Hacking

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 16

HACKING

AREAS

Hacking may refer to:


 Computer security hacking

 Hacking taxicab

 Joke thievery

 Raising a bird of prey (in artificial nest)

 Illegal methods used in football


COMPUTER HACKING
What’s on computers in internet?
• Banking, Taxes, Medical Records, Personal details
• Cookies! Browser History!
• Password file??

How do they get in?


• Viruses/Trojans
• Spyware
• Keyloggers
• Remote Control
TERMINOLOGY USED
 Hacker:
• A proficient computer user
• A computer user engaged in illegal activities
 Cracker:
A computer user engaged in illegal acts.
 Software pirate:
Copies software illegally
 Phreaker:
A telephone services thief
Hackers Have a Subculture!

 Conferences
 Newsletters and news groups
 Fairly close in age (teens to low 20s)
 Shared experiences, shared roots, and
shared values
 Own myths, heroes, villains, folk epics, in-
jokes, taboos, and dreams!
HACKER GOALS
 Corporate  Databases
espionage
 Info warfare
 Software theft
 Web site defacing  Hacktivism
 ISPs  Computer time
• DDOS  Theft of intellectual
• Access
property
 Credit cards
• Riding the Bullet
 Computer control
• Home computers
• Business
Two Reputed Types to Exist
“White Hats” “Black Hats”
 Refrain from
Malicious
damage
 Help to fix/patch
Release viruses,
security problems exploit security
 Report “black holes
hats” Steal assets
 Free testing and
“Gain root”
security
assurance.
WHO IS HACKER?
Hacker(computer intruder) is a person who
delights in having an intimate understanding of the
internal workings of a system, computers and
computer networks in particular.
 Script Kiddie

 Black hat hacker

 White hat hacker

 Grey hat hacker

 Blue hat hacker

 Academic hacker
HACKER HISTORY

 First appeared at 1960s


 Hacking done mostly for fun
 Hackers started speaking to each other via
the ARPANET
 A worldwide hackers’ community
RECENT ATTACKS AND HACKS
 Hackers changed a Department of Justice
web site to display a swastika and the text
to read, “the U. S. Department of
Injustice.”
 “Coolio” (?) shut down e-commerce sites
by bombarding them with thousands of
DOS messages
 Titan Rain and Moonlight Maze attacks on
American computer systems.
CORPORATE HACKING
 For a report, employees of CNET, Inc.
broke into web sites for Booksite and
Upside and obtained:
• Credit card lists
• E-mail lists
• Subscribers
 Published an article after security was
fixed
 Appropriate for demonstration purposes?
STUDIES
 The Pentagon estimates that 65% of its
30,000 computers can be hacked
• Is attacked 1,000 times a day
 95% of all attacks are successful!
 5% are detected
 .025% are reported up the chain
COMMERCIAL STUDIES

 Intrusion Detection, Inc. study of Fortune


1000 companies
• 23% of users did not have passwords or had
guessable passwords
• 14% of accounts were inactive
• 27% of sites had first line security detection
systems turned off
COMMERCIAL STUDIES
 National Computer Security Ass’n
• A consultant was asked to study security
problems at a large company
• In three days, he acquired 300 MB of sensitive
data
• Simply asked executives about the company,
web searches
SOLUTIONS
• Never click on links from unknown senders
• Practice safe browsing
• Use good passwords!
• Never do sensitive transactions on Library,
Hotel, and other unknown PCs
• Don’t make your Laptop be an AP (No Ad-
Hoc!)
• Secure your wireless – Encrypt! Address
Filter!
• Make sure you’re on the right network!
• Backup your data – Securely!
ISSUES

 Are current laws adequate to Cyberspace?


 Are hackers to be thanked or punished?
 Should the acquisition and distribution of
information that disrupts others be illegal?
 How much surveillance is too much?

You might also like