cyber crime computer hacking

14
8/8/2019 Cyber Crime Computer Hacking http://slidepdf.com/reader/full/cyber-crime-computer-hacking 1/14 CYBERCRIME Computer Hacking By Esteban Valencia & Michael Asres April 7 th , 2010 (1)

Upload: sara-junio

Post on 09-Apr-2018

237 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Cyber Crime Computer Hacking

8/8/2019 Cyber Crime Computer Hacking

http://slidepdf.com/reader/full/cyber-crime-computer-hacking 1/14

CYBERCRIME

Computer HackingBy Esteban Valencia & Michael Asres

April 7th, 2010

(1)

Page 2: Cyber Crime Computer Hacking

8/8/2019 Cyber Crime Computer Hacking

http://slidepdf.com/reader/full/cyber-crime-computer-hacking 2/14

Table of Contents

What is Computer Hacking?

Types of Computer Hackers

Page 3: Cyber Crime Computer Hacking

8/8/2019 Cyber Crime Computer Hacking

http://slidepdf.com/reader/full/cyber-crime-computer-hacking 3/14

Origins

Motivation

Consequences

Major Crimes

Ethical Stands

What is Computer Hacking?

(2)

Page 4: Cyber Crime Computer Hacking

8/8/2019 Cyber Crime Computer Hacking

http://slidepdf.com/reader/full/cyber-crime-computer-hacking 4/14

Computer Hacking - History

1960 MIT (Massachusetts

Institute of Technology)

Tools & Hackers

Tools (nerdy student)

Hackers (lazy student)

Personal Computer

Telephone Systems Phreak

Software Crackers

Page 5: Cyber Crime Computer Hacking

8/8/2019 Cyber Crime Computer Hacking

http://slidepdf.com/reader/full/cyber-crime-computer-hacking 5/14

Computer Hacking - Motivation

Imaginative pursue

Hobbyists (modifications of 

electronic hardware)

Financial means Job &Crime

Hackers vs. Crackers

Page 6: Cyber Crime Computer Hacking

8/8/2019 Cyber Crime Computer Hacking

http://slidepdf.com/reader/full/cyber-crime-computer-hacking 6/14

Computer Hacking - Consequences

Unauthorized use of a

computer or network

Kevin Mitnick (Sentencingdepending on the

seriousness of the offence)

Little to no-time served (3)

Page 7: Cyber Crime Computer Hacking

8/8/2019 Cyber Crime Computer Hacking

http://slidepdf.com/reader/full/cyber-crime-computer-hacking 7/14

Computer Hacking Major Crimes

Adrian Lamo (New York 2003) Unauthorized access to a

computer and possession of illegal stolen access devices

Kevin Mitnick Most wanted computer criminal

(U.S) 1979Unauthorized access (age

16) Valuable info/ (Cellular telephone

and computer companies,computer passwords)

Page 8: Cyber Crime Computer Hacking

8/8/2019 Cyber Crime Computer Hacking

http://slidepdf.com/reader/full/cyber-crime-computer-hacking 8/14

Computer Hacking Ethical Stands

Hacker ethics (Whether they

can do it or not?)

When they can do it would

they go further?

Hackers and Crackers

(4)

Page 9: Cyber Crime Computer Hacking

8/8/2019 Cyber Crime Computer Hacking

http://slidepdf.com/reader/full/cyber-crime-computer-hacking 9/14

Types of Computer Hackers

Attitudes

Methods

(5)

Page 10: Cyber Crime Computer Hacking

8/8/2019 Cyber Crime Computer Hacking

http://slidepdf.com/reader/full/cyber-crime-computer-hacking 10/14

Types of Computer Hackers -

Attitudes White Hat

Non-malicious reasons, enjoy learning(ex. testing their own security system)

Grey Hat Beyond the point of a malicious intend

Black Hat/Cracker Malicious reasons, uses technology for a

wrong end, linked to illegal activity

Script kiddie Non-expert, uses automated tools by

other creators

Hacktivist Defends ideological, religious or political

means

Page 11: Cyber Crime Computer Hacking

8/8/2019 Cyber Crime Computer Hacking

http://slidepdf.com/reader/full/cyber-crime-computer-hacking 11/14

Types of Computer Hackers -

Methods Network enumeration

Discovering information about theintended target.

Vulnerability analysis

Test the system.

Exploitation

Exploit vulnerabilities on thesystem.

Accessing Tools

Social engineering, Virus, Trojans,Worms, Key Loggers, etc.

(6)

Page 12: Cyber Crime Computer Hacking

8/8/2019 Cyber Crime Computer Hacking

http://slidepdf.com/reader/full/cyber-crime-computer-hacking 12/14

Summary & Conclusion

Computer hacking was once an apt crime for

a person whose computer skills exceeded

others. Now computer hacking could beperformed by anybody that knows how to

use the internet. Furthermore this crime is

one of the hardest to detect, because the

criminals do not leave any mark behind.

Page 13: Cyber Crime Computer Hacking

8/8/2019 Cyber Crime Computer Hacking

http://slidepdf.com/reader/full/cyber-crime-computer-hacking 13/14

References

http://www.britannica.com/blogs/2009/02/cybercrime-on-the-rise/ (1)

http://miklasnjor.com/en/2009/photography/illustration/

computer-hacking-id-theft-common/ (2)

http://www.orkut-scrapping.com/Computer-Humor-14/default.aspx (3)

http://www.teentechguru.com/password-and-network-hacking-tools/ (4)

http://www.clipartguide.com/_pages/0511-0906-2321-1306.html (5)

http://www.voipcentral.org/entry/pc-hacking-though-voip-is-possible/ (6)

Page 14: Cyber Crime Computer Hacking

8/8/2019 Cyber Crime Computer Hacking

http://slidepdf.com/reader/full/cyber-crime-computer-hacking 14/14

Thank you.

Are there any questions?