SlideShare a Scribd company logo
1 of 17
Procedural Controls
Procedural controls establish a framework
for validating and maintaining the
computer system and for ensuring that
users understand how to use the system.
Procedural controls usually take the form
of standard operating procedures (SOPs)
and user manuals.
Key Concepts for Procedural Controls
Vendor/Supplier management
Any computer equipment, instrumentation, and software that
you buy needs to come from a reputable vendor and needs to
be documented and tested for the environment in which it will
be used.
System Lifecycle
A System Lifecycle is a defined set of expectations, activities,
and deliverables promotes a controlled, well-thought-out
system through the life of the research project and reduces the
risk of errors. How you go about building, assembling, and
maintaining your system is an important part of validation.
• Procedures and training
A user who has been trained to operate computer software is less likely to
make errors that affect data or cause injury. Operating procedures and user
manuals direct user behavior within specific operational parameters dictated
by your system. Procedures need to address user accountability and
responsibility for actions taken while using the computer system, and if
applicable, the when and why for application of electronic signatures. Training
for each individual must be documented. A training certificate works well for
this purpose.
• Electronic signatures
There are several activities that must take place when you use electronic
signatures. You must: 1) notify the FDA in writing* that you are using
electronic signatures; 2) verify the identity of individuals who will be using an
electronic signature; 3) manage and monitor issuance of electronic signature
identifying components; 4) identify loss management and reporting processes
for security incidents; and 5) put in place mechanisms for periodic testing of
devices that generate electronic signature identifying components. Incorporate
these concepts into your SOPs. If your project is funded in whole or in part by 
NIH, you must keep NIH informed of your communications with the FDA.
Computer crime
Alternatively referred to as cyber crime, e-
crime, electronic crime, or hi-tech crime.
Computer crime is an act performed by a
knowledgeable computer user, sometimes referred
to as a hacker that illegally browses or steals a
company's or individual's private information. In
some cases, this person or group of individuals
may be malicious and destroy or otherwise corrupt
the computer or data files.
• In 1988 a "worm program" written by a
college student shut down about 10 percent
of computers connected to the Internet.
This was the beginning of the era of cyber
attacks.
• Today we have about 10,000 incidents of
cyber attacks which are reported and the
number grows.
Computer Crime – The Beginning
• A 16-year-old music student called Richard Pryce,
better known by the hacker alias Datastream
Cowboy, is arrested and charged with breaking into
hundreds of computers including those at the
Griffiths Air Force base, Nasa and the Korean Atomic
Research Institute. His online mentor, "Kuji", is
never found.
• Also this year, a group directed by Russian hackers
broke into the computers of Citibank and transferred
more than $10 million from customers' accounts.
Eventually, Citibank recovered all but $400,000 of
the pilfered money.
Computer Crime - 1994
• In February, Kevin Mitnick is arrested for a second
time. He is charged with stealing 20,000 credit card
numbers. He eventually spends four years in jail and
on his release his parole conditions demand that he
avoid contact with computers and mobile phones.
• On November 15, Christopher Pile becomes the first
person to be jailed for writing and distributing a
computer virus. Mr Pile, who called himself the Black
Baron, was sentenced to 18 months in jail.
• The US General Accounting Office reveals that US
Defense Department computers sustained 250,000
attacks in 1995.
Computer Crime - 1995
• In March, the Melissa virus goes on the rampage
and wreaks havoc with computers worldwide. After
a short investigation, the FBI tracks down and
arrests the writer of the virus, a 29-year-old New
Jersey computer programmer, David L Smith.
• More than 90 percent of large corporations and
government agencies were the victims of computer
security breaches in 1999
Computer Crime - 1999
• In February, some of the most popular websites in
the world such as Amazon and Yahoo are almost
overwhelmed by being flooded with bogus requests
for data.
• In May, the ILOVEYOU virus is unleashed and clogs
computers worldwide. Over the coming months,
variants of the virus are released that manage to
catch out companies that didn't do enough to
protect themselves.
• In October, Microsoft admits that its corporate
network has been hacked and source code for future
Windows products has been seen.
Computer Crime - 2000
Different types of computer crimes
• Denial of serviece attack- Overloading a system with so
many requests it cannot serve normal requests.
• Espionage - Spying on a person or business.
• Fraud - Manipulating data, e.g. changing banking records
to transfer money to an account.
• Harvesting - Collect account or other account related
information on other people.
• identify theft- Pretending to be someone you are not.
• Intellectual Property Theft - Stealing another persons or
companies intellectual property.
• Phishing - Deceiving individuals to gain private or
personal information about that person.
• Salami Slicing - Stealing tiny amounts of money from
each transaction.
• scam- Tricking people into believing something that is not
true.
• Spamming - Distributed unsolicited e-mail to dozens or
hundreds of different addresses.
• spoofing - Deceiving a system into thinking you are
someone you really are not.
• Unautheraised Access - Gaining access to systems you
have no permission to access.
• Wiretapping - Connecting a device to a phone line to
listen to conversations.
Hacking
Hacking refers to an array of activities which are done to intrude some
one else’s personal information space so as to use it for malicious,
unwanted purposes.
Hacking is a term used to refer to activities aimed at exploiting security
flaws to obtain critical information for gaining access to secured
networks.
A Brief History of Hacking
• 1980s
- Cyberspace coined
-414 arrested
-Two hacker groups formed
-2600 published
• 1990s
-National Crackdown on hackers
-Kevin Mitnick arrested
-Microsoft’s NT operating system pierced
• 2001
– In one of the biggest denial-of-service attack, hackers launched
attacks against eBay, Yahoo!, CNN.com., Amazon and others.
• 2007
– Bank hit by “biggest ever” hack. Swedish Bank, Nordea recorded
nearly $1 Million has been stolen in three months from 250
customer account.
• Ian Murphy
Famous Hackers in History
Ian Murphy Kevin Mitnick Johan Helsinguis
Mark AbeneLinus Torvalds Robert Morris

