1 computer crime web warriors – cbc documentary link to video

Post on 02-Jan-2016

216 Views

Category:

Documents

2 Downloads

Preview:

Click to see full reader

TRANSCRIPT

1

Computer Crime

Web Warriors – CBC Documentary

Link to videohttp://www.youtube.com/watch?v=34cwMz3HZ8Q

Computer Crime Lesson Plan

1. Web Warriors Video (First 10 minutes)

2. Discuss Video or write Summary (Slides 3-5)

3. Continue Web Warriors Video (Skip to 15:40 mark about Mafia Boy)

4. Discuss and take notes about Mafia Boy (Slides 6-9)

5. Skip to other sections of video. Time is listed on slides (Slides 10-15)

6. Discuss or take notes about Cyber Warfare

7. Students Complete the Articles and Questions (Slides 25-28)

8. Students search for the Computer Crime Definitions (Slide 29)

9. Top Hacker Shows Us How Its Done video. Discuss with students. (Slide 16-17)

Note: There are many other ways you may wish to deliver the material in this presentation.

2

Blaster Worm

3

1-10 minutes into film

No specific target

In the past, you had to open an attachment file to receive a virus

Our most critical systems are connected to the internet through Microsoft software

Self Activating

Blaster Worm can infect your computer simply by being on-line

3 Types of Hackers

4

The internet was not set-up to be secureIt was meant to share information between computers

White HatsThe Good GuysThe IT people

Black HatsBad Guys

Crooks that try to steal your credit card

number etc. Grey HatsWork both sides of

the streetCan be bought for

hire

White Hats

BlackHats

GreyHats

Types ofHackers

5

Donnie – The Hacker

•Donnie hacked into India’s critical infrastructure•Within 5 minutes, he hacked into a major airline•DEFCON, the largest internet convention•The FBI go to DEFCON to learn about the newest hacking strategies

6

MafiaBoyThis segment of the video starts at 15:40

7

Mafiaboy•Mafiaboy’s real name is Michael Calce•He was just 15 years old when he committed computer crime•Michael took down big companies like CNN, Yahoo and eBay•He sent a Denial of Service attack against the companies

8

• The newest type of computer virus is called Storm Worm• It is always changing. Every time you disconnect you get

a different copy• China and Russia are particularly bad for creating viruses• Warfare between countries involves sending viruses to

attack banks and government offices

9

Denial of Service Attack1.Describe what happens during a denial of service attack•The hacker gains access to many large university computers•Harness that power by sending many requests to a company such as yahoo.com•The website can not handle all of those requests and it crashes

10

Russia 32-35 minutes into film•Russia - the country of hacking•The internet allowed the Russian mob to go global•At the beginning of 2007, since the start of the internet, there were 250,000 viruses•In 1 year, during 2007, it went from 250,000 viruses to 500,000 viruses

11

WoodPeckers and Storm Worm 36 minutes into film•Woodpeckers – hammer keyboards very fast, trying to eliminate viruses

•Storm Worm, newest type of virus appears •No one knows its purpose•Doesn’t destroy anything – yet•It’s always changing•Every time you download it, you get a different copy

12

Storm Worm – continued…•Turns a computer into a Zombie•The author of the virus can control your computer remotely•They harness they power of all the zombie computers together creating a Botnet

13

Cyber Warfare Between Nations

•Estonia is one of the most wired countries on earth•78% of the people bank on-line•Within minutes hackers shut down their banks•Many believe the attacks were politically motivated from Russia

China

14

Warfare Hacking

Recruiting Conclusion

‣The Chinese military is recruiting Hackers

‣Why?

Internet

‣They are using the internet rather than tanks

‣How can the internet be used to attack a country?

‣China is the country “we are most worried about.”

15

Cyber Warfare Between NationsInformation warfareThe use of information technologies to corrupt or destroy an enemy’s information and industrial infrastructure Network WarfareHacker-like attacks on the nation’s network infrastructure, including the electronic banking system Structural SabatogeAttacks on information systems that support transportation, finance, energy and telecommunications 

Hacker Video

Top Hacker Shows Us How Its Done

Pablos Holman at TEDxMidwest

http://www.youtube.com/watch?v=hqKafI7Amd8

This is a really interesting video…

Note: Depending on the age range of your students – this may or may not be appropriate. Please watch before showing this video

16

Hacker Video

‣ Hotel Television – Control your TV or other people’s hotel room TV’s

‣ Hacker Bot – Drives around and finds Wifi user information

‣ MySpace – added javascript to add 1 million friends in 24 hours

‣ Vehicles are now PC’s

‣ Now using technology to fight Malaria by zapping mosquitos

Summary Points

17

Code Wars Video

America’s Cyber Threat

Link to videohttp://www.cnbc.com/id/42210831

Cyber Wars

• Cyber Security’s definition is constantly evolving/changing.

• It always relates to the protection of computers and the information stored on them.

• Since networks are constantly expanding, it’s hard to combat cyber crime.

Cyber Wars

•McAfee is a provider of security products and services that help secure systems and networks. •Current customers of internet security include: the National Security Agency, the Department of Defence and other federal defence and law enforcement agencies.

Cyber Wars

• The global security company, Lockheed Martin, is principally engaged in the research, design and development of advanced technology systems.

• They also provide a broad range of management, engineering, technical, scientific and information services.

