SlideShare a Scribd company logo
A GIFT OF FIRE
FOURTH EDITION
SARA BAASE
Chapter 5: Crime
WHAT WE WILL COVER
Hacking
Identity Theft and Credit Card Fraud
Scams and Forgery
Laws That Rule the Web
HACKING
Hacking—intentional, unauthorized access to computer
systems—includes a wide range of activities from minor
pranks to huge thefts and shutdowns of services on
which lives and livelihoods depend.
HACKING
Crimes committed with computing technology are more
devastating and harder to detect than similar crimes
committed without it.
A robber who enters a bank and uses a gun gets $2,500–
$5000 on average. The average loss from a computer
fraud is more than $100,000.
A thief who steals a credit card (or a credit card number)
gains access to a much larger amount of money than the
thief of the past who stole a wallet containing only cash.
A hacker who breaks into a retailer’s or bank’s computer
might steal not one or a dozen but thousands or millions
of credit card numbers.
WHO IS HACKER?
A computer hacker is someone who develops, changes or
attempts to circumvent computer security hardware or software.
Intelligent, having advance knowledge of hardware and
software.
Can either happen for negative (criminal) or positive reasons.
Criminal hackers develop computer malware or spyware to gain
access to confidential information.
TYPES OF HACKING
Website Hacking
Net Hacking
Password Hacking
Software Hacking
Ethical Hacking
Email Hacking
Computer Hacking
WEBSITE HACKING
Hacking a website means taking control from the website owner
to a person who hacks the website.
NET HACKING
Gathering information about the domain
IP address (Address of your computer in the internet)
Port (It is logical port on your computer which hacker can use to
enter in the system)
PASSWORD HACKING
Password Hacking or Password cracking is the process of
recovering secret passwords from data that has been stored in
or transmitted by a computer system.
Brute force (Hackers try out all the combination of all keyboard
letters)
Dictionary based (Hackers use predefine passwords. It is
unsuccessful method)
SOFTWARE HACKING
In that hackers changes the look & execution way of that
software. For example change the demo version into the full
version of that software.
Modifying existing features of the software.
ETHICAL HACKING
The process in which a person hacks to find weakness in a
system and then usually patches them.
Can be used to recover lost information where the computer
password has been lost.
To test security of the system.
Also called white hat computer hacking.
EMAIL HACKING
Email hacking is unauthorized access to an email account or
email correspondence.
COMPUTER HACKING
Computer Hacking is when files on computer are viewed,
created, edited or deleted without authorization.
HACKER
Irresponsible destructive criminal
Breaks into computer systems
Intentionally release viruses
Steal personal & business information
Steal money , crash websites & destroy files etc
What hackers call themselves?
PHASE 1—(1960S AND 1970S)
THE JOY OF PROGRAMMING
It was a positive term
A “hacker” was a creative programmer who wrote very
elegant or clever programs.
A “good hack” was an especially clever piece of code.
Hackers created many of the first computer games and
operating systems.
Many were high school and college students—or drop-
outs.
Although they sometimes found ways into systems where
they were not authorized users, the early hackers mostly
sought knowledge and intellectual challenges—and,
sometimes, the thrill of going where they did not belong.
PHASE 2: 1970S TO THE MID-1990S
The meaning of the word “hacker” changed as more
people began using computers.
breaking into computers for which the hacker does not
have authorized access.
hacking also included spreading computer viruses, then
mostly in software traded on floppy disks.
behavior included thefts (of information, software, and
sometimes money),
Hackers obtained passwords by sophisticated techniques.
PHASE 2: 1970S TO THE MID-1990S
A program known as the Internet Worm demonstrated the
vulnerability of the Internet as a whole in 1988.
A graduate student at Cornell University wrote the worm
and released it onto the Internet. It spread quickly to
computers running particular versions of the UNIX
operating system, jamming them up and preventing
normal processing. The worm affected a few thousand
computers (a large portion of the Internet at the time).
It took a few days for systems programmers to discover,
decode, and rid their systems of the worm. The worm
disrupted work and inconvenienced a large number of
people.
This incident raised concern about the potential to
disrupt critical computer services and cause social
PHASE 2: 1970S TO THE MID-1990S
Adult criminals began to recognize the possibilities of
hacking.
Business espionage and significant thefts and frauds
joined the list of hacking activities in the 1980s and
1990s.
Russian man, with associate in several countries, used
stolen passwords to steal $400,000 . He transferred
another $11 million to bank accounts in other countries.
PHASE 3: THE GROWTH OF THE
WEB AND MOBILE DEVICES-MID
1990S
Beginning roughly in the mid-1990s, the growth of the
Web and the increased use of the Internet for email and
other communications, for sensitive information, and for
economic transactions made hacking more dangerous
and damaging—and more attractive to criminal gangs.
The kind of accessible information expanded to include
credit reports, consumer profiles, medical records, tax
records, confidential business information, and other
types of information which are threats to privacy.
PHASE 3: THE GROWTH OF THE
WEB AND MOBILE DEVICES-MID
1990S
With basic infrastructure systems (for example, water and
power, hospitals, transportation, emergency services, in
addition to the telephone system) accessible on the Net,
the risk increased.
As the Web spread globally, so did hacking.
PHASE 3: THE GROWTH OF THE
WEB AND MOBILE DEVICES-MID
1990S
Pranksters modified the U.S. Department of Justice Web
page to read “Department of Injustice”
A teenager crippled a computer system that handled
