SlideShare une entreprise Scribd logo
1  sur  19
HACKING




Ryan Mauer, Monica Solis, Francis Tienzo, and Mike
Wong
Hacking: The Basics
   The term hacking itself is broad in that it
    encompasses all forms (i.e. phones,
    computers, computer systems) of gathering
    information about another person, usually
    illegally and for profitable reasons.
   http://www.youtube.com/watch?v=uV5u5Nl3bjM
Classifications of Hacking
   White Hat – an ethical hacker who helps test security systems.
   Black Hat – a hacker who breaks into a computer security system for
    personal gain or malicious intent.
   Grey Hat – a mix of the white and black hat, this hacker may break into a
    computer system, then offer to help the company protect against hackers for a
    fee.
   Elite Hacker – extremely skilled hackers.
   Script Kiddie – a non-expert who cracks into a computer system using
    pre-constructed tools (i.e. another hacker‟s technique) to do so.
   Neophyte – also known as a “n00b” or a “newbie” is someone who is
    new to hacking and knows very little about it.
   Hacktivist – a hacker who breaks into websites and reorganizes them
    with a political, social, or otherwise ideological message.
Techniques
   Vulnerability Scanner – a tool that scans a computer to
    see which networks or files are „open‟ to corrupt.

   Password cracking – discovering a password by finding old
    data stored on a computer (can be as simple as guessing a
    password).


   Spoofing attack (Phishing) – falsely advertising to be
    another website or program, and when downloaded can take personal info.

   Social engineering – when a hacker tries to convince a system
    administrator that he is a user or supervisor who needs assistance gaining
    access
Techniques continued…
   Trojan Horses – a program that appears to be doing one thing
    while really serving another purpose.


   Viruses – a self-replicating program that spreads by duplicating
    copies of itself.


   Worms – similar to a virus in that it is a self-replicating program, but it
    does not have to be opened by the user in order to infect a computer.


   Key Loggers – a tool that records each key stroke made so as to
    retrieve passwords or private data.
The History of Hacking: A
 Timeline
 1870s           1960s           1970s          1980s           1990s           2000
First Instance   Positive term   John Draper,   One of the      Creation of     Microsoft is a
of phone         for hackers     one of the     first arrests   the National    victim of a new
hacking          develops        most famous    of the          Infrastructur   type of hacking
exhibited by     through         phone          Milwaukee-      e Protection
teenagers.       MIT‟s           hackers,       based 414       Center.         Chinese
                 artificial      nicknamed      hackers.                        hackers claim
                 intelligence    “Captain                                       to gain access
                 lab.            Crunch”                                        to sensitive
                                                                                sites.

                                                                                YouTube
                                                                                Sesame Street
                                                                                hacking
                                                                                controversy.
Notorious “Black Hat” Hackers
    Jonathan James: James gained
     notoriety when he became the first
     juvenile to be sent to prison for hacking
     at age 16. Created a backdoor to the
     department of defense which enabled
     him to view sensitive emails and
     capture employee usernames and
     passwords.

    Adrian Lamo: Broke into major
     organizations like The New York Times
     and Microsoft. Dubbed the "homeless
     hacker," he used Internet connections
     at Kinko's, coffee shops and libraries to
     do his intrusions so as to remain
     „untraceable‟.
Famous “White Hat” Hackers
            Stephen Wozniak: "Woz" is
             famous for being the "other
             Steve" of Apple.



            Tim Berners-Lee: Berners-
             Lee is famed as the inventor
             of the World Wide Web
Hacking Today: Stuxnet

   A computer worm discovered in June of 2010.
   It is the first discovered malware what spies on
    and subverts industrial systems.
   Specifically targeted an Iranian Nuclear
    Facility.
   Brings up the question as to whether the
    framework will be used for future super
    viruses.                  Azerbaijan 2.57%
                             United States
    Country Infected computers:
                           1.56%
       Iran 58.85%        Pakistan 1.28%
       Indonesia 18.22%   Others 9.2%
Illegality of Hacking

   Computer Fraud & Abuse Act – 1984
     Put  in place to reduce cracking of computer
      systems (hacking) and to address federal
      computer-related offenses.
     Initially governed only cases with a compelling
      federal interest
     After amendments, many people feel that the law
      is too broad
Illegal Actions under the Act
1.   Knowingly accessing a computer without authorization for purposes of
     obtaining national security data

2.   Knowingly and intentionally accessing a computer without authorization in
     order to gain information from a financial institution, any U.S. department
     or agency, or any protected computer.

