Successfully reported this slideshow.
Presentation on computer hacking <ul><li>S y b com </li></ul><ul><li>Shreyas dani </li></ul>
introduction <ul><li>Hacking is the process of illegally corrupting or extracting private information from a computer syst...
Hacking history <ul><li>1971 - Cap ‘n Crunch phone exploit discovered </li></ul><ul><li>1988 - Morris Internet worm crashe...
HACKER  ? <ul><li>A person who enjoys exploring the details of programmable systems and how to stretch their capabilities,...
Types of hackers <ul><li>Professional hackers </li></ul><ul><ul><li>Black Hats – the Bad Guys </li></ul></ul><ul><ul><li>W...
Types of hackers
Basic needs of hackers <ul><li>Everyone has heard of one individual or another that was caught while hacking computers tha...
Types of Attacks <ul><li>Internal – like Technical attacks </li></ul><ul><li>External – like Social Engineering </li></ul>
Hackers motivation <ul><li>Desire to embarrass </li></ul><ul><li>Experimentation </li></ul><ul><li>Self Gratification </li...
Computer hacking tools <ul><li>Tweak Manager 2.12   </li></ul><ul><li>Panda Security Demo 3.0.2.0 </li></ul><ul><li>PC Act...
Is computer hacking is a crime? <ul><li>Computer hacking is broadly defined as any action that results in unauthorized int...
<ul><li>Considerations </li></ul><ul><li>Hacktivism is when computer hacking is used to promote a political, religious or ...
Ways to prevent hacking <ul><li>1- implement a Frewall. 2- Develope corporate security policy 3- Install antivirus softwar...
conclusion <ul><li>The word &quot;hacker&quot; carries weight. People strongly disagree as to what a hacker is. Hacking ma...
 
Upcoming SlideShare
Loading in …5
×

Computer hacking

8,293 views

Published on

this is about computer hacking actions, and to take appropriate measures against it.

Published in: Technology, News & Politics
  • mohtr bgf dez vx s
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • 12. Considerations Hacktivism is when computer hacking is used to promote a political, religious or cultural cause or agenda. When an individual or group uses computer hacking to make a politically motivated attack it is called cyberterrorism. When one country uses computer hacking to disrupt, destroy or damage another country's computers, it is called cyberwarfare. Famous Ties On January 12, 2010, Google announced that it would no longer censor its search results in China. One of the reasons for Google's decision was that it found evidence that Chinese hackers had broken into its email servers in an effort to get information from the email accounts of Chinese human rights advocates.
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • cc
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • You Can Free Download Latest & Working -> http://www.sendspace.com/file/ccgilz
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

