Presentation is loading. Please wait.

Presentation is loading. Please wait.

HISTORY OF HACKING AND CYBERCRIME BY BRUCE PHILLIPS CRISSY HUGHES CARLOS BETETTA.

Similar presentations


Presentation on theme: "HISTORY OF HACKING AND CYBERCRIME BY BRUCE PHILLIPS CRISSY HUGHES CARLOS BETETTA."— Presentation transcript:

1

2 HISTORY OF HACKING AND CYBERCRIME BY BRUCE PHILLIPS CRISSY HUGHES CARLOS BETETTA

3 TECHNOLOGICAL DEVELOPMENTS IPad Blackberry Xbox

4 TECHNOLOGICAL DEVELOPMENTS Personal Computers Internet & Computer Networks

5 JOHN DRAPER AKA CAPTAIN CRUNCH

6 KNOWN AS FATHER OF MODERN HACKING ORIGINALLY RADAR TECHNICIAN SUPPOSDLY CALLED NIXON HACKED PHONE WITH THE USE OF A CAPTAIN CRUNCH CEREAL WHISTLE TAUGHT STEVE WOZNIAK AND STEVE JOBS HOW TO MAKE “BLUE BOXES”

7 JOHN DRAPER AKA CAPTAIN CRUNCH 70’S SERVED TWO STINTS IN PRISON CURRENTLY UNEMPLOYED HACKED FOR THE FUN OF IT, NOT FOR $$$

8 STEVE WOZNIAK

9 CO-FOUNDER OF APPLE 1970’S WAS A STUDENT AT BERKLEY & MEMBER OF “CALIFORNIA’S HOMEBREW COMPUTER CLUB” MASS PRODUCED “BLUE BOXES” FOR TWO REASONS 1) GENERATE ENOUGH CASH FOR THEIR STARTUP COMPANY “APPLE” 2) FASCINATION BEHIND “THE POWER OF IDEAS” “THAT TWO TEENAGERS COULD BUILD A SMALL BOX FOR A HUNDRED DOLLARS AND CONTROL HUNDRED MILLIONS OF DOLLARS OF PHONE INFRASTRUCTURE

10

11 KEVIN MITNIK

12 STARTED AT AGE 12 HACKED: LA’s BUS PUNCH CARD SYSTEM CELL PHONES FAST FOOD SPEAKER SYSTEMS DEC COMPUTER SYSTEM WENT ON TWO AND A HALF YEAR HACKING SPREE ACROSS THE COUNTRY CAUGHT BY “CELLULAR FREQUENCY DIRECTION-FINDING ANTENNA HOOKED UP TO A LAPTOP TO NARROW THE SEARCH TO AN APARTMENT COMPLEX” SENTENCED TO FIVE YEARS OF PRISON AND EIGHT MONTHS OF SOLITARY

13 KEVIN MITNIK OWNS HIS OWN COMPUTER SECURITY CONSULTING COMPANY (MITNIK SECURITY CONSULTING, LLC) NOW CAN LEGALLY HACK INTO SERVERS STATED “IF I HAD PERFORMED THE SAME HACKS THAT I HAD DONE IN THE PAST TODAY, I WOULD MOST LIKELY BE IN GUANTANAMO BAY, CONSIDERING ALL THE SECURITY LAWS PASSED AFTER 9/11

14

15 HACKER LAWS Why do we have hacker laws? Development of New Technologies for business and / or personal use Computers and Microchips

16 HACKER LAWS Old Days Thief’s Tools Crow Bar

17 HACKER LAWS Today Computer Wireless Sniffer Device

18 FIRST COMPUTER HACKER LAWS Computer Fraud and Abuse Act of 1984  to protect from cybercrimes  Defined illegal acts with computer  Computer Espionage  Computer Trespassing  Damage and Fraud with Computer

19 FIRST COMPUTER HACKER LAWS Computer Fraud and Abuse Act of 1984  Defined Criminal Conduct  Accessing computers without authorization  Accessing computers in excess of authority  ** Company must have a good DBA and access policy  And using stolen information to cause loss, damage or fraud

20 FIRST COMPUTER HACKER LAWS Computer Fraud and Abuse Act of 1984 In 1984, why the need for new computer hacker laws? Latest High Tech Device: Personal Computer  IBM-PC  Bill Gates and Windows

21 FIRST COMPUTER HACKER LAWS Computer Fraud and Abuse Act of 1984  In 1984, Expansion of Programming  Writing computer code to develop ‘Apps’ (software tools)  Some Programmers succumb to the Dark Side and developed worms and viruses

22 PATRIOT ACT OF 2001  Disclosure of Electronic Communications to Law Enforcement  Authorities can get permission to intercept communications on Protected Computers  Bypassing Wiretap Statutes  Including Computers outside the United States

23 CALIFORNIA COMPREHENSIVE COMPUTER DATA ACCESS AND FRAUD ACT  State Specific Law  Allows Civil Actions (Lawsuits) and Compensatory Damages  Fines of $10,000 per offense and / or prison time

24 SARBANES-OXLEY ACT 2002  created to improve corporate and auditing responsibilities  Section 404 establishing and maintaining internal controls  Results: Better internal controls and higher protection standards for all companies  Most companies implemented COSO

25 CRITICS OF SARBANES-OXLEY ACT 2002  requirements are too strict and waste precious company resources  Association of Certified Fraud Examiners  Argued waste of company resources  2010 Restoring American Financial Stability Act – removed Sect 404 requirement for non-accelerated filers

26 SARBANES-OXLEY ACT & PCAOB  Audit Standard 5 provides guidance for conducting audits of the effectiveness of Internal Controls of Financial Reporting  Critics complain about the vagueness of the guidance and reporting standards

27 People are the problem!

28 Getting Into The Network Keeping attackers out of your IT network all together provides the best protection. Hackers are continually finding new ways to get beyond corporations’ IT security. Employee education What needs to be protected? What are the procedures and policies to follow? When an attack is successful, data and applications can be affected.

29 Inside the Network Barrier USB thumb drives Laptops Netbooks

30 Inside the Network Barrier MP3 players Digital Cameras Printers Scanners

31 Inside the Network Barrier Smart Phones are carried in and out of corporations on a daily basis.

32 Inside the Network Barrier Cloak and Dagger! A hacker disguised as a repairman? Do they look like they should be there?

33 Inside the Network Barrier Identity Theft Is your home network safe. Do you understand and know the threats that are out there. Corporate protection of customer data.

34 Inside the Network Barrier Employee Threats Can be intentional or unintentional. Work stations left unattended. Allowing a fellow employee access to an unauthorized area. Education of employees is essential.

35 History of Hacking and Cybercrime Questions?


Download ppt "HISTORY OF HACKING AND CYBERCRIME BY BRUCE PHILLIPS CRISSY HUGHES CARLOS BETETTA."

Similar presentations


Ads by Google