Download presentation
Presentation is loading. Please wait.
1
The vulnerability of the modern society
Spying The vulnerability of the modern society Minas Cholevas Nick Strongylos Slide 1 of 10
2
Chapters Slide 1-2: What is cyber spying?/examples
Slide 3: How did it start? Slide 4: Forms of cyber spying Slide 6-7: How is it done? Slide 8: How can I avoid it? Slide 2 of 10
3
What is cyber spying? Cyber spying typically involves the use of computers in order to access information or take control of individual computers and whole networks for a strategic advantage or psychological, political, physical subversion activities and sabotage. Cyber spying involves analysis of public activity on social networking sites like Facebook and Twitter. Slide 3 of 10
4
Examples 2009 A group of chinese hackers disable hundreds of US computers from accessing Twitter. 2014 Lizard Squad performs DDoS attacks on PSN and Xbox Live. 2017 Facebook sells 52 million contacts to the company responsible for the election of Donald J Trump. Slide 4 of 10
5
How did it start? The US government, with assistance from major telecommunications carriers including AT&T, has engaged in massive, illegal dragnet surveillance of the domestic communications and communications records of millions of ordinary Americans since at least 2001. Since this was first reported on by the press and discovered by the public in late 2005, EFF has been at the forefront of the effort to stop it and bring government surveillance programs back within the law and the Constitution. Slide 5 of 10
6
Forms of cyber spying MOST COMMON: 1. Keylogger
2. Denial of Service (DoS\DDoS) 3. Fake WAP 4. Phishing Slide 6 of 10
7
How is it done? 1. Keylogger 2. Denial of Service (DoS\DDoS).
A software that records the key sequence and strokes of your keyboard These might even contain your personal IDs and passwords. One of the main reasons why online banking sites let you use their virtual keyboards 2. Denial of Service (DoS\DDoS). Most commonly used to take down web servers. A hacker will flood a server with commands and traffic ,the server will not be able to process it all and will finally crash down. Extremely hard to defend against. Although dangerous,it will not grant the hacker access to the computer. Slide 7 of 10
8
3. Fake WAP A hacker can use a special software to fake a wireless access point. Once you get connected the fake WAP, a hacker can access the sent and received online data of the connected device. It’s one of the easier hacks to accomplish and one just needs a simple software and wireless network. Anyone can name their WAP as some legit name and start spying on you. 4. Phishing traps the victim by sending that spoofed link. Deadliest attack vector. The attack route taken by hackers who targeted numerous Hollywood female celebrities. Slide 8 of 10
9
How can I avoid it? Whenever you’re operating a computer in public setting, try to take extra caution. Don’t mess with DDoS. Buy a certified Antivirus . Always read the Terms & Conditions of use. (EA) Download a free VPN on your browser. Don’t click on suspicious stuff . Slide 9 of 10
10
Thank you for your attention!
The Internet is the biggest marvel of the modern world, use it wisely! :) Slide 10 of 10
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.