More Related Content

What's hot

Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahadaliuet
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyPELUMI APANTAKU
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics Avinash Mavuru
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeAaron White
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidPhil Agcaoili
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Hannah Jane del Castillo
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat Mishra
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measuresManish Singh
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer PrivacySaqib Raza
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hackingtangytangling
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 

What's hot (20)

Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and Society
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Cyber security # Lec 1
Cyber security # Lec 1Cyber security # Lec 1
Cyber security # Lec 1
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measures
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
1358619756 cyber terrorism
1358619756 cyber terrorism1358619756 cyber terrorism
1358619756 cyber terrorism
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 

Viewers also liked

Como crear una wiki
Como crear una wikiComo crear una wiki
Como crear una wikiarturo9887
 
Memoria Cámara Formato Medio (B&N)
Memoria Cámara Formato Medio (B&N)Memoria Cámara Formato Medio (B&N)
Memoria Cámara Formato Medio (B&N)Javier Gutierrez
 
A era do espírito (ademir xavier)
A era do espírito (ademir xavier)A era do espírito (ademir xavier)
A era do espírito (ademir xavier)Ricardo Akerman
 
AS VANTAGENS DE SER INVISÍVEL
AS VANTAGENS DE SER INVISÍVELAS VANTAGENS DE SER INVISÍVEL
AS VANTAGENS DE SER INVISÍVELRamon Vasconcelos
 
A mensagem do anjo do sarçal e algumas orações (osvaldo polidoro reencarnaç...
A mensagem do anjo do sarçal e algumas orações (osvaldo polidoro   reencarnaç...A mensagem do anjo do sarçal e algumas orações (osvaldo polidoro   reencarnaç...
A mensagem do anjo do sarçal e algumas orações (osvaldo polidoro reencarnaç...Ricardo Akerman
 
Publicación boletin-asada n°1
Publicación boletin-asada n°1Publicación boletin-asada n°1
Publicación boletin-asada n°1Asada16
 
Pakistan development update
Pakistan development updatePakistan development update
Pakistan development updateMaaz khan
 
10 reglas para alcanzar el éxito de FedEx
10 reglas para alcanzar el éxito de FedEx10 reglas para alcanzar el éxito de FedEx
10 reglas para alcanzar el éxito de FedExParvada Cowork and Co
 

Viewers also liked (12)

Equipos
EquiposEquipos
Equipos
 
Como crear una wiki
Como crear una wikiComo crear una wiki
Como crear una wiki
 
Memoria Cámara Formato Medio (B&N)
Memoria Cámara Formato Medio (B&N)Memoria Cámara Formato Medio (B&N)
Memoria Cámara Formato Medio (B&N)
 
