Cybercrime, Cyberterrorism, and Cyberwarfare - PowerPoint PPT Presentation

1 / 11
About This Presentation
Title:

Cybercrime, Cyberterrorism, and Cyberwarfare

Description:

Today, someone who breaks into computers. Types of hackers. White-hat hackers ... http://reptile.rug.ac.be/~coder/sniffit/sniffit.html. A packet sniffer ... – PowerPoint PPT presentation

Number of Views:453
Avg rating:3.0/5.0
Slides: 12
Provided by: william309
Category:

less

Transcript and Presenter's Notes

Title: Cybercrime, Cyberterrorism, and Cyberwarfare


1
Chapter 8
  • Cybercrime, Cyberterrorism, and Cyberwarfare

2
Cybercrime
  • Illegal or unethical activities performed in
    cyberspace

3
Hacker
  • Originally, an expert programmer
  • Today, someone who breaks into computers
  • Types of hackers
  • White-hat hackers
  • Black-hat hackers (crackers, dark side hackers)
  • Elite hackers
  • Superior technical skills
  • Very persistent
  • Often publish their exploits
  • Samurai a hacker for hire

4
Script-kiddies and Phreakers
  • Script-kiddie (packet monkeys, lamerz)
  • Hacker in training
  • Disdained by the elite hackers
  • Phreaker
  • Person who cracks the telephone network
  • Insider
  • Trusted employee turned black-hat hacker
  • Very dangerous

5
Why Do Hackers Hack?
  • Government sponsored hacking
  • Cyberwarfare
  • Cyberterrorism
  • Espionage
  • Industrial espionage
  • White-hats
  • Publicize vulnerabilities
  • The challenge hack mode
  • Black hats software and personal information
  • Script kiddies gain respect
  • Insiders revenge

6
Password Theft
  • Easiest way to gain access
  • User carelessness
  • Poor passwords
  • Easily guessed
  • Dumpster diving
  • Observation, particularly for insiders
  • The sticky note on the monitor
  • Human engineering, or social engineering
  • Standard patterns (e.g., default userids and
    passwords)
  • Guess the password from the pattern

7
Password Cracker Software
  • Available over the Internet
  • http//www.bokler.com/bsw_crak.html
  • Recover lost passwords
  • Cracking techniques
  • Word list or dictionary
  • Brute force
  • Hybrid lOphtcrack
  • Precaution store encoded passwords

8
Passwords stored in encoded form
  • Minimize risk if hacker steals password file
  • Un-encoded password needed
  • Password cracking programs
  • Dictionary based
  • Avoid English words

9
Rules for Choosing Good Passwords
  • Easy to remember, difficult to guess
  • Length 6 to 9 characters
  • Mix character types
  • Letters, digits, special characters
  • Use an acronym
  • Avoid dictionary words
  • Different account ? different password
  • Change passwords regularly

10
Packet Sniffers
  • Software wiretap
  • Captures and analyzes packets
  • Any node between target and Internet
  • Broadcast risk
  • Ethernet and cable broadcast messages
  • Set workstation to promiscuous mode
  • Legitimate uses
  • Detect intrusions
  • Monitoring
  • http//www.sniff-em.com/
  • http//reptile.rug.ac.be/coder/sniffit/sniffit.ht
    ml

11
A packet sniffer
Ethernet is a broadcast technology
Write a Comment
User Comments (0)
About PowerShow.com