Post on 09-Apr-2018
transcript
8/8/2019 Cyber Crime Computer Hacking
http://slidepdf.com/reader/full/cyber-crime-computer-hacking 1/14
CYBERCRIME
Computer HackingBy Esteban Valencia & Michael Asres
April 7th, 2010
(1)
8/8/2019 Cyber Crime Computer Hacking
http://slidepdf.com/reader/full/cyber-crime-computer-hacking 2/14
Table of Contents
What is Computer Hacking?
Types of Computer Hackers
8/8/2019 Cyber Crime Computer Hacking
http://slidepdf.com/reader/full/cyber-crime-computer-hacking 3/14
Origins
Motivation
Consequences
Major Crimes
Ethical Stands
What is Computer Hacking?
(2)
8/8/2019 Cyber Crime Computer Hacking
http://slidepdf.com/reader/full/cyber-crime-computer-hacking 4/14
Computer Hacking - History
1960 MIT (Massachusetts
Institute of Technology)
Tools & Hackers
Tools (nerdy student)
Hackers (lazy student)
Personal Computer
Telephone Systems Phreak
Software Crackers
8/8/2019 Cyber Crime Computer Hacking
http://slidepdf.com/reader/full/cyber-crime-computer-hacking 5/14
Computer Hacking - Motivation
Imaginative pursue
Hobbyists (modifications of
electronic hardware)
Financial means Job &Crime
Hackers vs. Crackers
8/8/2019 Cyber Crime Computer Hacking
http://slidepdf.com/reader/full/cyber-crime-computer-hacking 6/14
Computer Hacking - Consequences
Unauthorized use of a
computer or network
Kevin Mitnick (Sentencingdepending on the
seriousness of the offence)
Little to no-time served (3)
8/8/2019 Cyber Crime Computer Hacking
http://slidepdf.com/reader/full/cyber-crime-computer-hacking 7/14
Computer Hacking Major Crimes
Adrian Lamo (New York 2003) Unauthorized access to a
computer and possession of illegal stolen access devices
Kevin Mitnick Most wanted computer criminal
(U.S) 1979Unauthorized access (age
16) Valuable info/ (Cellular telephone
and computer companies,computer passwords)
8/8/2019 Cyber Crime Computer Hacking
http://slidepdf.com/reader/full/cyber-crime-computer-hacking 8/14
Computer Hacking Ethical Stands
Hacker ethics (Whether they
can do it or not?)
When they can do it would
they go further?
Hackers and Crackers
(4)
8/8/2019 Cyber Crime Computer Hacking
http://slidepdf.com/reader/full/cyber-crime-computer-hacking 9/14
Types of Computer Hackers
Attitudes
Methods
(5)
8/8/2019 Cyber Crime Computer Hacking
http://slidepdf.com/reader/full/cyber-crime-computer-hacking 10/14
Types of Computer Hackers -
Attitudes White Hat
Non-malicious reasons, enjoy learning(ex. testing their own security system)
Grey Hat Beyond the point of a malicious intend
Black Hat/Cracker Malicious reasons, uses technology for a
wrong end, linked to illegal activity
Script kiddie Non-expert, uses automated tools by
other creators
Hacktivist Defends ideological, religious or political
means
8/8/2019 Cyber Crime Computer Hacking
http://slidepdf.com/reader/full/cyber-crime-computer-hacking 11/14
Types of Computer Hackers -
Methods Network enumeration
Discovering information about theintended target.
Vulnerability analysis
Test the system.
Exploitation
Exploit vulnerabilities on thesystem.
Accessing Tools
Social engineering, Virus, Trojans,Worms, Key Loggers, etc.
(6)
8/8/2019 Cyber Crime Computer Hacking
http://slidepdf.com/reader/full/cyber-crime-computer-hacking 12/14
Summary & Conclusion
Computer hacking was once an apt crime for
a person whose computer skills exceeded
others. Now computer hacking could beperformed by anybody that knows how to
use the internet. Furthermore this crime is
one of the hardest to detect, because the
criminals do not leave any mark behind.
8/8/2019 Cyber Crime Computer Hacking
http://slidepdf.com/reader/full/cyber-crime-computer-hacking 13/14
References
http://www.britannica.com/blogs/2009/02/cybercrime-on-the-rise/ (1)
http://miklasnjor.com/en/2009/photography/illustration/
computer-hacking-id-theft-common/ (2)
http://www.orkut-scrapping.com/Computer-Humor-14/default.aspx (3)
http://www.teentechguru.com/password-and-network-hacking-tools/ (4)
http://www.clipartguide.com/_pages/0511-0906-2321-1306.html (5)
http://www.voipcentral.org/entry/pc-hacking-though-voip-is-possible/ (6)
8/8/2019 Cyber Crime Computer Hacking
http://slidepdf.com/reader/full/cyber-crime-computer-hacking 14/14
Thank you.
Are there any questions?