3.   Intentionally accessing without authorization a government computer to
     affect the government‟s use of it.

4.   Knowingly accessing a protected computer with the intent to defraud.

5.   Knowingly causing the transmission of a program, information, code, or
     command which leads to damage or accessing a computer without
     authorization, which leads to significant damages.

6.   Knowingly and with the intent to defraud, trafficking a password or similar
     information through which a computer may be accessed without
     authorization.
CFAA in the News
   Violating an internet service provider‟s terms of service
    agreement is now subject to criminal prosecution.
   Cyber bullying – 2008, woman from Missouri charged for
    leading a teenage girl to commit suicide via MySpace. Guilty
    verdict thrown out on vagueness of the CFAA
   Amendment to pending bill approved by U.S. Senate:
     Would limit the interpretation of the CFAA. Would not include
      violation of a contractual obligation or agreement.
     This would protect people for merely violating a contractual
      agreement with a web site or their ISP from being subject to
      criminal charges (vs. civil charges)
   Criminalized conduct also includes: using a fake name on
    Facebook, lying about your weight on an online dating profile,
    etc.
Anonymous (Hacking Group)
   “Hactivism”
   Target mainly institutions,
    organizations, and government
    departments that the group protests
    against.
   Aims to spread a message with
    each attack.
   Examples: Department of Justice
    (after MegaUpload), Colombia‟s Defense
    Ministry (arrests made by Interpol)
Memorable events:
US Government & Hacking

   1999 – President Clinton passes government computer security
    initiative

   2000 – “I Love You” virus hits the globe
   2002 – President Bush creates the Department of Homeland Security.
   2005 – NSA illegal wiretapping controversy
   2010 – Obama administration ends wiretapping
   2010 – Wikileaks controversy
   2011- Cyber security legislation goes through Congress
   2011 – Foreign hackers steal 24,000 Pentagon files.
“I Love You” Virus – May 4,
2000
   Email subject line: “I Love You”
   Attachment :“LOVE-LETTER-FOR-
    YOU.TXT.vbs”
   Replaced multimedia files with itself
   Sent to everyone in Outlook address
    book
   Hit 45 million people in one day
   OnelDe Guzman and Reomel
    Ramones of the Philippines arrested,
    then released
     BEFORE: malware thought of as
      “urban myth”
     AFTER: US signs Council of Europe
      Cybercrime Treaty to harmonize laws
Wikileaks Controversy
   Private Bradley Manning
       Gave stolen diplomatic memos to WikiLeaks
           260,000 files, airstike videos from Iraq and Afghanistan
     Replaced music on a Lady Gaga CD with secret
      files
     Reported by hacker friend Adrian Lamo

     Charged in Military Court & staying in medium
      security facility.
   Pentagon‟s Response
     Disable drives prom accessing data
     Restricted use of memory devices

