computer hacking cybercrime (1). table of contents what is computer hacking? types of computer...
TRANSCRIPT
![Page 1: COMPUTER HACKING Cybercrime (1). Table of Contents What is Computer Hacking? Types of Computer Hackers](https://reader033.vdocuments.mx/reader033/viewer/2022050809/56649da25503460f94a8e90c/html5/thumbnails/1.jpg)
COMPUTER HACKING
Cybercrime
(1)
![Page 2: COMPUTER HACKING Cybercrime (1). Table of Contents What is Computer Hacking? Types of Computer Hackers](https://reader033.vdocuments.mx/reader033/viewer/2022050809/56649da25503460f94a8e90c/html5/thumbnails/2.jpg)
Table of ContentsWhat is Computer Hacking?Types of Computer Hackers
![Page 3: COMPUTER HACKING Cybercrime (1). Table of Contents What is Computer Hacking? Types of Computer Hackers](https://reader033.vdocuments.mx/reader033/viewer/2022050809/56649da25503460f94a8e90c/html5/thumbnails/3.jpg)
What is Computer Hacking?
OriginsMotivationConsequencesMajor CrimesEthical Stands
(2)
![Page 4: COMPUTER HACKING Cybercrime (1). Table of Contents What is Computer Hacking? Types of Computer Hackers](https://reader033.vdocuments.mx/reader033/viewer/2022050809/56649da25503460f94a8e90c/html5/thumbnails/4.jpg)
Computer Hacking - History
1960 MIT (Massachusetts Institute of Technology)
Tools & Hackers Tools (nerdy student) Hackers (lazy student)
Personal Computer Telephone Systems – Phreak Software – Crackers
![Page 5: COMPUTER HACKING Cybercrime (1). Table of Contents What is Computer Hacking? Types of Computer Hackers](https://reader033.vdocuments.mx/reader033/viewer/2022050809/56649da25503460f94a8e90c/html5/thumbnails/5.jpg)
Computer Hacking - Motivation
Imaginative pursue – Hobbyists (modifications of electronic hardware)
Financial means – Job & Crime
Hackers vs. Crackers
![Page 6: COMPUTER HACKING Cybercrime (1). Table of Contents What is Computer Hacking? Types of Computer Hackers](https://reader033.vdocuments.mx/reader033/viewer/2022050809/56649da25503460f94a8e90c/html5/thumbnails/6.jpg)
Computer Hacking - Consequences Unauthorized use of a
computer or networkKevin Mitnick (Sentencing
depending on the seriousness of the offence)
Little to no-time served(3)
![Page 7: COMPUTER HACKING Cybercrime (1). Table of Contents What is Computer Hacking? Types of Computer Hackers](https://reader033.vdocuments.mx/reader033/viewer/2022050809/56649da25503460f94a8e90c/html5/thumbnails/7.jpg)
Computer Hacking – Major Crimes
Adrian Lamo (New York 2003) Unauthorized access to a
computer and possession of illegal stolen access devices
Kevin Mitnick Most wanted computer
criminal (U.S) 1979 Unauthorized access
(age 16) Valuable info/ (Cellular
telephone and computer companies, computer passwords)
![Page 8: COMPUTER HACKING Cybercrime (1). Table of Contents What is Computer Hacking? Types of Computer Hackers](https://reader033.vdocuments.mx/reader033/viewer/2022050809/56649da25503460f94a8e90c/html5/thumbnails/8.jpg)
Computer Hacking – Ethical StandsHacker ethics (Whether
they can do it or not?)When they can do it would
they go further?Hackers and Crackers
(4)
![Page 9: COMPUTER HACKING Cybercrime (1). Table of Contents What is Computer Hacking? Types of Computer Hackers](https://reader033.vdocuments.mx/reader033/viewer/2022050809/56649da25503460f94a8e90c/html5/thumbnails/9.jpg)
Types of Computer HackersAttitudes
Methods
(5)
![Page 10: COMPUTER HACKING Cybercrime (1). Table of Contents What is Computer Hacking? Types of Computer Hackers](https://reader033.vdocuments.mx/reader033/viewer/2022050809/56649da25503460f94a8e90c/html5/thumbnails/10.jpg)
Types of Computer Hackers - Attitudes
White Hat Non-malicious reasons, enjoy learning
(ex. testing their own security system) Grey Hat
Beyond the point of a malicious intend Black Hat/Cracker
Malicious reasons, uses technology for a wrong end, linked to illegal activity
Script kiddie Non-expert, uses automated tools by
other creators Hacktivist
Defends ideological, religious or political means
![Page 11: COMPUTER HACKING Cybercrime (1). Table of Contents What is Computer Hacking? Types of Computer Hackers](https://reader033.vdocuments.mx/reader033/viewer/2022050809/56649da25503460f94a8e90c/html5/thumbnails/11.jpg)
Types of Computer Hackers - Methods
Network enumeration Discovering information about
the intended target.Vulnerability analysis
Test the system.Exploitation
Exploit vulnerabilities on the system.
Accessing Tools Social engineering, Virus,
Trojans, Worms, Key Loggers, etc.
(6)
![Page 12: COMPUTER HACKING Cybercrime (1). Table of Contents What is Computer Hacking? Types of Computer Hackers](https://reader033.vdocuments.mx/reader033/viewer/2022050809/56649da25503460f94a8e90c/html5/thumbnails/12.jpg)
Summary & Conclusion
Computer hacking was once an apt crime for a person whose computer skills exceeded others’. Now computer hacking could be performed by anybody that knows how to use the internet. Furthermore this crime is one of the hardest to detect, because the criminals do not leave any mark behind.
![Page 13: COMPUTER HACKING Cybercrime (1). Table of Contents What is Computer Hacking? Types of Computer Hackers](https://reader033.vdocuments.mx/reader033/viewer/2022050809/56649da25503460f94a8e90c/html5/thumbnails/13.jpg)
References
http://www.britannica.com/blogs/2009/02/cybercrime-on-the-rise/ (1)
http://miklasnjor.com/en/2009/photography/illustration/computer-hacking-id-theft-common/ (2)
http://www.orkut-scrapping.com/Computer-Humor-14/default.aspx (3)
http://www.teentechguru.com/password-and-network-hacking-tools/ (4)
http://www.clipartguide.com/_pages/0511-0906-2321-1306.html (5)
http://www.voipcentral.org/entry/pc-hacking-though-voip-is-possible/ (6)