1 / 25

Hacking

Hacking. By: Austen Christensen Patrick Henderson Lorenzo Hernandez Erik Lindahl Jonathan Purcell. What is Hacking?. - Hacking: to gain access to a computer illegally - Hacking: to alter (a computer program). http://www.merriam-webster.com/dictionary/hacking

fala
Télécharger la présentation

Hacking

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Hacking By: Austen Christensen Patrick Henderson Lorenzo Hernandez Erik Lindahl Jonathan Purcell

  2. What is Hacking? - Hacking: to gain access to a computer illegally - Hacking: to alter (a computer program) http://www.merriam-webster.com/dictionary/hacking http://www.thefreedictionary.com/hacking

  3. What is Hacking? Hacking: to gain access to (a computer program or network) illegally or without authorization http://www.thefreedictionary.com/hacking

  4. Types of Hacking 1) Inside Jobs - Stealing passwords, industrial espionage, or committing simple misuse 2) Rogue Access Points - Unsecured wireless access points that hackers breech http://www.myipaddressinfo.com/typeofhacking.htm

  5. Types of Hacking 3) Back Doors - Easily deciphered passwords, unsecured dial-up connections 4) Viruses and Worms - Shut down networks by flooding them with massive amounts of traffic, typically via e-mail http://www.myipaddressinfo.com/typeofhacking.htm

  6. Types of Hacking 5) Trojan Horses - Hacked software kicks off a virus which gives the hacker control of computer 6) Denial of Service - Hackers bring down a network without internal control http://www.myipaddressinfo.com/typeofhacking.htm

  7. Types of Hacking 7) Anarchists, Crackers, and Kiddies - Anarchists enjoy breaking stuff, crackers break passwords and develop Trojan horses, kiddies have no hacker skills, they buy or download hacking software http://www.myipaddressinfo.com/typeofhacking.htm

  8. Types of Hacking 8) Sniffing and Spoofing - Sniffing is eavesdropping or some type of spying; spoofing is when a hacker guesses, obtains, or predicts by snooping  http://www.myipaddressinfo.com/typeofhacking.htm

  9. Hacking in the real world Physically breaking and entering Putting self at risk Cameras, alarms, defenders Material/physical targets

  10. Internet Hacking Breaking and entering in the virtual world Does leave an electronic signature (but it is possible to hide it) Not putting self at risk (unless someone is actively monitoring the activity or tracking you) Targets are: ID, money from bank account, social security number

  11. Hacking's Positive Effects White Hat Hackers    - Will not break the law     - "Hacker" term not accurate    - "A computer enthusiast involved with computer security"    - Professional Programmer http://www.infosecurity-magazine.com/view/4611/license-to-hack-ethical-hacking/

  12. Black Hat Hackers - Opposite of White Hats - Follows no rules - Will usually hack for personal gain or vendetta - No benefits / Total criminal

  13. Grey Hat Hackers - Either without morals or fully   with - Motivated by political agenda or   moral obligation Benefits?

  14. Grey Hat Exploits (Is it Justice?) - Israeli websites by Pakistani Hackers -BART hacked for protection of the right to assemble -anti-nuclear weapons message was the very first hack -Egyptian sites were hacked by anti-authoritarian Anonymous -LulzSec and Anonymous hack US GOV web with pro-illegal drug sentiment. Voice of the people?

  15. Negative Effects of Hacking -Hacking is one of the greatest dangers for using the internet. -For most people, safety is usually not the first priority when using the internet. http://hosted.mediasite.com/mediasite/SilverlightPlayer/Default.aspx?peid=14e5b79befad4210aeae89ce680a898b1d

  16. How many of you have a “strong password”?

  17. Strong Passwords -Passwords should be 8-20 characters long -They should include at least one symbol -Use both upper and lower case -Most people use "password, 123, or some form of their birth-date, but that is easy to crack. http://www.utexas.edu/its/secure/articles/keep_safe_with_strong_passwords.php

  18. Negative Effects of Hacking -Hacking intrudes on other people's accounts or computers. -Common targets include: Facebook, YouTube, Twitter, home desktops and laptops, phones, insurances, government agencies, and bank systems. http://www.kohlerandhart.com/article-computer-hacking.aspx

  19. Statistics of Hacking -75% of companies have cited employees as likely hackers -45% of companies have reported hacking issues and attacks -California has the largest amount of hackers in all of the United States http://www.3w.net/lan/internet-use-statistics.html http://www.ic3.gov/media/annualreport/2008_IC3Report.pdf

  20. http://www.gadgetsandgizmos.org/hack-attack-infographic-lulzsecs-hacks-and-security-stats/http://www.gadgetsandgizmos.org/hack-attack-infographic-lulzsecs-hacks-and-security-stats/

  21. Morals and Hacking -Anything that causes harm to other people in any way is considered morally wrong -Hacking is beneficial to the hacker, who breaches the other person's device, often a computer, but it is devastating to the victim. http://www.helium.com/items/1265815-is-hacking-morally-wrong

  22. Catholic Views on Hacking • The Catholic views on hacking are mixed throughout the church • Some Church leaders believe it is wrong to steal people information • http://psx-scene.com/forums/images/news/no_hack.jpg

  23. Catholic Views Cont. • Priests like Father Spadaro believe that hackers use “theological values” to promote public awareness of certain groups • http://www.economist.com/node/21527031

  24. Catholic Views Cont. • While Some Church officials praise hackers, many are still undecided and often stereotype hackers as people who steal people’s bank information • http://blog.smarthide.com/tag/phishing/

  25. Thank You for Listening!

More Related