Hackers - PowerPoint PPT Presentation

1 / 15
About This Presentation
Title:

Hackers

Description:

Hackers. IT 3700/01. By Erin Clough. What Is A Hacker? ... For the crime to be a federal offence the attacker must have caused at least $5,000 in damages. ... – PowerPoint PPT presentation

Number of Views:201
Avg rating:3.0/5.0
Slides: 16
Provided by: Eri6190
Category:
Tags: clough | hackers

less

Transcript and Presenter's Notes

Title: Hackers


1
Hackers
  • IT 3700/01
  • By Erin Clough

2
What Is A Hacker?
  • Hacker is a technical term that refers to a
    person engaged in a criminal act of attempting
    to gain access to a computers system without
    authorization.
  • Title 18, United States code section 1030,
    enacted in 1984 Specifically states that in
    order for a crime to be illegal the perpetrator
    must knowingly be committing the crime. For
    the crime to be a federal offence the attacker
    must have caused at least 5,000 in damages.

3
Who Are YourMajor Threats?
  • Disgruntled employees most dangerous and likely
    to occur with company security, these attacks can
    do serious damage to the network
  • Security experts work with internet service
    companies to test their security systems and
    often find new hacking exploits in systems
  • Script kiddies students who use hacking as a way
    to get free stuff software and music. These
    attacks comprise 90 of internet hacking

4
Who Are Your Major Threats?
  • Underemployed adults are often the creators of
    crackz used to unlock commercial software
  • Ideological hackers use hacking as a way to
    further a political purpose, by defacing websites
    or dos attacks like the code red worm
  • Criminal hackers seek out personal information
    for monetary gain and revenge, seeks out such
    things as credit card and bank account numbers
  • Corporate spies found in high technology
    businesses

5
How Hackers Access Your Network
Internet
Wireless
Modem
Door
6
How Hackers Access Your Network
  • Internet attackers find vulnerabilities or flaws
    in the web servers and operating systems to
    deface the web site or penetrate the network
  • Wireless LANs attackers can easily access
    networks as long as they are in a close vicinity
    to the companies WLAN, commonly known as war
    driving

7
How Hackers Access Your Network
  • Direct intrusion (Door) attackers can enter the
    building directly and if left unattended can
    access the administrative user accounts to
    create a new user identity and access the network
    remotely
  • Dial-up (Modem) attackers can enter company
    networks through exploiting a modem connected to
    the companys remote assess server

8
Targeting The Victim
  • Factors that determine the specific computer a
    hacker will attack
  • Domain Name Service
  • Network Address Scanning
  • Port Scanning
  • Service Scanning

9
Information Gathering-How Hackers Collect the
Data-
  • SNMP Data Gathering simple network management
    protocol, allows remote querying to maintain the
    status and control of the operating network
    systems
  • Directory Service Lookups
  • Architecture Probes fingerprinting allows
    hackers to communicate to host computers by
    sending and receiving error messages in order to
    determine the hosts operating system
  • Sniffing

10
Most Common Attack Methods
  • Denial of Service
  • Floods attacks protocols that transmit data in
    order to slow or crash the server network
  • Forged E-mail
  • Automated Password Guessing
  • Buffer Overruns
  • Source Routing
  • Session Hijacking
  • Man-in-the-Middle
  • Trojan Horses returns your information to the
    hacker or allows direct access to your computer

11
General Attack Trends In Business
  • In 2002, on average 30 attacks were recorded per
    week per company
  • 85 were classified as pre-attack
    reconnaissance, like launching a scan to detect a
    particular service
  • 15 were actual attempts or successful attacks
    on networks
  • 2003 beginning year attacks skyrocketed by 84 in
    the first three months
  • Attacks vary depending on
  • Days of the Week
  • Certain Hours of the Day
  • Industry
  • Size of the Company

12
Attacks During The Week
13
Percentage of Industry Attacks
14
Top Ten Countries That Account For Cyber Attacks
  • 80 of all attacks originate from 10 countries
  • 1. United States
  • 2. South Korea
  • 3. China
  • 4. Germany
  • 5. France
  • 6. Taiwan
  • 7. Canada
  • 8. Italy
  • 9. Great Britain
  • 10. Japan
  • -The growth of Broadband connection is the
    major influencing factor in cyber attacks

15
Whats Next?
  • Information Security is the hottest topic for
    anyone who uses the computer for personal or
    business purposes
  • The next sections will discuss
  • Current news event trends in security
  • How organizations can design and implement
    successful security for their networks
  • What is the Internet and how to protect your
    information
  • Current technological companies in the security
    market
  • Why understanding internet security is critical
    for IT and IS
Write a Comment
User Comments (0)
About PowerShow.com