1 / 5

Internal Hackers

Internal Hackers. By Conan, Amy and Sarah. External.

gaura
Télécharger la présentation

Internal Hackers

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internal Hackers By Conan, Amy and Sarah

  2. External • External hackers "try to compromise computers and sensitive information for ill-gotten gains" from the outside as an unauthorized user. External hackers pose a great threat from outside of the company. Often times, an external hacker does not even need an insider to help then get information because they can do it themselves from their position on the outside. "Vulnerabilities in applications are the biggest asset to external hackers wishing to target a database." Throughout studies that companies have provided on their systems, it has been found that the critical weaknesses are in "badly written applications, deployment errors, and increasingly disparate critical data" to name a few. Finding external access into a system is nothing new and now the holes in the systems are being found more easily with the advancement of technology and knowledge of the hackers. http://trinity-hackers.wikispaces.com/Internal+Hackers+vs+External+Hackers

  3. Example of External • 09 February 2012, Hackers from Swagg Security claimed to have stolen internal data from Apple supplier Foxconn, and leaked the information online, in response to media reports of poor working conditions at the electronics manufacturer's factories in China. The hacker group announced the attack in a Twitter message yesterday, and also leaked data stolen from the Foxconn site to The Pirate Bay. It said the data included user names and passwords. "The passwords inside these files could allow individuals to make fraudulent orders under big companies like Microsoft, Apple, IBM, Intel, and Dell," the hackers said in a message on Pastebin. www.computerworlduk.com › Security › News

  4. Internal • Internal hackers, sometimes known as rogue insiders, "try to compromise computers and sensitive information from the inside as authorized users." Sometimes these hackers also use the technique of social engineering in order to gain access to the sensitive information and since they are already trusted as an internal asset to the company, it is not usually too hard for them to do this. There are many situations where the insider of the company is corrupt and uses their ability to access information to their own benefit, whether that is revenge, personal satisfaction, or financial gain among other reasons. Internal hackers pose just as much of, if not a greater threat as the external hackers do. Internal hackers have the ability to download spyware, go through physical files, and use other tactics that consist of some sort or physical contact within the company walls. http://trinity-hackers.wikispaces.com/Internal+Hackers+vs+External+Hackers

  5. Example of internal • February 3, 2012, 30-month sentence for Marriott computer hacker who broke into Marriott International Inc.’s    system and threatening to leak sensitive data. Altogether, Attila Nemeth caused about $1 million in losses to Marriott, according to the agency. http://www.bizjournals.com/sanjose/news/2012/02/03/computer-hacker-gets-30-years-for.html

More Related