A era do espírito (ademir xavier)
A era do espírito (ademir xavier)A era do espírito (ademir xavier)
A era do espírito (ademir xavier)
 
Practica de word
Practica de wordPractica de word
Practica de word
 
AS VANTAGENS DE SER INVISÍVEL
AS VANTAGENS DE SER INVISÍVELAS VANTAGENS DE SER INVISÍVEL
AS VANTAGENS DE SER INVISÍVEL
 
A mensagem do anjo do sarçal e algumas orações (osvaldo polidoro reencarnaç...
A mensagem do anjo do sarçal e algumas orações (osvaldo polidoro   reencarnaç...A mensagem do anjo do sarçal e algumas orações (osvaldo polidoro   reencarnaç...
A mensagem do anjo do sarçal e algumas orações (osvaldo polidoro reencarnaç...
 
Top#10
Top#10Top#10
Top#10
 
Publicación boletin-asada n°1
Publicación boletin-asada n°1Publicación boletin-asada n°1
Publicación boletin-asada n°1
 
Pakistan development update
Pakistan development updatePakistan development update
Pakistan development update
 
Pikas
PikasPikas
Pikas
 
10 reglas para alcanzar el éxito de FedEx
10 reglas para alcanzar el éxito de FedEx10 reglas para alcanzar el éxito de FedEx
10 reglas para alcanzar el éxito de FedEx
 

Similar to Hacking

Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1anilinvns
 
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.pptEndAlk15
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Anpumathews
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From CybercrimeDavid J Rosenthal
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism Accenture
 
Cyber security By rajeev.pptx
Cyber security By rajeev.pptxCyber security By rajeev.pptx
Cyber security By rajeev.pptxAmeyBarbade1
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 

Similar to Hacking (20)

Mis chapter 9
Mis chapter 9Mis chapter 9
Mis chapter 9
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.ppt
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
 
sc.pptx
sc.pptxsc.pptx
sc.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Cyber security By rajeev.pptx
Cyber security By rajeev.pptxCyber security By rajeev.pptx
Cyber security By rajeev.pptx
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 

Recently uploaded

Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 

Recently uploaded (20)

Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 

Hacking

  • 1. Procedural Controls Procedural controls establish a framework for validating and maintaining the computer system and for ensuring that users understand how to use the system. Procedural controls usually take the form of standard operating procedures (SOPs) and user manuals.
  • 2.
  • 3. Key Concepts for Procedural Controls Vendor/Supplier management Any computer equipment, instrumentation, and software that you buy needs to come from a reputable vendor and needs to be documented and tested for the environment in which it will be used. System Lifecycle A System Lifecycle is a defined set of expectations, activities, and deliverables promotes a controlled, well-thought-out system through the life of the research project and reduces the risk of errors. How you go about building, assembling, and maintaining your system is an important part of validation.
  • 4. • Procedures and training A user who has been trained to operate computer software is less likely to make errors that affect data or cause injury. Operating procedures and user manuals direct user behavior within specific operational parameters dictated by your system. Procedures need to address user accountability and responsibility for actions taken while using the computer system, and if applicable, the when and why for application of electronic signatures. Training for each individual must be documented. A training certificate works well for this purpose. • Electronic signatures There are several activities that must take place when you use electronic signatures. You must: 1) notify the FDA in writing* that you are using electronic signatures; 2) verify the identity of individuals who will be using an electronic signature; 3) manage and monitor issuance of electronic signature identifying components; 4) identify loss management and reporting processes for security incidents; and 5) put in place mechanisms for periodic testing of devices that generate electronic signature identifying components. Incorporate these concepts into your SOPs. If your project is funded in whole or in part by  NIH, you must keep NIH informed of your communications with the FDA.
  • 5. Computer crime Alternatively referred to as cyber crime, e- crime, electronic crime, or hi-tech crime. Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a hacker that illegally browses or steals a company's or individual's private information. In some cases, this person or group of individuals may be malicious and destroy or otherwise corrupt the computer or data files.
  • 6. • In 1988 a "worm program" written by a college student shut down about 10 percent of computers connected to the Internet. This was the beginning of the era of cyber attacks. • Today we have about 10,000 incidents of cyber attacks which are reported and the number grows. Computer Crime – The Beginning
  • 7. • A 16-year-old music student called Richard Pryce, better known by the hacker alias Datastream Cowboy, is arrested and charged with breaking into hundreds of computers including those at the Griffiths Air Force base, Nasa and the Korean Atomic Research Institute. His online mentor, "Kuji", is never found. • Also this year, a group directed by Russian hackers broke into the computers of Citibank and transferred more than $10 million from customers' accounts. Eventually, Citibank recovered all but $400,000 of the pilfered money. Computer Crime - 1994
  • 8. • In February, Kevin Mitnick is arrested for a second time. He is charged with stealing 20,000 credit card numbers. He eventually spends four years in jail and on his release his parole conditions demand that he avoid contact with computers and mobile phones. • On November 15, Christopher Pile becomes the first person to be jailed for writing and distributing a computer virus. Mr Pile, who called himself the Black Baron, was sentenced to 18 months in jail. • The US General Accounting Office reveals that US Defense Department computers sustained 250,000 attacks in 1995. Computer Crime - 1995
  • 9. • In March, the Melissa virus goes on the rampage and wreaks havoc with computers worldwide. After a short investigation, the FBI tracks down and arrests the writer of the virus, a 29-year-old New Jersey computer programmer, David L Smith. • More than 90 percent of large corporations and government agencies were the victims of computer security breaches in 1999 Computer Crime - 1999
  • 10. • In February, some of the most popular websites in the world such as Amazon and Yahoo are almost overwhelmed by being flooded with bogus requests for data. • In May, the ILOVEYOU virus is unleashed and clogs computers worldwide. Over the coming months, variants of the virus are released that manage to catch out companies that didn't do enough to protect themselves. • In October, Microsoft admits that its corporate network has been hacked and source code for future Windows products has been seen. Computer Crime - 2000
  • 11. Different types of computer crimes • Denial of serviece attack- Overloading a system with so many requests it cannot serve normal requests. • Espionage - Spying on a person or business. • Fraud - Manipulating data, e.g. changing banking records to transfer money to an account. • Harvesting - Collect account or other account related information on other people. • identify theft- Pretending to be someone you are not. • Intellectual Property Theft - Stealing another persons or companies intellectual property.
  • 12. • Phishing - Deceiving individuals to gain private or personal information about that person. • Salami Slicing - Stealing tiny amounts of money from each transaction. • scam- Tricking people into believing something that is not true. • Spamming - Distributed unsolicited e-mail to dozens or hundreds of different addresses. • spoofing - Deceiving a system into thinking you are someone you really are not. • Unautheraised Access - Gaining access to systems you have no permission to access. • Wiretapping - Connecting a device to a phone line to listen to conversations.
  • 13. Hacking Hacking refers to an array of activities which are done to intrude some one else’s personal information space so as to use it for malicious, unwanted purposes. Hacking is a term used to refer to activities aimed at exploiting security flaws to obtain critical information for gaining access to secured networks.
  • 14. A Brief History of Hacking • 1980s - Cyberspace coined -414 arrested -Two hacker groups formed -2600 published • 1990s -National Crackdown on hackers -Kevin Mitnick arrested -Microsoft’s NT operating system pierced
  • 15. • 2001 – In one of the biggest denial-of-service attack, hackers launched attacks against eBay, Yahoo!, CNN.com., Amazon and others. • 2007 – Bank hit by “biggest ever” hack. Swedish Bank, Nordea recorded nearly $1 Million has been stolen in three months from 250 customer account.
  • 17. Famous Hackers in History Ian Murphy Kevin Mitnick Johan Helsinguis Mark AbeneLinus Torvalds Robert Morris

Editor's Notes

  1. Some stories about hackings
  2. Some stories about hackings
  3. The Computer Security Institute's fifth Computer Crime and Security Survey also found that the total reported financial losses have tripled.The annual survey is conducted with the participation of the San Francisco FBI Computer Intrusion Squad and aims to increase awareness of security. This year's survey was based on responses from 643 computer-security professionals in U.S. corporations, government agencies, financial institutions, medical institutions and universities.Only 42 percent of those answering the survey could put a dollar figure on their financial losses - reporting the total at $265 million. The average annual total over the last three years was $120 million.