This powerpoint is part of our Information Security Awareness series for the Information Solutions Netwok (ISN)
Based on Information security Policy: Rules that govern the use of Information Systems: Classification in increasing order: public, private, confidential, company secret Access controls: passwords, tokens, back doors, biometrics Information classification Public, private, confidential, company secret
Nigerian scam Hacking
Ask audience to understand their ideas on this…
David & Jennifer David shows Jen he change his (and hers) grades by hacking into the school’s server.
David wants to connect to game company using war dialer. Here he’s entering the area code suffix start end points.
Once he finds the “game” company he starts playing a game from the menu: Thermonuclear war, not knowing….
That is not a game, but he patched into the back door of a secure system that runs the NORAD nuclear weapons system
At the end of the movie, while the NORAD computer is about to start the 3 rd World War, David tricks the computer learning system to play tic-tac-to, eventually realizing nobody wins…
Then, having learned that, it starts estimating potential launch points and counterpoints for nuclear attack, And just line in tic-tac-to, …
Angela receives a strange disk from a client with a secret back door
Here she tricks her pursuers by thinking she’s going to send the evidence…
Then she plants a keylogger in her corporate computer, Later she infects the Pretorians (her enemy) mainframe program with a virus.
Dade & Kate realize they are both hackers fighting a common enemy
A young boy is arrested by the Secret Service for writing a virus, and banned from using a computer until his 18th birthday.
Years later, he and his new-found friends discover a plot to unleash a dangerous computer virus, but must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.
The D.E.A. shut down its dummy corporation operation codenamed SWORDFISH in 1986, with $400M…
The world's most dangerous spy is hired by the CIA to coerce a computer hacker recently released from prison to help steal billions in unused government funds, but it's all locked away behind super-encryption.