The Country of Estonia

• Estonia, a country known for its Internet connectivity, was assaulted by the first ever cyber attack against a nation in 2007.

• 99% of their Financial Transactions are done on-line.

• Government and financial services were shut down during the cyber attack.

Questions

1. Where is Estonia? (do an internet search)2. Find some statistics about Estonia. How many

people live there? Main industry? Geographic size? Etc. (6 points)

3. Search the key words estonia cyber war in order to discover more details of what happened during the cyber attack we just discussed. (find 10 points)

Go to www.mylookout.comClick on Features• Security and Privacy. Read and summarize with 3

bullet points.• Backup. Read and summarize with 3 bullet points.• Missing Device. Read and summarize with 3 bullet

points.• Management. Read and summarize with 3 bullet

points.

25

How Hackers Stole $45 Million in 2 Days

1. Describe Phase 12. Describe Phase 23. Describe Phase 34. How could this have been prevented? (Outline the 3 ways)Link to articlehttp://mashable.com/2013/05/25/45-million-stolen/

5 Biggest Computer Viruses of All Time

• What are the names of the 5 viruses?• Click on each virus and describe…

1.What was it2.How it worked3.How it spread

Link to interactive infographichttp://mashable.com/2013/11/20/5-biggest-computer-viruses-all-time/

27

Microsoft and FBI Take Down Global Cyber Crime Ring

1. How much damage did the Botnet cause?2. Where do they think the hackers reside?3. Do they know who is responsible for creating this Botnet?4. How has the Citadel malware spread?5. Where are botnets mainly located?

Link to articlehttp://mashable.com/2013/06/06/microsoft-fbi-botnets/

Snapsave vs. Snapsaved

‣ You own Snapsave.com. Snapsaved.com appears to have been maliciously saving the users’ login details and storing the photos and videos that were posted. How do you save the image of your company –Snapsave.com?

Link to article

http://www.theguardian.com/technology/2014/oct/12/teenagers-snapchat-images-leaked-internet

29

Computer Crime DefinitionsLook up these definitions using the website below and/or a Google searchhttp://www.pcmag.com/encyclopedia/term/48464/open-port

1.Virus 2.Trojan Horse3.Spyware4.Logic Bomb5.Worm6.Trap Doors7.Pumping and Dumping8.Phishing9.Packet Sniffer10.Dumpster Diving11.Salami Shaving12.Data Diddling13.Encryption14.Firewall

30

Computer Crime Definitions (14)Virus - A virus is a nasty program that resides and infects the computer. The program may be triggered at any time, where it may take over the computer, re-direct internet traffic, use your computer to flood out spam messages. The virus attaches itself to other programs and soon infects much or all of the software on a computer.

Trojan Horse - A Trojan horse looks like something helpful and then when opened it turns out it gives you instructions for a destructive task instead.It can erase data or cause irreparable damage.

Spyware - Spyware refers to a program or technique that monitors what you do on the internet. The reasoning is advertising. By knowing what you do on the internet, information obtained about you can be sold to advertisers who then target ads your way.

31

Logic Bomb - Designed to sit harmlessly on a system until a certain event or set of circumstances cause the program to become active.

Worm - A worm is simply a virus that replicates itself, by sending out copies to other people.

Trap Doors - Security holesEmployees might destroy data or even trade company secrets to competitors using these security holes.

Pumping and DumpingCrooks use Internet stock trading sites or chat rooms to praise useless companies in which they hold stock. Once the share prices go up they take their profits and dump the stocks.

Phishing - A web page that is designed to fool you into thinking it’s something else, such as your bank’s web page. The idea is to fish for information, such as account numbers and passwords. The web page tricks you into providing that information because it looks legitimate.

32

Packet Sniffer - A program that examines all the traffic on a section of network.

Dumpster Diving - Intruders go through an organizations trash in the hope of finding documents.

Salami Shaving – a programmer alters a program so that it subtracts a very small amount of money from each account.

Data Diddling – insiders modify data so that it’s difficult or impossible to tell that they’ve stolen funds or equipment.

Encryption – Takes the original data and scrambles it through the use of a key.

Firewall – a properly configured firewall permits an organization’s internal computer users to access the external internet, while placing severe limits on the ability of outsiders to access internal data.

Bibliography

1. CBC documentary. Web Warriors. Youtube video. Feb 18, 2012.

2. Lee, Melissa. Code Wars. CNBC.com video.3. Larson, Eric. How Hackers Stole 45 Million. Mashable.com.

May 26, 2013. 4. Pfaffenberger, Bryan and Bill Daley. Computers in your

future. Prentice Hall. 2004.5. Franc Eschi-Bicchierai, Lorenzo. Microsoft and FBI Take

Down Global Cyber Crime Ring. Mashable.com. June 6, 2013.

Link to storehttp://www.teacherspayteachers.com/Store/Gavin-Middleton

Thank you for purchasing this PowerPoint• I hope that you and your students enjoyed it!• If you provide Positive Feedback and Follow Me, I will send you a Free

Lesson of your choice ($4 or less value).• E-mail me at gavin@eastdalebusiness.com to receive your free

PowerPoint.

• Could you please let me know how you discovered my store in your email…

Teachers Pay Teachers Search Google Search Flyer Mailed To My School TPT Newsletter (December 2012) Other (please specify)

To view or purchase more materials here is a link to my storewww.teacherspayteachers.com/store/gavin-middleton

top related