Download presentation
Presentation is loading. Please wait.
Published byBryce Spencer Modified over 9 years ago
2
HISTORY OF HACKING AND CYBERCRIME BY BRUCE PHILLIPS CRISSY HUGHES CARLOS BETETTA
3
TECHNOLOGICAL DEVELOPMENTS IPad Blackberry Xbox
4
TECHNOLOGICAL DEVELOPMENTS Personal Computers Internet & Computer Networks
5
JOHN DRAPER AKA CAPTAIN CRUNCH
6
KNOWN AS FATHER OF MODERN HACKING ORIGINALLY RADAR TECHNICIAN SUPPOSDLY CALLED NIXON HACKED PHONE WITH THE USE OF A CAPTAIN CRUNCH CEREAL WHISTLE TAUGHT STEVE WOZNIAK AND STEVE JOBS HOW TO MAKE “BLUE BOXES”
7
JOHN DRAPER AKA CAPTAIN CRUNCH 70’S SERVED TWO STINTS IN PRISON CURRENTLY UNEMPLOYED HACKED FOR THE FUN OF IT, NOT FOR $$$
8
STEVE WOZNIAK
9
CO-FOUNDER OF APPLE 1970’S WAS A STUDENT AT BERKLEY & MEMBER OF “CALIFORNIA’S HOMEBREW COMPUTER CLUB” MASS PRODUCED “BLUE BOXES” FOR TWO REASONS 1) GENERATE ENOUGH CASH FOR THEIR STARTUP COMPANY “APPLE” 2) FASCINATION BEHIND “THE POWER OF IDEAS” “THAT TWO TEENAGERS COULD BUILD A SMALL BOX FOR A HUNDRED DOLLARS AND CONTROL HUNDRED MILLIONS OF DOLLARS OF PHONE INFRASTRUCTURE
11
KEVIN MITNIK
12
STARTED AT AGE 12 HACKED: LA’s BUS PUNCH CARD SYSTEM CELL PHONES FAST FOOD SPEAKER SYSTEMS DEC COMPUTER SYSTEM WENT ON TWO AND A HALF YEAR HACKING SPREE ACROSS THE COUNTRY CAUGHT BY “CELLULAR FREQUENCY DIRECTION-FINDING ANTENNA HOOKED UP TO A LAPTOP TO NARROW THE SEARCH TO AN APARTMENT COMPLEX” SENTENCED TO FIVE YEARS OF PRISON AND EIGHT MONTHS OF SOLITARY
13
KEVIN MITNIK OWNS HIS OWN COMPUTER SECURITY CONSULTING COMPANY (MITNIK SECURITY CONSULTING, LLC) NOW CAN LEGALLY HACK INTO SERVERS STATED “IF I HAD PERFORMED THE SAME HACKS THAT I HAD DONE IN THE PAST TODAY, I WOULD MOST LIKELY BE IN GUANTANAMO BAY, CONSIDERING ALL THE SECURITY LAWS PASSED AFTER 9/11
15
HACKER LAWS Why do we have hacker laws? Development of New Technologies for business and / or personal use Computers and Microchips
16
HACKER LAWS Old Days Thief’s Tools Crow Bar
17
HACKER LAWS Today Computer Wireless Sniffer Device
18
FIRST COMPUTER HACKER LAWS Computer Fraud and Abuse Act of 1984 to protect from cybercrimes Defined illegal acts with computer Computer Espionage Computer Trespassing Damage and Fraud with Computer
19
FIRST COMPUTER HACKER LAWS Computer Fraud and Abuse Act of 1984 Defined Criminal Conduct Accessing computers without authorization Accessing computers in excess of authority ** Company must have a good DBA and access policy And using stolen information to cause loss, damage or fraud
20
FIRST COMPUTER HACKER LAWS Computer Fraud and Abuse Act of 1984 In 1984, why the need for new computer hacker laws? Latest High Tech Device: Personal Computer IBM-PC Bill Gates and Windows
21
FIRST COMPUTER HACKER LAWS Computer Fraud and Abuse Act of 1984 In 1984, Expansion of Programming Writing computer code to develop ‘Apps’ (software tools) Some Programmers succumb to the Dark Side and developed worms and viruses
22
PATRIOT ACT OF 2001 Disclosure of Electronic Communications to Law Enforcement Authorities can get permission to intercept communications on Protected Computers Bypassing Wiretap Statutes Including Computers outside the United States
23
CALIFORNIA COMPREHENSIVE COMPUTER DATA ACCESS AND FRAUD ACT State Specific Law Allows Civil Actions (Lawsuits) and Compensatory Damages Fines of $10,000 per offense and / or prison time
24
SARBANES-OXLEY ACT 2002 created to improve corporate and auditing responsibilities Section 404 establishing and maintaining internal controls Results: Better internal controls and higher protection standards for all companies Most companies implemented COSO
25
CRITICS OF SARBANES-OXLEY ACT 2002 requirements are too strict and waste precious company resources Association of Certified Fraud Examiners Argued waste of company resources 2010 Restoring American Financial Stability Act – removed Sect 404 requirement for non-accelerated filers
26
SARBANES-OXLEY ACT & PCAOB Audit Standard 5 provides guidance for conducting audits of the effectiveness of Internal Controls of Financial Reporting Critics complain about the vagueness of the guidance and reporting standards
27
People are the problem!
28
Getting Into The Network Keeping attackers out of your IT network all together provides the best protection. Hackers are continually finding new ways to get beyond corporations’ IT security. Employee education What needs to be protected? What are the procedures and policies to follow? When an attack is successful, data and applications can be affected.
29
Inside the Network Barrier USB thumb drives Laptops Netbooks
30
Inside the Network Barrier MP3 players Digital Cameras Printers Scanners
31
Inside the Network Barrier Smart Phones are carried in and out of corporations on a daily basis.
32
Inside the Network Barrier Cloak and Dagger! A hacker disguised as a repairman? Do they look like they should be there?
33
Inside the Network Barrier Identity Theft Is your home network safe. Do you understand and know the threats that are out there. Corporate protection of customer data.
34
Inside the Network Barrier Employee Threats Can be intentional or unintentional. Work stations left unattended. Allowing a fellow employee access to an unauthorized area. Education of employees is essential.
35
History of Hacking and Cybercrime Questions?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.