communications between the airport tower and incoming
planes at a small airport.
Hackers in England impersonated air traffic controllers
and gave false instructions to pilots.
PHASE 3: THE GROWTH OF THE
WEB AND MOBILE DEVICES-MID
1990S
In 2000, the “Love Bug,” spread around the
world in a few hours. It destroyed image and
music files, modified a computer’s operating
system and Internet browser, and collected
passwords. This virus infected major
corporations like Ford and Siemens and 80% of
U.S. federal agencies, including the State
Department and the Pentagon, along with
members of the British Parliament and the U.S.
Congress. Many businesses and government
agencies had to shut down their email servers.
The virus hit tens of millions of computers
worldwide and did an estimated $10 billion in
damage.
PHASE 3: THE GROWTH OF THE
WEB AND MOBILE DEVICES-MID
1990S
Within about one week, denial-of-service attacks shut
down almost a dozen major websites, some for several
hours. Victims included Yahoo, eBay, Amazon, E∗Trade,
Buy.com, CNN, and others. In this kind of attack, hackers
overload the target site with hundreds of thousands of
requests for Web pages and other information. Programs
planted on numerous other systems (many at
universities), to disguise their origin, generate the
requests. Investigators traced the attack to a 15-year-old
Canadian who used the name mafiaboy; he pleaded guilty
to a long list of charges. The U.S. government estimated
the cost of this incident at $1.7 billion. One disturbing
aspect of this case is that mafiaboy apparently did not
write the destructive programs himself. He found them on
the Net, where other 15-year-olds can find them too.
PHASE 3: THE GROWTH OF THE
WEB AND MOBILE DEVICES-MID
1990S
The purposes and techniques of hacking have shifted as
the Web and the amount of stored data of all kinds have
grown.
Hackers steal millions of credit card numbers from large
retailers, restaurant chains, banks, and so on. Some are
members of organized crime groups; others sell the
numbers to organized crime groups. Some demand
extortion payments.
PHASE 3: THE GROWTH OF THE
WEB AND MOBILE DEVICES-MID
1990S
As computer systems replaced human ticket sellers for
transportation and other services, hackers found more
opportunities for theft. For example, New York City accused
several people of stealing $800,000 from the city’s subway
system by taking advantage of an error in the software in the
machines that sell fare cards.
Hackers continue to execute pranks and revenge attacks—some
quite expensive. Hackers modified the programming at an online
gambling site so that everyone won. The site lost $1.9 million.
PHASE 3: THE GROWTH OF THE
WEB AND MOBILE DEVICES-MID
1990S
As social networks grew, they became targets of hackers.
In 2011, hackers gained access to Facebook member
profile pages.
The hackers had tricked members into running malware.
It is a common tactic for hackers to create fake offers of
discounts, freebies, or just something funny or
interesting. Clicking on it initiates the malware.
Similar attacks encourage a social media friend to view a
video. The video site indicates that the user must install
software to view the clip; that software is malware. Social
networks offer a huge pool of potential victims who are
used to sharing.
PHASE 3: THE GROWTH OF THE
WEB AND MOBILE DEVICES-MID
1990S
Hacking of mobile devices (other than stolen laptops) has
not yet been a major problem but smartphones acting as
electronic wallets and tablets synching to all one’s data in
clouds, they will be attractive targets.
IS HARMLESS HACKING
HARMLESS?
Cannot immediately differentiate between a non-malicious
hacker and a spy/thief /terrorist
Uncertainty about intruder’s intentions  harm, expense
Example Boeing , National weather service computers
Hackers with good intentions can also make unintentional
mistakes and can cause significant damage
HACKTIVISM-POLITICAL
HACKING
Pro drug message on a police website
Disabling a website of real state agent
Civil disobedience ??
Is it freedom of speech?
 Crashing or defacing a website ??
IDENTITY THEFT AND CREDIT
CARD FRAUD
Stealing Identities:
Identity Theft –various crimes in which a
criminal or large group uses the identity of an
unknowing, innocent person
 Use credit/debit card numbers, personal
information, and social security numbers
 E-commerce has made it easier to steal card
numbers and use without having the physical
card
IDENTITY THEFT AND CREDIT
CARD FRAUD (CONT.)
Techniques used to steal personal and financial
information
 Phishing - e-mail fishing for personal and
financial information disguised as legitimate
business e-mail
 Smishing- spam in case of text messages
 Pharming - false Web sites that fish for
personal and financial information by planting
false URLs in Domain Name Servers
 Online resumes and job hunting sites may
reveal SSNs, work history, birth dates and
other information that can be used in identity
theft
IDENTITY THEFT AND CREDIT
CARD FRAUD (CONT.)
Techniques used to protect personal and
financial information
 Activation for new credit cards
 Retailers do not print the full card number and
expiration date on receipts
 Software detects unusual spending activities
and will prompt retailers to ask for identifying
information
 Customers home computer
 Image based verification
 Geographic location
IDENTITY THEFT AND CREDIT
CARD FRAUD (CONT.)
Biometrics:
Biological characteristics unique to an individual
They include fingerprints, voice prints, face
structure, hand geometry, eye (iris or retina)
patterns, and DNA. Uses of DNA in the law
enforcement and justice systems are well known.
DNA matching has freed numerous innocent people
mistakenly convicted of such serious crimes as
murder. Along with fingerprints, DNA has been
extremely effective for identifying or eliminating
suspects in crimes.
No external item (card, keys, etc.) to be stolen
Used in areas where security needs to be high, such
as identifying airport personnel
Biometrics can be fooled, but more difficult to do
so, especially as more sophisticated systems are
developed

