1 / 13

AGAINST HACKING

AGAINST HACKING. Lysia Moua CIS1055 Sec 005 November 20, 2012. Background Information. What is hacking? “practice of modifying computer hardware and software to accomplish a goal outside of the creators original purpose”- Hinders What is a hacker?

katoka
Télécharger la présentation

AGAINST HACKING

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. AGAINST HACKING Lysia Moua CIS1055 Sec 005 November 20, 2012

  2. Background Information • What is hacking? • “practice of modifying computer hardware and software to accomplish a goal outside of the creators original purpose”- Hinders • What is a hacker? • People who engage in the act of hacking computers • Who can hack? • Anyone

  3. Types of Hackers • White Hat • Non-malicious intention • Security experts • Test the system • Ethical hackers • Black Hat • Also known as “crackers” • Malicious intention • Grey Hat • Will take advantage of vulnerable system • Elite Hacker • Hackers among all hackers • Script Kiddie • Amateur hacker

  4. Ways To Protect Yourself From Hackers • Firewall • Keep firewall on • Helps protect the computer from hackers who tries to gain access to crash it, delete information, or even steal passwords or other sensitive information. • Antivirus Software • If it detects malicious code, like a virus or a worm, it works to disarm or remove it viruses.

  5. Ways To Protect Yourself From Hackers Cont. • Keep Operating System Up to Date • Updated from time to time to stay in tune with technology requirements and to fix security holes. • Be Careful Of What Is Being Download • Carelessly downloading e-mail attachments can dodge even the most alert anti-virus software. • Never open an e-mail attachment from an unknown user, and be distrustful of forwarded attachments from unknown users. • Turn Off The Computer • The downside to having always leaving the computer makes computers more susceptible to hackers..

  6. Ways To Protect Yourself From Hackers Cont. • Antispyware Technology • Collects information without • consent or produces unwanted pop-up ads on • web browser.

  7. List of Famous Hackers • Chaos Computer Club • Found in Germany and other German-speaking countries. • This is popular among the older hackers generation. • Masters of Deception • w00w00 • One of the largest non-profit security teams in the world with more than 30 active participants. • TESO • was a famous hacker group, which originated in Austria and quickly became international. It was active from 1998 to 2004, and during its peak around 2000, it was responsible for a significant share of the exploits on the bugtraq mailing list. • L0pht • was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area.

  8. List Of Famous Hackers Cont. • Cult of the Dead Cow • This group is also known as the cDc or the cDc Communications • They are computer hackers and DIY media organization found in Lubbock, Texas. • milw0rm • A group of hacktivists • Known for penetrating the computers of the Bhabha Atomic Research Centre in Mumbai. • TeaMp0isoN • A group of Black-Hat Computer Hackers • Anonymous • A group of hackers created in 2003.

  9. List of Famous Hackers Cont. • LulzSec • Group of hackers created and separated in 2011 • Claimed to hack "for the lulz". • Decocidio • An anonymous, autonomous collective of hacktivists which is part of Earth First, a radical environmental protest organization • Climate Justice Action • Goatse Security (aka GoatSec) • A loose-knit, 9-person grey hat hacker group that specializes in uncovering security flaws. • Global kos • grey hat computer hacker group • globalHell • A group of hackers that disbanded in 1999 when 12 members were prosecuted for computer intrusion

  10. List of Famous Hackers Cont. • Hackweiser • Underground hacking group and hacking magazine • Honker Union • Known for hacktivism • Found in Mainland China • Series of attacks on websites in the United States • mostly government-related sites. • Level Seven • A hacking group from the mid to late 90's but eventually separated in early 2000 when searched by the FBI • NCPH • Chinese hacker group found in Zigong in Sichuan Province.

  11. The Cons of Hacking • Hackers often hack into computers and steal people’s identities and other important information • Hackers learn about how to become a cracker and get into an operating system in order to bypass the security • Many hackers are malicious hackers which they will spam a computer or send out viruses • http://www.applicure.com/solutions/hacking-attacks

  12. The Cons of Hacking Cont. • Too many people who hack into the system • Causes people to feel unsafe with saving their information on their computers • Causes people to question the safety of the internet and computer world

  13. More Information • "Essence of Hacking In Today's World." Techi Warehouse. N.p., July-Aug. 2004. Web. 18 Nov. 2012. <http://www.techiwarehouse.com/engine/a8376006/Essence-of-Hacking-In-Today%27s-World>. • Giridhar. "5 Most Notorious Hacking Groups Of All Time." HackDigital. N.p., July-Aug. 2011. Web. 18 Nov. 2012. <http://www.hackdigital.com/5-most-notorious-hacking-groups-of-all-time/>. • Hinders, Dana, and O. Wallace. WiseGeek. Conjecture, 08 Nov. 2012. Web. 18 Nov. 2012. <http://www.wisegeek.com/what-is-computer-hacking.htm>. • Murphy, Kate. "Build Up Your Phone's Defenses Against Hackers." The New York Times. The New York Times, 26 Jan. 2012. Web. 18 Nov. 2012. <http://www.nytimes.com/2012/01/26/technology/personaltech/protecting-a-cellphone-against-hackers.html>. • "Protect Your Computer." FBI. Web. 18 Nov. 2012. <http://www.fbi.gov/scams-safety/computer_protect>. • "Protecting Your Website Against Hacking." Squidoo.Web. 18 Nov. 2012. <http://www.squidoo.com/protect-your-website-against-hacking>. • "Types of Hacker." SecPoint. Web. 18 Nov. 2012. <http://www.secpoint.com/types-of-hacker.html>.

More Related