logging in or signing up Computer hacking Essan Download Post to : URL : Related Presentations : Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Uploaded from authorPOINT lite Insert YouTube videos in PowerPont slides with aS Desktop Copy embed code: Embed: Flash iPad Dynamic Copy Does not support media & animations Automatically changes to Flash or non-Flash embed WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 773 Category: Science & Tech.. License: All Rights Reserved Like it (1) Dislike it (0) Added: March 06, 2011 This Presentation is Public Favorites: 2 Presentation Description No description available. Comments Posting comment... Premium member Presentation Transcript Computer Hacking: Computer Hacking By;- Iffat Aafreen-41, Sumit Agarwal-47, Gourab Mitra-52What is Cyber Crime?: What is Cyber Crime? “He Uses Technology As His Weapon” It Is A Criminal Activity Committed On The Internet . A Generalized Definition Of Cyber Crime May Be “Unlawful Acts Wherein The Computer Is Either A Tool Or Target Or Both” . Cyber crime offenses against the information technology infrastructure. Such conducts includes: Illegal access Illegal interception System interference Data interference Misuse of devices Fraud ForgerySlide 3: Hacking Email bombing Data diddling Salami attacks Denial of Service attack Virus / worm attacks Logic bombs Web jacking Types of Cyber CrimeSlide 4: The Invisible Criminals Are Dangerous Than The Visible One… What is HACKING Hacking: Hacking Unauthorized use of computer and network resources. “Hacker” originally meant a very gifted programmer. Hacking is a felony in the US and most other countries. When it is done by request and under a contract between an ethical hacker and an organization, it is OK! The difference is that the ethical hacker has authorization to probe the target. “The number of really gifted hackers in the world is very small, but there are lots of wannabes…”(-Dr. Charles C. Palmer, IBM)Who are Hackers?: Who are Hackers? A school definition for the term hacker. Is someone who never goes to class, who in fact sleeps all day, and who spends the night pursuing recreational activities rather than studying. There are at least two common interpretations: Someone who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers Someone who is both knowledgeable and skilled at computer programming, and who is a member of the hacker subculture, one with it’s own philosophy and code of ethicsHistory of Hackers: History of HackersWhat Do Hackers Do?: What Do Hackers Do? System Access confidential information Threaten someone from YOUR computer Broadcast your confidential letters or materials Store illegal or espionage material Network Eavesdrop and replay Imposer: server / client Modify data / stream Denial-of-ServiceTypes of Hackers: Professional hackers Black Hats – the Bad Guys White Hats – Professional Security Experts Underemployed Adult Hackers Former Script Kiddies Can’t get employment in the field Want recognition in hacker community Ideological Hackers hack as a mechanism to promote some political or ideological purpose Usually coincide with political events Criminal Hackers Real criminals, are in it for whatever they can get no matter who it hurts Disgruntled Employees Most dangerous to an enterprise as they are “insiders” Since many companies subcontract their network services a disgruntled vendor could be very dangerous to the host enterprise Types of HackersIs Computer Hacking a Crime???: Computer hacking is broadly defined as any action that results in unauthorized interference with a computer, computer system or network. Computer hacking includes breaking into a computer with the intent to steal, damage, modify or monitor data or settings within the system. Significance Computer hacking is considered a crime in all countries; it is also a crime under federal and international law. Because a computer may be accessed from anywhere, a person may be charged with computer hacking on the state, federal and international level. Types Hacking often involves more than just unauthorized access to a computer. Computer hackers may access a computer in order to: steal financial information such as credit card access numbers; steal personal information (identity theft); harass (swatting); vandalize; gain access to other computers; launch computer attacks; or place malicious software (malware). Is Computer Hacking a Crime???Slide 12: Use anti-virus software and firewalls - keep them up to date Keep your operating system up to date with critical security updates and patches Don't open emails or attachments from unknown sources Use hard-to-guess passwords . Don’t use words found in a dictionary. Remember that password cracking tools exist Don't share access to your computers with strangers Back-up your computer data on disks or CDs often If you have a Wi-Fi network, password protect it Disconnect from the Internet when not in use Reevaluate your security on a regular basis Protect your ComputersLaws, Fines, and Penalties: Laws, Fines, and Penalties Hackers, virus and worm writers could get 20 years to life in federal prison. Anyone who uses computers to cause death or bodily harm, such as bringing down power grids or airport control centers, can get the maximum sentence. The sentence is increased by 25% if they steal personal information. The sentence is increased by 50% if they share the stolen information. If posted on the Internet, sentence is doubled!Conclusion: Conclusion User awareness is key to a secure computer/network Do not open suspicious files/emails Verify ActiveX/Java prompts Avoid using P2P programs Avoid downloading freeware If attacked, disconnect the network. Do not turn off the computer Without Careful Attention To These Issues, The Uncontrolled Interconnection Of Existing Systems, On Which People And Organizations Are Critically Dependent, Will Continue To Create Huge, Ill-defined And Defenseless Super - Systems. So We Must Pay Attention To All Those Issues And Protect The World From Cyber Crime. You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.