Download presentation
Presentation is loading. Please wait.
Published byRoy Sherman Modified over 9 years ago
2
AGAINST HACKING Lysia Moua CIS1055 Sec 005 November 20, 2012
3
Background Information What is hacking? “practice of modifying computer hardware and software to accomplish a goal outside of the creators original purpose”- Hinders What is a hacker? People who engage in the act of hacking computers Who can hack? Anyone
4
Types of Hackers White Hat Non-malicious intention Security experts Test the system Ethical hackers Black Hat Also known as “crackers” Malicious intention Grey Hat Will take advantage of vulnerable system Elite Hacker Hackers among all hackers Script Kiddie Amateur hacker
5
Ways To Protect Yourself From Hackers Firewall Keep firewall on Helps protect the computer from hackers who tries to gain access to crash it, delete information, or even steal passwords or other sensitive information. Antivirus Software If it detects malicious code, like a virus or a worm, it works to disarm or remove it viruses.
6
Ways To Protect Yourself From Hackers Cont. Keep Operating System Up to Date Updated from time to time to stay in tune with technology requirements and to fix security holes. Be Careful Of What Is Being Download Carelessly downloading e-mail attachments can dodge even the most alert anti-virus software. Never open an e-mail attachment from an unknown user, and be distrustful of forwarded attachments from unknown users. Turn Off The Computer The downside to having always leaving the computer makes computers more susceptible to hackers..
7
Ways To Protect Yourself From Hackers Cont. Antispyware Technology Collects information without consent or produces unwanted pop-up ads on web browser.
8
List of Famous Hackers Chaos Computer Club Found in Germany and other German-speaking countries. This is popular among the older hackers generation. Masters of Deception w00w00 One of the largest non-profit security teams in the world with more than 30 active participants. TESO was a famous hacker group, which originated in Austria and quickly became international. It was active from 1998 to 2004, and during its peak around 2000, it was responsible for a significant share of the exploits on the bugtraq mailing list. L0pht was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area.
9
List Of Famous Hackers Cont. Cult of the Dead Cow This group is also known as the cDc or the cDc Communications They are computer hackers and DIY media organization found in Lubbock, Texas. milw0rm A group of hacktivists Known for penetrating the computers of the Bhabha Atomic Research Centre in Mumbai. TeaMp0isoN A group of Black-Hat Computer Hackers Anonymous A group of hackers created in 2003.
10
List of Famous Hackers Cont. LulzSec Group of hackers created and separated in 2011 Claimed to hack "for the lulz". Decocidio An anonymous, autonomous collective of hacktivists which is part of Earth First, a radical environmental protest organization Climate Justice Action Goatse Security (aka GoatSec) A loose-knit, 9-person grey hat hacker group that specializes in uncovering security flaws. Global kos grey hat computer hacker group globalHell A group of hackers that disbanded in 1999 when 12 members were prosecuted for computer intrusion
11
List of Famous Hackers Cont. Hackweiser Underground hacking group and hacking magazine Honker Union Known for hacktivism Found in Mainland China Series of attacks on websites in the United States mostly government-related sites. Level Seven A hacking group from the mid to late 90's but eventually separated in early 2000 when searched by the FBI NCPH Chinese hacker group found in Zigong in Sichuan Province.
12
The Cons of Hacking Hackers often hack into computers and steal people’s identities and other important information Hackers learn about how to become a cracker and get into an operating system in order to bypass the security Many hackers are malicious hackers which they will spam a computer or send out viruses http://www.applicure.com/solutions/hacking- attacks http://www.applicure.com/solutions/hacking- attacks http://www.applicure.com/solutions/hacking- attacks
13
The Cons of Hacking Cont. Too many people who hack into the system Causes people to feel unsafe with saving their information on their computers Causes people to question the safety of the internet and computer world
14
More Information "Essence of Hacking In Today's World." Techi Warehouse. N.p., July-Aug. 2004. Web. 18 Nov. 2012.. Giridhar. "5 Most Notorious Hacking Groups Of All Time." HackDigital. N.p., July-Aug. 2011. Web. 18 Nov. 2012.. Hinders, Dana, and O. Wallace. WiseGeek. Conjecture, 08 Nov. 2012. Web. 18 Nov. 2012.. Murphy, Kate. "Build Up Your Phone's Defenses Against Hackers." The New York Times. The New York Times, 26 Jan. 2012. Web. 18 Nov. 2012.. "Protect Your Computer." FBI. Web. 18 Nov. 2012.. "Protecting Your Website Against Hacking." Squidoo.Web. 18 Nov. 2012.. "Types of Hacker." SecPoint. Web. 18 Nov. 2012..
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.