SlideShare a Scribd company logo
Hackers, Crackers, and Network Intruders CS-480b Dick Steflik
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hacker Terms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hacking through the ages ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The threats ,[object Object],[object Object],[object Object],[object Object],[object Object]
CIA.gov defacement example
Web site defacement example
Types of hackers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types of Hackers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Top intrusion justifications ,[object Object],[object Object],[object Object],[object Object]
Gaining access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Back doors & Trojans ,[object Object],[object Object],[object Object]
Software vulnerability exploitation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Password guessing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Password/key theft ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Once inside, the hacker can... ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Intrusion detection systems (IDS) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Intrusion detection systems (IDS) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Intrusion prevention ,[object Object],[object Object],[object Object],[object Object],[object Object]
Risk management Probability Impact Ignore (e.g. delude yourself) Prevent (e.g. firewalls, IDS, patches) Backup Plan (e.g. redundancies) Contain & Control (e.g. port scan)
Legal and ethical questions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Port scanner example
Computer Crimes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Federal Statutes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Legal Recourse ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Information cyber security
Information cyber securityInformation cyber security
Information cyber security
SumanPramanik7
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
NetstarterSL
 
Insider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoInsider Threats Webinar Final_Tyco
Insider Threats Webinar Final_Tyco
Matt Frowert
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
pdewitte
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
Goutama Bachtiar
 
Cyber security
Cyber securityCyber security
Cyber security
PawanKalyanAmbati
 
Web Application Security Session for Web Developers
Web Application Security Session for Web DevelopersWeb Application Security Session for Web Developers
Web Application Security Session for Web Developers
Krishna Srikanth Manda
 
Ethical hacking - Good Aspect of Hacking
Ethical hacking - Good Aspect of HackingEthical hacking - Good Aspect of Hacking
Ethical hacking - Good Aspect of Hacking
Divy Singh Rathore
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
VidaB
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
FCA - Future Chartered Accountants
 
Phishing
PhishingPhishing
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
primeteacher32
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
Murray Security Services
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
SensePost
 
How to analyze cyber threats
How to analyze cyber threatsHow to analyze cyber threats
How to analyze cyber threats
AkankshaPathak27
 
Hacking
HackingHacking
Hacking
Sitwat Rao
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-security
Marya Sholevar
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
David Strom
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Goutham Shetty
 
Ethical Hacking - Explained
Ethical Hacking - ExplainedEthical Hacking - Explained
Ethical Hacking - Explained
Gunjan Panara
 

What's hot (20)

Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
Insider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoInsider Threats Webinar Final_Tyco
Insider Threats Webinar Final_Tyco
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Cyber security
Cyber securityCyber security
Cyber security
 
Web Application Security Session for Web Developers
Web Application Security Session for Web DevelopersWeb Application Security Session for Web Developers
Web Application Security Session for Web Developers
 
Ethical hacking - Good Aspect of Hacking
Ethical hacking - Good Aspect of HackingEthical hacking - Good Aspect of Hacking
Ethical hacking - Good Aspect of Hacking
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Phishing
PhishingPhishing
Phishing
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
How to analyze cyber threats
How to analyze cyber threatsHow to analyze cyber threats
How to analyze cyber threats
 
Hacking
HackingHacking
Hacking
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-security
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking - Explained
Ethical Hacking - ExplainedEthical Hacking - Explained
Ethical Hacking - Explained
 

Viewers also liked

Paradigma
ParadigmaParadigma
Paradigma
Xavi Queral
 
Social Media in Law - "Flash in the Pan" or Competitive Advantage?
Social Media in Law - "Flash in the Pan" or Competitive Advantage?Social Media in Law - "Flash in the Pan" or Competitive Advantage?
Social Media in Law - "Flash in the Pan" or Competitive Advantage?
Erik Schmidt
 
Training teachers and instructors to teach in prisons
Training teachers and instructors to teach in prisonsTraining teachers and instructors to teach in prisons
Training teachers and instructors to teach in prisons
Peter Mortimer
 
Beyond Valence In Customer Dissatisfaction A Review And New Findings On Behav...
Beyond Valence In Customer Dissatisfaction A Review And New Findings On Behav...Beyond Valence In Customer Dissatisfaction A Review And New Findings On Behav...
Beyond Valence In Customer Dissatisfaction A Review And New Findings On Behav...
jcpham
 