Computer hacking

  1. 1. Presentation on computer hacking <ul><li>S y b com </li></ul><ul><li>Shreyas dani </li></ul>
  2. 2. introduction <ul><li>Hacking is the process of illegally corrupting or extracting private information from a computer system or network. They are generally of malicious intent, wishing to render networks unable to function by overloading their systems with traffic and causing them to crash, or steal data such as credit card details and security numbers. As such, Hacking is considered a very serious crime. </li></ul><ul><li>Computer hacking involves some degree of infringment on privacy of others to damage the computer based properties such as files, software, etc. </li></ul>
  3. 3. Hacking history <ul><li>1971 - Cap ‘n Crunch phone exploit discovered </li></ul><ul><li>1988 - Morris Internet worm crashes 6,000 servers </li></ul><ul><li>1994 - $10 million transferred from CitiBank accounts </li></ul><ul><li>1995 - Kevin Mitnick sentenced to 5 years in jail </li></ul><ul><li>1969 - Unix ‘hacked’ together </li></ul><ul><li>2000 - Major websites succumb to DDoS </li></ul><ul><li>2000 - 15,700 credit and debit card numbers stolen from Western Union (hacked while web database was undergoing maintenance) </li></ul><ul><li>2001 Code Red exploited bug in MS IIS to penetrate & spread probes random IPs for systems running IIS had trigger time for denial-of-service attack </li></ul><ul><li>2nd wave infected 360000 servers in 14 hours </li></ul><ul><li>Code Red 2 - had backdoor installed to allow remote control </li></ul>
  4. 4. HACKER ? <ul><li>A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. </li></ul><ul><li>One who programs enthusiastically or who enjoys programming rather than simply theorizing about programming. </li></ul>
  5. 5. Types of hackers <ul><li>Professional hackers </li></ul><ul><ul><li>Black Hats – the Bad Guys </li></ul></ul><ul><ul><li>White Hats – Professional Security Experts </li></ul></ul><ul><li>Underemployed Adult Hackers </li></ul><ul><ul><li>Former Script Kiddies </li></ul></ul><ul><ul><ul><li>Can’t get employment in the field </li></ul></ul></ul><ul><ul><ul><li>Want recognition in hacker community </li></ul></ul></ul><ul><li>Ideological Hackers </li></ul><ul><ul><li>hack as a mechanism to promote some political or ideological purpose </li></ul></ul><ul><ul><li>Usually coincide with political events </li></ul></ul><ul><li>Criminal Hackers </li></ul><ul><ul><li>Real criminals, are in it for whatever they can get no matter who it hurts </li></ul></ul><ul><li>Disgruntled Employees </li></ul><ul><ul><li>Most dangerous to an enterprise as they are “insiders” </li></ul></ul><ul><ul><li>Since many companies subcontract their network services a disgruntled vendor could be very dangerous to the host enterprise </li></ul></ul>
  6. 6. Types of hackers
  7. 7. Basic needs of hackers <ul><li>Everyone has heard of one individual or another that was caught while hacking computers that belonged to this or that organization. Because hacking into computers is highly illegal, it should be mentioned that this article will not mention any real specifics about the subject, and this author would rather gladly encourage you to become a real hacker – professionally. </li></ul><ul><li>A hacker who want to hack any information from any computer or from any data source, he want some very important information which might cause any incidence. </li></ul>
  8. 8. Types of Attacks <ul><li>Internal – like Technical attacks </li></ul><ul><li>External – like Social Engineering </li></ul>
  9. 9. Hackers motivation <ul><li>Desire to embarrass </li></ul><ul><li>Experimentation </li></ul><ul><li>Self Gratification </li></ul><ul><li>Problem Solving </li></ul><ul><li>Exposing System Weakness </li></ul><ul><li>Fun </li></ul><ul><li>Profit </li></ul><ul><li>Extortion </li></ul><ul><li>Technical Reputation </li></ul><ul><li>Scorekeeping </li></ul><ul><li>Revenge/maliciousness Intellectual </li></ul>
  10. 10. Computer hacking tools <ul><li>Tweak Manager 2.12   </li></ul><ul><li>Panda Security Demo 3.0.2.0 </li></ul><ul><li>PC Activity Monitor Standard 7.7.1  </li></ul><ul><li>Word Extractor - a binary to text convertor 2.1  </li></ul><ul><li>Arctor File Repository Free 3.5.1.3  </li></ul><ul><li>Invisible Secrets Encryption Software 4.6  </li></ul><ul><li>Geek Superhero 1.3  </li></ul><ul><li>FolderAccess 2.0  </li></ul><ul><li>DataSafe PS Net 3.0 </li></ul><ul><li>PC Activity Monitor Pro 6.5.1 </li></ul><ul><li>NetPeeker 2.83 </li></ul><ul><li>MailMonitor 1.6.3 </li></ul><ul><li>SpyRemover Pro 3.05  </li></ul><ul><li>Spam Nullifier 3.4.0.1 </li></ul><ul><li>BestCrypt Corporate 1.12 </li></ul>
  11. 11. Is computer hacking is a crime? <ul><li>Computer hacking is broadly defined as any action that results in unauthorized interference with a computer, computer system or network. Computer hacking includes breaking into a computer with the intent to steal, damage, modify or monitor data or settings within the system. </li></ul><ul><li>Significance </li></ul><ul><li>Computer hacking is considered a crime in all 50 states; it is also a crime under federal and international law. Because a computer may be accessed from anywhere, a person may be charged with computer hacking on the state, federal and international level. </li></ul><ul><li>Types </li></ul><ul><li>Hacking often involves more than just unauthorized access to a computer. Computer hackers may access a computer in order to: steal financial information such as credit card access numbers; steal personal information (identity theft); harass (swatting); vandalize; gain access to other computers; launch computer attacks; or place malicious software (malware). </li></ul>
  12. 12. <ul><li>Considerations </li></ul><ul><li>Hacktivism is when computer hacking is used to promote a political, religious or cultural cause or agenda. When an individual or group uses computer hacking to make a politically motivated attack it is called cyberterrorism. When one country uses computer hacking to disrupt, destroy or damage another country's computers, it is called cyberwarfare. </li></ul><ul><li>Famous Ties </li></ul><ul><li>On January 12, 2010, Google announced that it would no longer censor its search results in China. One of the reasons for Google's decision was that it found evidence that Chinese hackers had broken into its email servers in an effort to get information from the email accounts of Chinese human rights advocates. </li></ul>
  13. 13. Ways to prevent hacking <ul><li>1- implement a Frewall. 2- Develope corporate security policy 3- Install antivirus software 4- Keep operating systems up to date. 5- Do not give out any information to unreliable sources. 6- do not open spam emails. 7- Do not give out personal information </li></ul>
  14. 14. conclusion <ul><li>The word &quot;hacker&quot; carries weight. People strongly disagree as to what a hacker is. Hacking may be defined as legal or illegal, ethical or unethical. The media’s portrayal of hacking has boosted one version of discourse. The conflict between discourses is important for our understanding of computer hacking subculture. Also, the outcome of the conflict may prove critical in deciding whether or not our society and institutions remain in the control of a small elite or we move towards a radical democracy It is my hope that the hackers of the future will move beyond their limitations and become hacktivists. They need to work with non-technologically based and technology-borrowing social movements in the struggle for global justice. </li></ul>

×