This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Slide 1
Slide 2
AGAINST HACKING Lysia Moua CIS1055 Sec 005 November 20,
2012
Slide 3
Background Information What is hacking? practice of modifying
computer hardware and software to accomplish a goal outside of the
creators original purpose- Hinders What is a hacker? People who
engage in the act of hacking computers Who can hack? Anyone
Slide 4
Types of Hackers White Hat Non-malicious intention Security
experts Test the system Ethical hackers Black Hat Also known as
crackers Malicious intention Grey Hat Will take advantage of
vulnerable system Elite Hacker Hackers among all hackers Script
Kiddie Amateur hacker
Slide 5
Ways To Protect Yourself From Hackers Firewall Keep firewall on
Helps protect the computer from hackers who tries to gain access to
crash it, delete information, or even steal passwords or other
sensitive information. Antivirus Software If it detects malicious
code, like a virus or a worm, it works to disarm or remove it
viruses.
Slide 6
Ways To Protect Yourself From Hackers Cont. Keep Operating
System Up to Date Updated from time to time to stay in tune with
technology requirements and to fix security holes. Be Careful Of
What Is Being Download Carelessly downloading e-mail attachments
can dodge even the most alert anti-virus software. Never open an
e-mail attachment from an unknown user, and be distrustful of
forwarded attachments from unknown users. Turn Off The Computer The
downside to having always leaving the computer makes computers more
susceptible to hackers..
Slide 7
Ways To Protect Yourself From Hackers Cont. Antispyware
Technology Collects information without consent or produces
unwanted pop-up ads on web browser.
Slide 8
List of Famous Hackers Chaos Computer Club Found in Germany and
other German-speaking countries. This is popular among the older
hackers generation. Masters of Deception w00w00 One of the largest
non-profit security teams in the world with more than 30 active
participants. TESO was a famous hacker group, which originated in
Austria and quickly became international. It was active from 1998
to 2004, and during its peak around 2000, it was responsible for a
significant share of the exploits on the bugtraq mailing list.
L0pht was a hacker collective active between 1992 and 2000 and
located in the Boston, Massachusetts area.
Slide 9
List Of Famous Hackers Cont. Cult of the Dead Cow This group is
also known as the cDc or the cDc Communications They are computer
hackers and DIY media organization found in Lubbock, Texas. milw0rm
A group of hacktivists Known for penetrating the computers of the
Bhabha Atomic Research Centre in Mumbai. TeaMp0isoN A group of
Black-Hat Computer Hackers Anonymous A group of hackers created in
2003.
Slide 10
List of Famous Hackers Cont. LulzSec Group of hackers created
and separated in 2011 Claimed to hack "for the lulz". Decocidio An
anonymous, autonomous collective of hacktivists which is part of
Earth First, a radical environmental protest organization Climate
Justice Action Goatse Security (aka GoatSec) A loose-knit, 9-person
grey hat hacker group that specializes in uncovering security
flaws. Global kos grey hat computer hacker group globalHell A group
of hackers that disbanded in 1999 when 12 members were prosecuted
for computer intrusion
Slide 11
List of Famous Hackers Cont. Hackweiser Underground hacking
group and hacking magazine Honker Union Known for hacktivism Found
in Mainland China Series of attacks on websites in the United
States mostly government-related sites. Level Seven A hacking group
from the mid to late 90's but eventually separated in early 2000
when searched by the FBI NCPH Chinese hacker group found in Zigong
in Sichuan Province.
Slide 12
The Cons of Hacking Hackers often hack into computers and steal
peoples identities and other important information Hackers learn
about how to become a cracker and get into an operating system in
order to bypass the security Many hackers are malicious hackers
which they will spam a computer or send out viruses
http://www.applicure.com/solutions/hacking- attacks
http://www.applicure.com/solutions/hacking- attacks
http://www.applicure.com/solutions/hacking- attacks
Slide 13
The Cons of Hacking Cont. Too many people who hack into the
system Causes people to feel unsafe with saving their information
on their computers Causes people to question the safety of the
internet and computer world
Slide 14
More Information "Essence of Hacking In Today's World." Techi
Warehouse. N.p., July-Aug. 2004. Web. 18 Nov. 2012.. Giridhar. "5
Most Notorious Hacking Groups Of All Time." HackDigital. N.p.,
July-Aug. 2011. Web. 18 Nov. 2012.. Hinders, Dana, and O. Wallace.
WiseGeek. Conjecture, 08 Nov. 2012. Web. 18 Nov. 2012.. Murphy,
Kate. "Build Up Your Phone's Defenses Against Hackers." The New
York Times. The New York Times, 26 Jan. 2012. Web. 18 Nov. 2012..
"Protect Your Computer." FBI. Web. 18 Nov. 2012.. "Protecting Your
Website Against Hacking." Squidoo.Web. 18 Nov. 2012.. "Types of
Hacker." SecPoint. Web. 18 Nov. 2012..