1 / 13

Cybercrime

Cybercrime. Computer Hacking. (1). What is Computer Hacking? Types of Computer Hackers. Table of Contents. Origins Motivation Consequences Major Crimes Ethical Stands. What is Computer Hacking?. (2). 1960 MIT (Massachusetts Institute of Technology) Tools & Hackers

lynda
Télécharger la présentation

Cybercrime

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cybercrime Computer Hacking (1)

  2. What is Computer Hacking? • Types of Computer Hackers Table of Contents

  3. Origins • Motivation • Consequences • Major Crimes • Ethical Stands What is Computer Hacking? (2)

  4. 1960 MIT (Massachusetts Institute of Technology) • Tools & Hackers • Tools (nerdy student) • Hackers (lazy student) • Personal Computer • Telephone Systems – Phreak • Software – Crackers Computer Hacking - History

  5. Imaginative pursue – Hobbyists (modifications of electronic hardware) • Financial means – Job & Crime • Hackers vs. Crackers Computer Hacking - Motivation

  6. Unauthorized use of a computer or network • Kevin Mitnick (Sentencing depending on the seriousness of the offence) • Little to no-time served Computer Hacking - Consequences (3)

  7. Adrian Lamo (New York 2003) • Unauthorized access to a computer and possession of illegal stolen access devices • Kevin Mitnick • Most wanted computer criminal (U.S) • 1979 Unauthorized access (age 16) • Valuable info/ (Cellular telephone and computer companies, computer passwords) Computer Hacking – Major Crimes

  8. Hacker ethics (Whether they can do it or not?) • When they can do it would they go further? • Hackers and Crackers Computer Hacking – Ethical Stands (4)

  9. Attitudes • Methods Types of Computer Hackers (5)

  10. White Hat • Non-malicious reasons, enjoy learning (ex. testing their own security system) • Grey Hat • Beyond the point of a malicious intend • Black Hat/Cracker • Malicious reasons, uses technology for a wrong end, linked to illegal activity • Script kiddie • Non-expert, uses automated tools by other creators • Hacktivist • Defends ideological, religious or political means Types of Computer Hackers - Attitudes

  11. Network enumeration • Discovering information about the intended target. • Vulnerability analysis • Test the system. • Exploitation • Exploit vulnerabilities on the system. • Accessing Tools • Social engineering, Virus, Trojans, Worms, Key Loggers, etc. Types of Computer Hackers - Methods (6)

  12. Summary & Conclusion Computer hacking was once an apt crime for a person whose computer skills exceeded others’. Now computer hacking could be performed by anybody that knows how to use the internet. Furthermore this crime is one of the hardest to detect, because the criminals do not leave any mark behind.

  13. References http://www.britannica.com/blogs/2009/02/cybercrime-on-the-rise/ (1) http://miklasnjor.com/en/2009/photography/illustration/computer-hacking-id-theft-common/ (2) http://www.orkut-scrapping.com/Computer-Humor-14/default.aspx (3) http://www.teentechguru.com/password-and-network-hacking-tools/ (4) http://www.clipartguide.com/_pages/0511-0906-2321-1306.html (5) http://www.voipcentral.org/entry/pc-hacking-though-voip-is-possible/ (6)

More Related