting Started." Kali Linux Official Documentation, Offensive Security, 2017. "Getting Started with Metasploit." Metasploit Documentation, Rapid7, 2014. "IT Security Standard: Vulnerability Assessment and Management." Information Security Office, CalPoly, Accessed Mar. 2013.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.