Download presentation
Presentation is loading. Please wait.
Published byArron Waters Modified over 9 years ago
1
By Carlos G. Coca
2
Originally a person who was skilled at programming language who was able to create/alter web content. Now: “A person who illegally gains access to and sometimes tampers with information in a computer system.” Merriam-Webster definition
3
White Hat Help prevent weak systems from being hacked. Make web safer for individuals. Black Hat Cause problems for individuals, companies and government. Steal identities, money and add viruses.
4
SQL injections Worms Encryption
5
SQL = Structured Query Language Used to interact with databases. Step 1: Hackers find holes in coding design. Step 2: Add their own SQL into a database. Step 3: Obtain information.
6
Whitelisting Enables a program to check through a list of allowed characters. Harder to give the database orders since they’re not allowed in the application. Blacklisting Tells program to immediately deny: Certain characters. Combinations of characters.
7
Infect systems and search for other systems to infect without user interaction. Starts slow then “snowballs” and becomes more and more devastating. Conflicker worm.
8
Encryption is used to hide passwords. Hackers attack in three ways. Brute force attack: Program goes through every possible combination. Dictionary attack: Uses a downloaded list of common passwords and enters them rapidly. Cryptanalysis attack: Takes a long hash and breaks it down into smaller segments and tries answering smaller pieces of the puzzle at one time.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.