More Related Content

Similar to PP Lec15n16 Sp2020.pptx

Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
Anjana Ks
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
gururaj lulkarni
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
KALPITKALPIT1
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
indhuchezhian
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
write12
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
bkbk37
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
ishmecse13
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
Rajesh Satpathy, Regional College of Management (RCM), Bhubaneswar
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
Alexander Zhuravlev
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Debayon Saha
 
Cybercrime(this)
Cybercrime(this)Cybercrime(this)
Cybercrime(this)
Yadiy Zak-One
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
Tejasvi Bhatia
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdf
Aadil83
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
aravindanvaithilinga
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Hussain777
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Muhammad Hamza
 

Similar to PP Lec15n16 Sp2020.pptx (20)

Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime(this)
Cybercrime(this)Cybercrime(this)
Cybercrime(this)
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdf
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

Recently uploaded

Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 

Recently uploaded (20)

Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 

PP Lec15n16 Sp2020.pptx

  • 1. A GIFT OF FIRE FOURTH EDITION SARA BAASE Chapter 5: Crime
  • 2. WHAT WE WILL COVER Hacking Identity Theft and Credit Card Fraud Scams and Forgery Laws That Rule the Web
  • 3. HACKING Hacking—intentional, unauthorized access to computer systems—includes a wide range of activities from minor pranks to huge thefts and shutdowns of services on which lives and livelihoods depend.
  • 4. HACKING Crimes committed with computing technology are more devastating and harder to detect than similar crimes committed without it. A robber who enters a bank and uses a gun gets $2,500– $5000 on average. The average loss from a computer fraud is more than $100,000. A thief who steals a credit card (or a credit card number) gains access to a much larger amount of money than the thief of the past who stole a wallet containing only cash. A hacker who breaks into a retailer’s or bank’s computer might steal not one or a dozen but thousands or millions of credit card numbers.
  • 5. WHO IS HACKER? A computer hacker is someone who develops, changes or attempts to circumvent computer security hardware or software. Intelligent, having advance knowledge of hardware and software. Can either happen for negative (criminal) or positive reasons. Criminal hackers develop computer malware or spyware to gain access to confidential information.
  • 6. TYPES OF HACKING Website Hacking Net Hacking Password Hacking Software Hacking Ethical Hacking Email Hacking Computer Hacking
  • 7. WEBSITE HACKING Hacking a website means taking control from the website owner to a person who hacks the website.
  • 8. NET HACKING Gathering information about the domain IP address (Address of your computer in the internet) Port (It is logical port on your computer which hacker can use to enter in the system)
  • 9. PASSWORD HACKING Password Hacking or Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. Brute force (Hackers try out all the combination of all keyboard letters) Dictionary based (Hackers use predefine passwords. It is unsuccessful method)
  • 10. SOFTWARE HACKING In that hackers changes the look & execution way of that software. For example change the demo version into the full version of that software. Modifying existing features of the software.
  • 11. ETHICAL HACKING The process in which a person hacks to find weakness in a system and then usually patches them. Can be used to recover lost information where the computer password has been lost. To test security of the system. Also called white hat computer hacking.
  • 12. EMAIL HACKING Email hacking is unauthorized access to an email account or email correspondence.
  • 13. COMPUTER HACKING Computer Hacking is when files on computer are viewed, created, edited or deleted without authorization.
  • 14. HACKER Irresponsible destructive criminal Breaks into computer systems Intentionally release viruses Steal personal & business information Steal money , crash websites & destroy files etc What hackers call themselves?