Presentación inglés 16 abril
Presentación inglés 16 abrilPresentación inglés 16 abril
Presentación inglés 16 abril
Generador de Olas
 
Keith Cowling & Dennis C. Mueller (1978)-The social costs of monopoly power
Keith Cowling & Dennis C. Mueller (1978)-The social costs of monopoly powerKeith Cowling & Dennis C. Mueller (1978)-The social costs of monopoly power
Keith Cowling & Dennis C. Mueller (1978)-The social costs of monopoly power
jcpham
 
Guanxi connections as subtitutes for formal institutional support
Guanxi connections as subtitutes for formal institutional supportGuanxi connections as subtitutes for formal institutional support
Guanxi connections as subtitutes for formal institutional support
jcpham
 
Kotabe global competitive marketing strategy ch08
Kotabe global competitive marketing strategy ch08Kotabe global competitive marketing strategy ch08
Kotabe global competitive marketing strategy ch08
jcpham
 
Motywy Wordpressa Historia Prawdziwa
Motywy Wordpressa Historia PrawdziwaMotywy Wordpressa Historia Prawdziwa
Motywy Wordpressa Historia Prawdziwa
Tomasz Dziuda
 
Motywy dla WordPressa - historia prawdziwa - WordUp Warszawa
Motywy dla WordPressa - historia prawdziwa - WordUp WarszawaMotywy dla WordPressa - historia prawdziwa - WordUp Warszawa
Motywy dla WordPressa - historia prawdziwa - WordUp Warszawa
Tomasz Dziuda
 
Pronoms febles exercicis i solució
Pronoms febles exercicis i solucióPronoms febles exercicis i solució
Pronoms febles exercicis i solucióXavi Queral
 
Jak nadążyć za światem front-endu - WordPress Training Day
Jak nadążyć za światem front-endu - WordPress Training DayJak nadążyć za światem front-endu - WordPress Training Day
Jak nadążyć za światem front-endu - WordPress Training Day
Tomasz Dziuda
 
Dokąd zmierza WordPress?
Dokąd zmierza WordPress?Dokąd zmierza WordPress?
Dokąd zmierza WordPress?
Tomasz Dziuda
 
Statycznie czy dynamicznie? v.2.0
Statycznie czy dynamicznie? v.2.0Statycznie czy dynamicznie? v.2.0
Statycznie czy dynamicznie? v.2.0
Tomasz Dziuda
 
GAS LICUADO DE PETROLEO - GLP
GAS LICUADO DE PETROLEO - GLPGAS LICUADO DE PETROLEO - GLP
GAS LICUADO DE PETROLEO - GLP
GEA SRL
 
Gas licuado de petroleo (2)
Gas licuado de petroleo (2)Gas licuado de petroleo (2)
Gas licuado de petroleo (2)
GEA SRL
 
Motywy dla WordPressa - historia prawdziwa - WordUp Katowice
Motywy dla WordPressa - historia prawdziwa - WordUp KatowiceMotywy dla WordPressa - historia prawdziwa - WordUp Katowice
Motywy dla WordPressa - historia prawdziwa - WordUp Katowice
Tomasz Dziuda
 

Viewers also liked (17)

Paradigma
ParadigmaParadigma
Paradigma
 
Social Media in Law - "Flash in the Pan" or Competitive Advantage?
Social Media in Law - "Flash in the Pan" or Competitive Advantage?Social Media in Law - "Flash in the Pan" or Competitive Advantage?
Social Media in Law - "Flash in the Pan" or Competitive Advantage?
 
Training teachers and instructors to teach in prisons
Training teachers and instructors to teach in prisonsTraining teachers and instructors to teach in prisons
Training teachers and instructors to teach in prisons
 
Beyond Valence In Customer Dissatisfaction A Review And New Findings On Behav...
Beyond Valence In Customer Dissatisfaction A Review And New Findings On Behav...Beyond Valence In Customer Dissatisfaction A Review And New Findings On Behav...
Beyond Valence In Customer Dissatisfaction A Review And New Findings On Behav...
 
