cybercrime (computer hacking)

14
CYBERCRIME Computer Hacking By Esteban Valencia & Michael Asres April 7 th , 2010 (1)

Upload: esteban

Post on 18-Nov-2014

11.453 views

Category:

Education


1 download

DESCRIPTION

Slideshow presentation

TRANSCRIPT

Page 1: Cybercrime (Computer Hacking)

CYBERCRIMEComputer HackingBy Esteban Valencia & Michael AsresApril 7th, 2010

(1)

Page 2: Cybercrime (Computer Hacking)

Table of Contents

What is Computer Hacking?

Types of Computer Hackers

Page 3: Cybercrime (Computer Hacking)

Origins Motivation Consequences Major Crimes Ethical Stands

What is Computer Hacking?

(2)

Page 4: Cybercrime (Computer Hacking)

Computer Hacking - History

1960 MIT (Massachusetts Institute of Technology)

Tools & Hackers Tools (nerdy student) Hackers (lazy student)

Personal Computer Telephone Systems –

Phreak Software – Crackers

Page 5: Cybercrime (Computer Hacking)

Computer Hacking - Motivation

Imaginative pursue – Hobbyists (modifications of electronic hardware)

Financial means – Job & Crime

Hackers vs. Crackers

Page 6: Cybercrime (Computer Hacking)

Computer Hacking - Consequences Unauthorized use of a

computer or network Kevin Mitnick

(Sentencing depending on the seriousness of the offence)

Little to no-time served

(3)

Page 7: Cybercrime (Computer Hacking)

Computer Hacking – Major Crimes Adrian Lamo (New York

2003) Unauthorized access to a

computer and possession of illegal stolen access devices

Kevin Mitnick Most wanted computer

criminal (U.S) 1979 Unauthorized access

(age 16) Valuable info/ (Cellular

telephone and computer companies, computer passwords)

Page 8: Cybercrime (Computer Hacking)

Computer Hacking – Ethical Stands Hacker ethics (Whether

they can do it or not?) When they can do it

would they go further? Hackers and Crackers

(4)

Page 9: Cybercrime (Computer Hacking)

Types of Computer Hackers

Attitudes Methods

(5)

Page 10: Cybercrime (Computer Hacking)

Types of Computer Hackers - Attitudes

White Hat Non-malicious reasons, enjoy learning

(ex. testing their own security system) Grey Hat

Beyond the point of a malicious intend Black Hat/Cracker

Malicious reasons, uses technology for a wrong end, linked to illegal activity

Script kiddie Non-expert, uses automated tools by

other creators Hacktivist

Defends ideological, religious or political means

Page 11: Cybercrime (Computer Hacking)

Types of Computer Hackers - Methods Network enumeration

Discovering information about the intended target.

Vulnerability analysis Test the system.

Exploitation Exploit vulnerabilities on the

system. Accessing Tools

Social engineering, Virus, Trojans, Worms, Key Loggers, etc.

(6)

Page 12: Cybercrime (Computer Hacking)

Summary & Conclusion

Computer hacking was once an apt crime for a person whose computer skills exceeded others’. Now computer hacking could be performed by anybody that knows how to use the internet. Furthermore this crime is one of the hardest to detect, because the criminals do not leave any mark behind.

Page 14: Cybercrime (Computer Hacking)

Thank you.

Are there any questions?