  • 15. PHASE 1—(1960S AND 1970S) THE JOY OF PROGRAMMING It was a positive term A “hacker” was a creative programmer who wrote very elegant or clever programs. A “good hack” was an especially clever piece of code. Hackers created many of the first computer games and operating systems. Many were high school and college students—or drop- outs. Although they sometimes found ways into systems where they were not authorized users, the early hackers mostly sought knowledge and intellectual challenges—and, sometimes, the thrill of going where they did not belong.
  • 16. PHASE 2: 1970S TO THE MID-1990S The meaning of the word “hacker” changed as more people began using computers. breaking into computers for which the hacker does not have authorized access. hacking also included spreading computer viruses, then mostly in software traded on floppy disks. behavior included thefts (of information, software, and sometimes money), Hackers obtained passwords by sophisticated techniques.
  • 17. PHASE 2: 1970S TO THE MID-1990S A program known as the Internet Worm demonstrated the vulnerability of the Internet as a whole in 1988. A graduate student at Cornell University wrote the worm and released it onto the Internet. It spread quickly to computers running particular versions of the UNIX operating system, jamming them up and preventing normal processing. The worm affected a few thousand computers (a large portion of the Internet at the time). It took a few days for systems programmers to discover, decode, and rid their systems of the worm. The worm disrupted work and inconvenienced a large number of people. This incident raised concern about the potential to disrupt critical computer services and cause social
  • 18. PHASE 2: 1970S TO THE MID-1990S Adult criminals began to recognize the possibilities of hacking. Business espionage and significant thefts and frauds joined the list of hacking activities in the 1980s and 1990s. Russian man, with associate in several countries, used stolen passwords to steal $400,000 . He transferred another $11 million to bank accounts in other countries.
  • 19. PHASE 3: THE GROWTH OF THE WEB AND MOBILE DEVICES-MID 1990S Beginning roughly in the mid-1990s, the growth of the Web and the increased use of the Internet for email and other communications, for sensitive information, and for economic transactions made hacking more dangerous and damaging—and more attractive to criminal gangs. The kind of accessible information expanded to include credit reports, consumer profiles, medical records, tax records, confidential business information, and other types of information which are threats to privacy.
  • 20. PHASE 3: THE GROWTH OF THE WEB AND MOBILE DEVICES-MID 1990S With basic infrastructure systems (for example, water and power, hospitals, transportation, emergency services, in addition to the telephone system) accessible on the Net, the risk increased. As the Web spread globally, so did hacking.
  • 21. PHASE 3: THE GROWTH OF THE WEB AND MOBILE DEVICES-MID 1990S Pranksters modified the U.S. Department of Justice Web page to read “Department of Injustice” A teenager crippled a computer system that handled communications between the airport tower and incoming planes at a small airport. Hackers in England impersonated air traffic controllers and gave false instructions to pilots.
  • 22. PHASE 3: THE GROWTH OF THE WEB AND MOBILE DEVICES-MID 1990S In 2000, the “Love Bug,” spread around the world in a few hours. It destroyed image and music files, modified a computer’s operating system and Internet browser, and collected passwords. This virus infected major corporations like Ford and Siemens and 80% of U.S. federal agencies, including the State Department and the Pentagon, along with members of the British Parliament and the U.S. Congress. Many businesses and government agencies had to shut down their email servers. The virus hit tens of millions of computers worldwide and did an estimated $10 billion in damage.
  • 23. PHASE 3: THE GROWTH OF THE WEB AND MOBILE DEVICES-MID 1990S Within about one week, denial-of-service attacks shut down almost a dozen major websites, some for several hours. Victims included Yahoo, eBay, Amazon, E∗Trade, Buy.com, CNN, and others. In this kind of attack, hackers overload the target site with hundreds of thousands of requests for Web pages and other information. Programs planted on numerous other systems (many at universities), to disguise their origin, generate the requests. Investigators traced the attack to a 15-year-old Canadian who used the name mafiaboy; he pleaded guilty to a long list of charges. The U.S. government estimated the cost of this incident at $1.7 billion. One disturbing aspect of this case is that mafiaboy apparently did not write the destructive programs himself. He found them on the Net, where other 15-year-olds can find them too.