     Defense Department installed fraud detection
Hackers steal Pentagon files –
    March 2011
   Plans for missile tracking systems, satellite
    navigation systems, surveillance drones, and jet
    fighters were taken.
   Didn‟t say which data system was hacked and
    who they suspected.
   Other breaches: Lockheed, Martin, RSA Security
   New cyber strategy
       Tighter defense, collective effort, technological innovation
   Military‟s Cyber Command coordinates operations
    for computer networks.
   Incentives Taken:
       National data breach reporting, increased penalties, possible military
        action response, cybersecurity (DoD, DHS, and private sector)
Questions:
   Do you think that the US government should
    invest more into preventing hacking?
   Do you think cyberspace is a new frontier for
    possible terrorist attacks? (i.e. Stuxnet)
   Have any of you ever been a victim of
    hacking?
   Should the CFAA definition be narrowed to
    better define what should be punished related
    to hacking?
   What do you think about the concept of
    hactivism? Are there other channels for
Bibliography:
   "Bush says he signed NSA wiretap order." CNN.com. CNN, 2005. Web. 21 Mar 2012.
    http://articles.cnn.com/2005-12-17/politics/bush.nsa_1_wiretaps-constitutional-responsibilities-and-authorities-
    national-security-agency?_s=PM:POLITICS
   Hamblen, Matt. "Clinton commits 1.46B to fight cyberterrorism." CNN.com. CNN, 1999. Web. 21 Mar 2012.
    http://articles.cnn.com/1999-01-26/tech/9901_26_clinton.idg_1_detection-security-cyberterrorists?_s=PM:TECH
   "ILOVEYOU virus." TechTarget.com. TechTarget, 2012. Web. 21 Mar 2012.
    http://searchsecurity.techtarget.com/definition/ILOVEYOU-virus
   Kleinbard, David. "U.S. catches 'Love' virus." CNN.com. CNNMoney, 2000. Web. 21 Mar 2012.
    http://money.cnn.com/2000/05/05/technology/loveyou/
   Reporter, Staff. "Pentagon Releases Cyberspace Strategy After Hackers Stole 24K Files." IBTimes.com.
    International Business Times, 2011. Web. 21 Mar 2012. http://www.ibtimes.com/articles/180746/20110715/united-
    states-secretary-of-defense-dod-william-lynn-department-of-defense-pentagon-online-security-d.htm
   Shanker, Tom. "Hackers Gained Access to Sensitive Military Files." NYTimes.com. New York Times, 2011. Web.
    21 Mar 2012. http://www.nytimes.com/2011/07/15/world/15cyber.html?_r=1&pagewanted=all
   "Wikileaks suspect believed to have used CD, memory stick to get past Pentagon security."DallasNews.com. The
    Associated Press, 2010. Web. 21 Mar 2012. http://www.dallasnews.com/news/washington/20101130-wikileaks-
    suspect-believed-to-have-used-cd-memory-stick-to-get-past-pentagon-security.ece
   http://www.wired.com/threatlevel/2011/11/anti-hacking-law-too-broad/
   http://www.nytimes.com/2012/01/21/technology/megaupload-indictment-internet-piracy.html?_r=1
   http://www.law.cornell.edu/uscode/text/18/1030
   Trigaux, R.. "A history of hacking." http://www.sptimes.com/Hackers/history.hacking.html. N.p., 2000. Web. 20
    Mar 2012. http://www.sptimes.com/Hackers/history.hacking.html
   IT Security Editors, Top 10 most famous hackers of all time. N.p., 2011. Web. 20 Mar 2012.
    http://www.focus.com/fyi/top-10-most-famous-hackers-all-time/Broad, W. J., J. Markoff, and D. E. Sanger. "Israeli
    Test on Worm Called Crucial in Iran Nuclear Delay." New york times. New York Times, 2011. Web. 20 Mar 2012.
    http://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html?pagewanted=all

Contenu connexe

Tendances

Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber SecuritySazed Salman
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...Qazi Anwar
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for studentsAkhil Nadh PC
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 
Sit presentation
Sit presentationSit presentation
Sit presentationcchoi02
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptxANIKETKUMARSHARMA3
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical HackingDivyank Jindal
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptSHAHID ANSARI
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolschrizjohn896
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical HackingBugRaptors
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
 

Tendances (20)

Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
H A C K I N Gjk,K
H A C K I N Gjk,KH A C K I N Gjk,K
H A C K I N Gjk,K
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Haking PPT
Haking PPTHaking PPT
Haking PPT
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Social engineering
Social engineering Social engineering
Social engineering
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Sit presentation
Sit presentationSit presentation
Sit presentation
 
Hacking
HackingHacking
Hacking
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 

