Hacking And ethical hacking The definition of online

  • Slides: 14
Download presentation
Hacking And ethical hacking

Hacking And ethical hacking

Ø The definition of online security: Computer security, cybersecurity, or information technology security (IT

Ø The definition of online security: Computer security, cybersecurity, or information technology security (IT security) is the protection of computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

Ø The difference between security and protection: Security and protection are very close concepts

Ø The difference between security and protection: Security and protection are very close concepts , but are not the same. Security measures are adopted to increase the level of protection. The feeling of protection arises when one has enough security measures. Security is a type of protection against external threats.

Overview of hacking: Hacking is the act of stealing personal or private data, without

Overview of hacking: Hacking is the act of stealing personal or private data, without the owner's knowledge or consent, it could also include other things like stealing passwords, creating a bot net, or pretty much any act that breaches someone's privacy, without their knowledge, or consent. The difference between a hacker and a cracker, is that a hacker is someone that uses their extensive knowledge of computer logic and codes for malicious purposes, while a cracker - looks for back doors in programs, and exploits those back doors. Cracking is generally less harmful than hacking.

Hacking and ethical hacking: v Hacker • Access computer system or network without authorization.

Hacking and ethical hacking: v Hacker • Access computer system or network without authorization. • Breaks the law. v Ethical Hacker • Performs most of the same activities but with owner’s permission. • Employed by companies to perform Penetration Tests.

Types of hackers: 1. White hat hackers: • Also known as ethical hackers. •

Types of hackers: 1. White hat hackers: • Also known as ethical hackers. • Help governments and organizations. • Ensure protection from black hat hackers. 2. Black hat hackers: • Use their skill maliciously for personal gain. • Hack banks, steal credit cards and deface websites.

3. Grey hat hackers: • Combination of white and black hat hackers. • Don’t

3. Grey hat hackers: • Combination of white and black hat hackers. • Don’t hack for personal gain. • Aren’t legally authorized to hack the organizations’ cybersecurity. 4. Script kiddies: • Amateur hackers. • Their primary purpose is to impress their friends or gain attention.

10 most notorious hackers in the world: 1. Gary Mckinnon § He infiltrated 97

10 most notorious hackers in the world: 1. Gary Mckinnon § He infiltrated 97 US military and NASA computers, by installing a virus and deleting a few files. § The biggest military computer hack of all time! 2. Lulz. Sec § Black Hat hacker group, gained credentials for hacking into Sony, News International, CIA, FBI, Scotland Yard, and several noteworthy accounts. § Many claim that this group had taken it upon itself to create awareness about the absence of efficient security against hackers.

3. Adrian Lamo § He hacked into Yahoo!, Microsoft, Google, and The New York

3. Adrian Lamo § He hacked into Yahoo!, Microsoft, Google, and The New York Times. 4. Mathew Bevan and Richard Pryce § what Mathew Bevan along with his alleged partner Richard Pryce did, could have triggered great many issues between USA and North Korea. § The duo hacked the US military computers and used it as a means to infiltrate the foreign systems.

5. Jonathan James § The first juvenile to be imprisoned for a cyber-crime at

5. Jonathan James § The first juvenile to be imprisoned for a cyber-crime at the age of 16. § Hacked into Defense Threat Reduction Agency of US department. § had a bitter ending as James committed suicide in 2008. 6. Kevin Poulsen § Poulsen infiltrated a radio shows call-in contest just so he could win a Porsche. § was found guilty of seven counts of mail, wire and computer fraud, money laundering and the likes.

7. Kevin Mitnick § convicted of hacking Nokia, Motorola and Pentagon. § He pleaded

7. Kevin Mitnick § convicted of hacking Nokia, Motorola and Pentagon. § He pleaded guilty to seven counts of fraud that included wire fraud, computer fraud and of illegally interception a wire communication. 8. Anonymous § have publicized themselves by attacking the government, religious and corporate websites. § The Vatican, the FBI, the CIA, Pay. Pal, Sony, Mastercard, Visa, Chinese, Israeli, Tunisian, and Ugandan governments have been amongst their targets.

9. Astra § A 58 -year-old Greek Mathematician hacked into the systems of France’s

9. Astra § A 58 -year-old Greek Mathematician hacked into the systems of France’s Dassault Group, stole vulnerable weapons technology data and sold it to different countries for five long years. 10. Albert Gonzalez § stole from credit cards of the netizens. § This was recorded to be the biggest credit card theft in the history of mankind. He resold approximately 170 million credit cards and ATM numbers. § When arrested, Gonzalez was sentenced to 20 years in Federal prison.

Done by : Judy Abdullah

Done by : Judy Abdullah