Top Banner
By Arifa Ali, Hannah Buckley, Paul Byrne and Matthew Hastie Internet Security
27
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 1. By Arifa Ali, Hannah Buckley, Paul Byrne and Matthew Hastie

2. Ethical Hacking & Black Hat Hacking Types of Hacking/Data Theft Statistics/Examples of Attacks Skills Required to Prevent Attacks Measures to Prevent Attacks 3. Brief History Who is a hacker and what do Hackers do ? Hackers Techniques System Hacking, Network Hacking, Software Hacking 4. Someone who bypasses the systems and Passwords. Taking advantage of weaknesses left in the system bydevelopers. This person knows computer programming Can be a Hacker Subculture Access confidential information Broadcast confidential documents e.g. Name, address,etc. Espionage 5. Over the internet Over Lan Locally Offline Theft Deception Ip Addresses Telephone Email 6. Malicious Hackers Villain Violates Computer Security 7. Computer Security A Computer Hacker intending to improve security. The Hero 8. Black Hat Hackers ( The bad guy Violates computers) White Hat Hackers (The Hero Breaks security for good reasons) Blue Hat Hacker (consults firms, system tested before launch) Grey Hacker(Mixture of white & Black offers their service toimprove for a small fee) Hacktivist (Utilizes Technology) Script Kiddie (Skiddie)Kid- Child lacking knowledge, Immature Elite Hacker (The most skilled Hacker)(Masters of deception) Ethical Hacker(employee and authorised Hacker) Bots ( software tools the hackers use ) 9. SQL InjectionSQL injection is a type of attack often usedagainst data driven applications.It is a technique that exploits an applicationssecurity weaknesses.Used to steal databases full of credit cardinformation, passwords, or personal details. 10. DDOS AttacksDistributed Denial of Service.Used to make a machine or network resourceinaccessible to users.DDOS attacks usually utilise botnets. 11. Social EngineeringSocial engineering is the art of manipulatingpeople into divulging personal and confidentialinformation.Requires very little technical skill.Relies heavily on human interaction to getresults.Most often used in tandem with other exploits. 12. Malware and VirusesMalicious Software.Used by an attacker to steal data, disruptoperations or access a private network.Used to describe many different types ofsoftware including viruses, worms, Trojans,keyloggers, spyware and others. 13. Computer VirusAny computer program that can replicate itselfand spread from one computer to anotherwithout input from its creator.Needs to attach itself to an existing program inorder for it to work.They are used to deliver many differentpayloads. 14. Computer WormA program similar to a virus; it can replicateitself and spread from one computer to another.Unlike a virus a worm does not need to beattached to an existing program in order tofunction.Always cause harm to the network, even if it isjust increased bandwidth consumption, whereasa virus will always corrupt and/or modify files ona computer. 15. Trojan HorseA program that pretends to do one thing, but inreality does something else.Used to record keystrokes input by a userCan be used to steal usernames, passwords,credit card information, personal details and soon.Usually employ a form of social engineering. 16. FirewallsProgram used to monitor network traffic.Have a set of rules that they use to filterpackets trying to enter the network.Usually placed between a trusted network andone that is less trusted. 17. Antivirus SoftwareUsed to prevent access to computer systems byunwanted programs.Utilises many different methods to protect thecomputer.Often search for signs of viruses on everywebsite that is visited and do regular scans ofthe computer to check for infections. 18. Password Cracking-Attempting to guess a password usinga program. Brute Forcing-A program that guesses a password byinputting as many randomly generated passwords using thecomputers processing power. Dictionary Hack-A program that guesses passwords basedon words in a dictionary or the programs vocabulary. Packet Sniffing-Sniffing packets sent over the internet togain security details over unsecured connections. Phishing-Legitimate looking sites designed to farminformation inputted by the user. 19. Rootkit-Stealth software which inhibits use of programsexecuted by the user and hides (usually malicious)processes. Keyloggers-records keystrokes and can be software orhardware. Scareware-A form of software designed to scare the userinto divulging information (such as credit cardinformation) much like social engineering. IP Spoofing-Masks the IP address of a hacker andprevents them from being found 20. Attacks on the increase In 2010 431 million adults worldwide were victims ofcyber crime Costs 114 billion pounds worldwide Costs U.K 27 billion pounds a year 10.5% of the worlds hackers are from the U.K 21. In Brazil 83% of the population have suffered frominternet crime. America is not far behind with 73% falling victim tointernet crime. Cyber crime can be down to anyone from professionalcriminals to teenagers 22. April 2011 Sony Play station network shut down due toexternal intrusion Password is crucial More letters, numbers and characters in a password theharder it is to crack 23. Spam blocker Anti Virus software Firewall protection Encryption software Caution in providing personal information Secure Shopping Avoidance of scans Monitoring of your childs computer activities 24. Employ more skilled individuals Pros: Eliminates the need on relying on a small number ofpeople Cons: Very costly Improve education on internet security and/or lowercosts for fees Job Awareness-people are not aware certain jobs areavailable Higher starting wages to give potential employees anincentive 25. Any Questions?