  • 24. PHASE 3: THE GROWTH OF THE WEB AND MOBILE DEVICES-MID 1990S The purposes and techniques of hacking have shifted as the Web and the amount of stored data of all kinds have grown. Hackers steal millions of credit card numbers from large retailers, restaurant chains, banks, and so on. Some are members of organized crime groups; others sell the numbers to organized crime groups. Some demand extortion payments.
  • 25. PHASE 3: THE GROWTH OF THE WEB AND MOBILE DEVICES-MID 1990S As computer systems replaced human ticket sellers for transportation and other services, hackers found more opportunities for theft. For example, New York City accused several people of stealing $800,000 from the city’s subway system by taking advantage of an error in the software in the machines that sell fare cards. Hackers continue to execute pranks and revenge attacks—some quite expensive. Hackers modified the programming at an online gambling site so that everyone won. The site lost $1.9 million.
  • 26. PHASE 3: THE GROWTH OF THE WEB AND MOBILE DEVICES-MID 1990S As social networks grew, they became targets of hackers. In 2011, hackers gained access to Facebook member profile pages. The hackers had tricked members into running malware. It is a common tactic for hackers to create fake offers of discounts, freebies, or just something funny or interesting. Clicking on it initiates the malware. Similar attacks encourage a social media friend to view a video. The video site indicates that the user must install software to view the clip; that software is malware. Social networks offer a huge pool of potential victims who are used to sharing.
  • 27. PHASE 3: THE GROWTH OF THE WEB AND MOBILE DEVICES-MID 1990S Hacking of mobile devices (other than stolen laptops) has not yet been a major problem but smartphones acting as electronic wallets and tablets synching to all one’s data in clouds, they will be attractive targets.
  • 29. Cannot immediately differentiate between a non-malicious hacker and a spy/thief /terrorist Uncertainty about intruder’s intentions  harm, expense Example Boeing , National weather service computers Hackers with good intentions can also make unintentional mistakes and can cause significant damage
  • 30. HACKTIVISM-POLITICAL HACKING Pro drug message on a police website Disabling a website of real state agent Civil disobedience ?? Is it freedom of speech?  Crashing or defacing a website ??
  • 31. IDENTITY THEFT AND CREDIT CARD FRAUD Stealing Identities: Identity Theft –various crimes in which a criminal or large group uses the identity of an unknowing, innocent person  Use credit/debit card numbers, personal information, and social security numbers  E-commerce has made it easier to steal card numbers and use without having the physical card
  • 32. IDENTITY THEFT AND CREDIT CARD FRAUD (CONT.) Techniques used to steal personal and financial information  Phishing - e-mail fishing for personal and financial information disguised as legitimate business e-mail  Smishing- spam in case of text messages  Pharming - false Web sites that fish for personal and financial information by planting false URLs in Domain Name Servers  Online resumes and job hunting sites may reveal SSNs, work history, birth dates and other information that can be used in identity theft
  • 33. IDENTITY THEFT AND CREDIT CARD FRAUD (CONT.) Techniques used to protect personal and financial information  Activation for new credit cards  Retailers do not print the full card number and expiration date on receipts  Software detects unusual spending activities and will prompt retailers to ask for identifying information  Customers home computer  Image based verification  Geographic location
  • 34. IDENTITY THEFT AND CREDIT CARD FRAUD (CONT.) Biometrics: Biological characteristics unique to an individual They include fingerprints, voice prints, face structure, hand geometry, eye (iris or retina) patterns, and DNA. Uses of DNA in the law enforcement and justice systems are well known. DNA matching has freed numerous innocent people mistakenly convicted of such serious crimes as murder. Along with fingerprints, DNA has been extremely effective for identifying or eliminating suspects in crimes. No external item (card, keys, etc.) to be stolen Used in areas where security needs to be high, such as identifying airport personnel Biometrics can be fooled, but more difficult to do so, especially as more sophisticated systems are developed