Presentación inglés 16 abril
Presentación inglés 16 abrilPresentación inglés 16 abril
Presentación inglés 16 abril
 
Keith Cowling & Dennis C. Mueller (1978)-The social costs of monopoly power
Keith Cowling & Dennis C. Mueller (1978)-The social costs of monopoly powerKeith Cowling & Dennis C. Mueller (1978)-The social costs of monopoly power
Keith Cowling & Dennis C. Mueller (1978)-The social costs of monopoly power
 
Guanxi connections as subtitutes for formal institutional support
Guanxi connections as subtitutes for formal institutional supportGuanxi connections as subtitutes for formal institutional support
Guanxi connections as subtitutes for formal institutional support
 
Kotabe global competitive marketing strategy ch08
Kotabe global competitive marketing strategy ch08Kotabe global competitive marketing strategy ch08
Kotabe global competitive marketing strategy ch08
 
Motywy Wordpressa Historia Prawdziwa
Motywy Wordpressa Historia PrawdziwaMotywy Wordpressa Historia Prawdziwa
Motywy Wordpressa Historia Prawdziwa
 
Motywy dla WordPressa - historia prawdziwa - WordUp Warszawa
Motywy dla WordPressa - historia prawdziwa - WordUp WarszawaMotywy dla WordPressa - historia prawdziwa - WordUp Warszawa
Motywy dla WordPressa - historia prawdziwa - WordUp Warszawa
 
Pronoms febles exercicis i solució
Pronoms febles exercicis i solucióPronoms febles exercicis i solució
Pronoms febles exercicis i solució
 
Jak nadążyć za światem front-endu - WordPress Training Day
Jak nadążyć za światem front-endu - WordPress Training DayJak nadążyć za światem front-endu - WordPress Training Day
Jak nadążyć za światem front-endu - WordPress Training Day
 
Dokąd zmierza WordPress?
Dokąd zmierza WordPress?Dokąd zmierza WordPress?
Dokąd zmierza WordPress?
 
Statycznie czy dynamicznie? v.2.0
Statycznie czy dynamicznie? v.2.0Statycznie czy dynamicznie? v.2.0
Statycznie czy dynamicznie? v.2.0
 
GAS LICUADO DE PETROLEO - GLP
GAS LICUADO DE PETROLEO - GLPGAS LICUADO DE PETROLEO - GLP
GAS LICUADO DE PETROLEO - GLP
 
Gas licuado de petroleo (2)
Gas licuado de petroleo (2)Gas licuado de petroleo (2)
Gas licuado de petroleo (2)
 
Motywy dla WordPressa - historia prawdziwa - WordUp Katowice
Motywy dla WordPressa - historia prawdziwa - WordUp KatowiceMotywy dla WordPressa - historia prawdziwa - WordUp Katowice
Motywy dla WordPressa - historia prawdziwa - WordUp Katowice
 

Similar to Hackers

Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
Ajith Reddy
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Sanjeev Kumar Jaiswal
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
 
How to become Hackers .
How to become Hackers .How to become Hackers .
How to become Hackers .
Greater Noida Institute Of Technology
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
ciso_insights
 
Hackers Cracker Network Intruder
Hackers Cracker Network IntruderHackers Cracker Network Intruder
Hackers Cracker Network Intruder
Erdo Deshiant Garnaby
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
Mostafa Elgamala
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
Abdul Manaf Vellakodath
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threads
Leena Reddy
 
Hackers
HackersHackers
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Md Mudassir
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats
07Deeps
 
TAMUC LO 7
TAMUC LO 7TAMUC LO 7
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
Nargis Parveen
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Accenture
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Bushra22
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
KALPITKALPIT1
 
Beekman5 std ppt_12
Beekman5 std ppt_12Beekman5 std ppt_12
Computer ethics
Computer ethicsComputer ethics
Computer ethics
RitikaSharma238
 

Similar to Hackers (20)

Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
How to become Hackers .
How to become Hackers .How to become Hackers .
How to become Hackers .
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
Hackers Cracker Network Intruder
Hackers Cracker Network IntruderHackers Cracker Network Intruder
Hackers Cracker Network Intruder
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threads
 
Hackers
HackersHackers
Hackers
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats
 
TAMUC LO 7
TAMUC LO 7TAMUC LO 7
TAMUC LO 7
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Beekman5 std ppt_12
Beekman5 std ppt_12Beekman5 std ppt_12
Beekman5 std ppt_12
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 

Hackers