En vedette

Hacking presentation
Hacking presentationHacking presentation
Hacking presentationStevi Edward
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation Ajith Reddy
 
presentation on ethical hacking
 presentation on ethical hacking  presentation on ethical hacking
presentation on ethical hacking Amol Deshmukh
 
Prezi : mode d'emploi
Prezi : mode d'emploiPrezi : mode d'emploi
Prezi : mode d'emploiAureleib
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide Tauhidul islam
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingNitish Kasar
 
Sécurité des systèmes d'information
Sécurité des systèmes d'informationSécurité des systèmes d'information
Sécurité des systèmes d'informationFranck Franchin
 

En vedette (12)

Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
Hacking Techniques
Hacking TechniquesHacking Techniques
Hacking Techniques
 
presentation on ethical hacking
 presentation on ethical hacking  presentation on ethical hacking
presentation on ethical hacking
 
Prezi : mode d'emploi
Prezi : mode d'emploiPrezi : mode d'emploi
Prezi : mode d'emploi
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical Hacking
 
Sécurité des systèmes d'information
Sécurité des systèmes d'informationSécurité des systèmes d'information
Sécurité des systèmes d'information
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Exposé hackers
Exposé hackersExposé hackers
Exposé hackers
 

Similaire à Sit presentation - Hacking

C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
Hacking
HackingHacking
HackingVirus
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywordskhansalman19
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by RudyUdieh Moody
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer CrimesMar Soriano
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackersRoman Antonov
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Umang Patel
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrimeravikanthh
 

Similaire à Sit presentation - Hacking (20)

C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by Rudy
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
Hacking
HackingHacking
Hacking
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Dernier (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Sit presentation - Hacking

