Cybercrime (Computer Hacking)

11,759
-1

Published on

Slideshow presentation

Published in: Education
1 Comment
2 Likes
Statistics
Notes
No Downloads
Views
Total Views
11,759
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
735
Comments
1
Likes
2
Embeds 0
No embeds

No notes for slide

Cybercrime (Computer Hacking)

  1. 1. Cybercrime<br />Computer Hacking<br />By Esteban Valencia & Michael Asres<br />April 7th, 2010<br />(1)<br />
  2. 2. Table of Contents<br />What is Computer Hacking?<br />Types of Computer Hackers<br />
  3. 3. Origins<br />Motivation<br />Consequences<br />Major Crimes<br />Ethical Stands<br />What is Computer Hacking? <br />(2)<br />
  4. 4. Computer Hacking - History<br />1960 MIT (Massachusetts Institute of Technology)<br />Tools & Hackers<br />Tools (nerdy student)<br />Hackers (lazy student)<br />Personal Computer <br />Telephone Systems – Phreak <br />Software – Crackers<br />
  5. 5. Computer Hacking - Motivation<br />Imaginative pursue – Hobbyists (modifications of electronic hardware)<br />Financial means – Job & Crime<br />Hackers vs. Crackers<br />
  6. 6. Computer Hacking - Consequences<br />Unauthorized use of a computer or network<br />Kevin Mitnick (Sentencing depending on the seriousness of the offence) <br />Little to no-time served<br />(3)<br />
  7. 7. Computer Hacking – Major Crimes<br />Adrian Lamo (New York 2003)<br />Unauthorized access to a computer and possession of illegal stolen access devices<br />Kevin Mitnick<br />Most wanted computer criminal (U.S)<br />1979 Unauthorized access (age 16)<br />Valuable info/ (Cellular telephone and computer companies, computer passwords)<br />
  8. 8. Computer Hacking – Ethical Stands<br />Hacker ethics (Whether they can do it or not?)<br />When they can do it would they go further?<br />Hackers and Crackers<br />(4)<br />
  9. 9. Types of Computer Hackers<br />Attitudes<br />Methods<br />(5)<br />
  10. 10. Types of Computer Hackers - Attitudes<br /><ul><li>White Hat
  11. 11. Non-malicious reasons, enjoy learning (ex. testing their own security system)
  12. 12. Grey Hat
  13. 13. Beyond the point of a malicious intend
  14. 14. Black Hat/Cracker
  15. 15. Malicious reasons, uses technology for a wrong end, linked to illegal activity
  16. 16. Script kiddie
  17. 17. Non-expert, uses automated tools by other creators
  18. 18. Hacktivist
  19. 19. Defends ideological, religious or political means</li></li></ul><li>Types of Computer Hackers - Methods<br />Network enumeration<br />Discovering information about the intended target.<br />Vulnerability analysis<br />Test the system.<br />Exploitation<br />Exploit vulnerabilities on the system.<br />Accessing Tools<br />Social engineering, Virus, Trojans, Worms, Key Loggers, etc.<br />(6)<br />
  20. 20. Summary & Conclusion <br />Computer hacking was once an apt crime for a person whose computer skills exceeded others’. Now computer hacking could be performed by anybody that knows how to use the internet. Furthermore this crime is one of the hardest to detect, because the criminals do not leave any mark behind.<br />
  21. 21. References<br />http://www.britannica.com/blogs/2009/02/cybercrime-on-the-rise/ (1)<br />http://miklasnjor.com/en/2009/photography/illustration/computer-hacking-id-theft-common/ (2)<br />http://www.orkut-scrapping.com/Computer-Humor-14/default.aspx (3)<br />http://www.teentechguru.com/password-and-network-hacking-tools/ (4)<br />http://www.clipartguide.com/_pages/0511-0906-2321-1306.html (5)<br />http://www.voipcentral.org/entry/pc-hacking-though-voip-is-possible/ (6)<br />
  22. 22. Thank you.<br />Are there any questions?<br />

×