BISM2100 Presentation - PowerPoint PPT Presentation

1 / 7
About This Presentation
Title:

BISM2100 Presentation

Description:

Hacking used to be clever techniques of doing anything on the computer and ... Facebook are both two sites that have had numerous accounts of hacking because ... – PowerPoint PPT presentation

Number of Views:40
Avg rating:3.0/5.0
Slides: 8
Provided by: students7
Category:

less

Transcript and Presenter's Notes

Title: BISM2100 Presentation


1
BISM2100 Presentation
  • The History of Hackers and
  • How they do what they do
  • By Morgan Finch

2
Hacker History Timeline
  • 1960s The first computer hackers at MIT
  • 1970s The first phone hacker using a Captain
    Crunch Whistle!
  • 1980s Hacker Groups are formed- Legion of Doom?
  • 1986 Computer Fraud and Abuse Act
  • 1990s High Profile Cases and new Tools for and
    against hackers
  • 2000 DoS Attacks

3
Who are they?
  • Hacking used to be clever techniques of doing
    anything on the computer and creating computer
    shortcuts to make tasks easier. It was an
    exploration of a new world of computers.
  • Now, hacking is the term that describes computer
    criminals who break into and/or harm computers.
  • Some people prefer the term Cracker instead of
    using the term Hacker, referring to someone who
    breaks security on a system.

4
Hacker Tools and Tricks
  • Denial of Service Attacks These attacks lock out
    rightful users from their own websites/networks
    and steal information.
  • DNS Spoofing Hackers alter DNS entries on a
    server to take the browser to a different site.
    The hackers create fake sites pretending to be
    the site the browser wanted.
  • Viruses and Worms These are self-replicating
    programs that spread throughout an entire network
    to destruct programs and copy itself over and
    over without needing anything like a file to do
    this.
  • Web Page Defacements Situations where hackers
    gain access to computer files and alter or
    replace web pages.

5
More Hacker Tools and Tricks
  • Trojan Horse Programs Programs wherehackers
    disguise a Trojan as another program, game, etc.
    to trick the user into installing it onto their
    computer, thus giving the hacker access to
    everything.
  • Social Engineering This is a term for misleading
    people to give out information about how to login
    to something or pretending to forget a password
    to steal information.
  • Packet Sniffers These are devices that intercept
    packets of information traveling in a network
    that can be stolen.

6
Hacking in 2007
  • Myspace and Facebook are both two sites that have
    had numerous accounts of hacking because of
    people putting too much information, and then
    hackers have easy access to this information.
    Hackers see any interests a person has and than
    uses this to create some sort of attack.
  • Fake Online Banking Sites Hackers are creating
    these fake websites that look like the real
    thing, but are operated by the hacker himself. An
    example of a fake page is bankofamerica-online.co
    m the real page is www.bankofamerica.com/onlineba
    nking.

7
References
  • (2001). CNN.com. Retrieved May 23, 2007, from
    Timeline A 40-year history of hacking Web site
    http//archives.cnn.com/2001/TECH/internet/11/19/h
    ack.history.idg/
  • Das, A CybercrimePiercing the darkness.
    Retrieved May 23, 2007, from History of Hacking
    Web site http//library.thinkquest.org/04oct/0046
    0/team.html
  • Hatch, B, Lee, J Hackers vs Crackers. Retrieved
    May 23, 2007, from http//www.hackinglinuxexposed.
    com/about/hackers_vs_crackers.html.
  • Hypponen, M (2007).The Problem Internet Security
    Masters of Their Domain. Foreign Policy. 160,
    47-48
  • (2001). Frontlinehackers. Retrieved May 23,
    2007, from A hacker's Tools of the Trade Web
    site http//www.pbs.org/wgbh/pages/frontline/show
    s/hackers
  • Raisbeck, Fiona (2006, December 13). Hackers
    target MySpace in new cyber war. SC Magazine in
    Australia, Retrieved May 23,2007, from
    http//www.securecomputing.net
Write a Comment
User Comments (0)
About PowerShow.com