  • 1. HACKING Ryan Mauer, Monica Solis, Francis Tienzo, and Mike Wong
  • 2. Hacking: The Basics  The term hacking itself is broad in that it encompasses all forms (i.e. phones, computers, computer systems) of gathering information about another person, usually illegally and for profitable reasons.  http://www.youtube.com/watch?v=uV5u5Nl3bjM
  • 3. Classifications of Hacking  White Hat – an ethical hacker who helps test security systems.  Black Hat – a hacker who breaks into a computer security system for personal gain or malicious intent.  Grey Hat – a mix of the white and black hat, this hacker may break into a computer system, then offer to help the company protect against hackers for a fee.  Elite Hacker – extremely skilled hackers.  Script Kiddie – a non-expert who cracks into a computer system using pre-constructed tools (i.e. another hacker‟s technique) to do so.  Neophyte – also known as a “n00b” or a “newbie” is someone who is new to hacking and knows very little about it.  Hacktivist – a hacker who breaks into websites and reorganizes them with a political, social, or otherwise ideological message.
  • 4. Techniques  Vulnerability Scanner – a tool that scans a computer to see which networks or files are „open‟ to corrupt.  Password cracking – discovering a password by finding old data stored on a computer (can be as simple as guessing a password).  Spoofing attack (Phishing) – falsely advertising to be another website or program, and when downloaded can take personal info.  Social engineering – when a hacker tries to convince a system administrator that he is a user or supervisor who needs assistance gaining access
  • 5. Techniques continued…  Trojan Horses – a program that appears to be doing one thing while really serving another purpose.  Viruses – a self-replicating program that spreads by duplicating copies of itself.  Worms – similar to a virus in that it is a self-replicating program, but it does not have to be opened by the user in order to infect a computer.  Key Loggers – a tool that records each key stroke made so as to retrieve passwords or private data.
  • 6. The History of Hacking: A Timeline 1870s 1960s 1970s 1980s 1990s 2000 First Instance Positive term John Draper, One of the Creation of Microsoft is a of phone for hackers one of the first arrests the National victim of a new hacking develops most famous of the Infrastructur type of hacking exhibited by through phone Milwaukee- e Protection teenagers. MIT‟s hackers, based 414 Center. Chinese artificial nicknamed hackers. hackers claim intelligence “Captain to gain access lab. Crunch” to sensitive sites. YouTube Sesame Street hacking controversy.
  • 7. Notorious “Black Hat” Hackers  Jonathan James: James gained notoriety when he became the first juvenile to be sent to prison for hacking at age 16. Created a backdoor to the department of defense which enabled him to view sensitive emails and capture employee usernames and passwords.  Adrian Lamo: Broke into major organizations like The New York Times and Microsoft. Dubbed the "homeless hacker," he used Internet connections at Kinko's, coffee shops and libraries to do his intrusions so as to remain „untraceable‟.
  • 8. Famous “White Hat” Hackers  Stephen Wozniak: "Woz" is famous for being the "other Steve" of Apple.  Tim Berners-Lee: Berners- Lee is famed as the inventor of the World Wide Web
  • 9. Hacking Today: Stuxnet  A computer worm discovered in June of 2010.  It is the first discovered malware what spies on and subverts industrial systems.  Specifically targeted an Iranian Nuclear Facility.  Brings up the question as to whether the framework will be used for future super viruses. Azerbaijan 2.57%  United States Country Infected computers: 1.56%  Iran 58.85% Pakistan 1.28%  Indonesia 18.22% Others 9.2%
  • 10. Illegality of Hacking  Computer Fraud & Abuse Act – 1984  Put in place to reduce cracking of computer systems (hacking) and to address federal computer-related offenses.  Initially governed only cases with a compelling federal interest  After amendments, many people feel that the law is too broad
  • 11. Illegal Actions under the Act 1. Knowingly accessing a computer without authorization for purposes of obtaining national security data 2. Knowingly and intentionally accessing a computer without authorization in order to gain information from a financial institution, any U.S. department or agency, or any protected computer. 3. Intentionally accessing without authorization a government computer to affect the government‟s use of it. 4. Knowingly accessing a protected computer with the intent to defraud. 5. Knowingly causing the transmission of a program, information, code, or command which leads to damage or accessing a computer without authorization, which leads to significant damages. 6. Knowingly and with the intent to defraud, trafficking a password or similar information through which a computer may be accessed without authorization.
  • 12. CFAA in the News  Violating an internet service provider‟s terms of service agreement is now subject to criminal prosecution.  Cyber bullying – 2008, woman from Missouri charged for leading a teenage girl to commit suicide via MySpace. Guilty verdict thrown out on vagueness of the CFAA  Amendment to pending bill approved by U.S. Senate:  Would limit the interpretation of the CFAA. Would not include violation of a contractual obligation or agreement.  This would protect people for merely violating a contractual agreement with a web site or their ISP from being subject to criminal charges (vs. civil charges)  Criminalized conduct also includes: using a fake name on Facebook, lying about your weight on an online dating profile, etc.
  • 13. Anonymous (Hacking Group)  “Hactivism”  Target mainly institutions, organizations, and government departments that the group protests against.  Aims to spread a message with each attack.  Examples: Department of Justice (after MegaUpload), Colombia‟s Defense Ministry (arrests made by Interpol)
  • 14. Memorable events: US Government & Hacking  1999 – President Clinton passes government computer security initiative  2000 – “I Love You” virus hits the globe  2002 – President Bush creates the Department of Homeland Security.  2005 – NSA illegal wiretapping controversy  2010 – Obama administration ends wiretapping  2010 – Wikileaks controversy  2011- Cyber security legislation goes through Congress  2011 – Foreign hackers steal 24,000 Pentagon files.
  • 15. “I Love You” Virus – May 4, 2000  Email subject line: “I Love You”  Attachment :“LOVE-LETTER-FOR- YOU.TXT.vbs”  Replaced multimedia files with itself  Sent to everyone in Outlook address book  Hit 45 million people in one day  OnelDe Guzman and Reomel Ramones of the Philippines arrested, then released  BEFORE: malware thought of as “urban myth”  AFTER: US signs Council of Europe Cybercrime Treaty to harmonize laws
  • 16. Wikileaks Controversy  Private Bradley Manning  Gave stolen diplomatic memos to WikiLeaks  260,000 files, airstike videos from Iraq and Afghanistan  Replaced music on a Lady Gaga CD with secret files  Reported by hacker friend Adrian Lamo  Charged in Military Court & staying in medium security facility.  Pentagon‟s Response  Disable drives prom accessing data  Restricted use of memory devices  Defense Department installed fraud detection
  • 17. Hackers steal Pentagon files – March 2011  Plans for missile tracking systems, satellite navigation systems, surveillance drones, and jet fighters were taken.  Didn‟t say which data system was hacked and who they suspected.  Other breaches: Lockheed, Martin, RSA Security  New cyber strategy  Tighter defense, collective effort, technological innovation  Military‟s Cyber Command coordinates operations for computer networks.  Incentives Taken:  National data breach reporting, increased penalties, possible military action response, cybersecurity (DoD, DHS, and private sector)
  • 18. Questions:  Do you think that the US government should invest more into preventing hacking?  Do you think cyberspace is a new frontier for possible terrorist attacks? (i.e. Stuxnet)  Have any of you ever been a victim of hacking?  Should the CFAA definition be narrowed to better define what should be punished related to hacking?  What do you think about the concept of hactivism? Are there other channels for
  • 19. Bibliography:  "Bush says he signed NSA wiretap order." CNN.com. CNN, 2005. Web. 21 Mar 2012. http://articles.cnn.com/2005-12-17/politics/bush.nsa_1_wiretaps-constitutional-responsibilities-and-authorities- national-security-agency?_s=PM:POLITICS  Hamblen, Matt. "Clinton commits 1.46B to fight cyberterrorism." CNN.com. CNN, 1999. Web. 21 Mar 2012. http://articles.cnn.com/1999-01-26/tech/9901_26_clinton.idg_1_detection-security-cyberterrorists?_s=PM:TECH  "ILOVEYOU virus." TechTarget.com. TechTarget, 2012. Web. 21 Mar 2012. http://searchsecurity.techtarget.com/definition/ILOVEYOU-virus  Kleinbard, David. "U.S. catches 'Love' virus." CNN.com. CNNMoney, 2000. Web. 21 Mar 2012. http://money.cnn.com/2000/05/05/technology/loveyou/  Reporter, Staff. "Pentagon Releases Cyberspace Strategy After Hackers Stole 24K Files." IBTimes.com. International Business Times, 2011. Web. 21 Mar 2012. http://www.ibtimes.com/articles/180746/20110715/united- states-secretary-of-defense-dod-william-lynn-department-of-defense-pentagon-online-security-d.htm  Shanker, Tom. "Hackers Gained Access to Sensitive Military Files." NYTimes.com. New York Times, 2011. Web. 21 Mar 2012. http://www.nytimes.com/2011/07/15/world/15cyber.html?_r=1&pagewanted=all  "Wikileaks suspect believed to have used CD, memory stick to get past Pentagon security."DallasNews.com. The Associated Press, 2010. Web. 21 Mar 2012. http://www.dallasnews.com/news/washington/20101130-wikileaks- suspect-believed-to-have-used-cd-memory-stick-to-get-past-pentagon-security.ece  http://www.wired.com/threatlevel/2011/11/anti-hacking-law-too-broad/  http://www.nytimes.com/2012/01/21/technology/megaupload-indictment-internet-piracy.html?_r=1  http://www.law.cornell.edu/uscode/text/18/1030  Trigaux, R.. "A history of hacking." http://www.sptimes.com/Hackers/history.hacking.html. N.p., 2000. Web. 20 Mar 2012. http://www.sptimes.com/Hackers/history.hacking.html  IT Security Editors, Top 10 most famous hackers of all time. N.p., 2011. Web. 20 Mar 2012. http://www.focus.com/fyi/top-10-most-famous-hackers-all-time/Broad, W. J., J. Markoff, and D. E. Sanger. "Israeli Test on Worm Called Crucial in Iran Nuclear Delay." New york times. New York Times, 2011. Web. 20 Mar 2012. http://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html?pagewanted=all