180 likes | 620 Views
Hackers. IT 3700/01 By Erin Clough. Hacker : is a technical term that refers to a person engaged in a criminal act of attempting to gain access to a computers system without authorization.
E N D
Hackers IT 3700/01 By Erin Clough
Hacker: is a technical term that refers to a person engaged in a criminal act of attempting to gain access to a computers system without authorization. Title 18, United States code section 1030, enacted in 1984; Specifically states that in order for a crime to be illegal the perpetrator must “knowingly” be committing the crime. For the crime to be a federal offence the attacker must have caused at least $5,000 in damages. What Is A Hacker?
Who Are YourMajor Threats? • Disgruntled employees: most dangerous and likely to occur with company security, these attacks can do serious damage to the network • Security experts: work with internet service companies to test their security systems and often find new hacking exploits in systems • Script kiddies: students who use hacking as a way to get free stuff: software and music. These attacks comprise 90% of internet hacking
Who Are Your Major Threats? • Underemployed adults: are often the creators of “crackz” used to unlock commercial software • Ideological hackers: use hacking as a way to further a political purpose, by defacing websites or dos attacks like the “code red” worm • Criminal hackers: seek out personal information for monetary gain and revenge, seeks out such things as credit card and bank account numbers • Corporate spies: found in high technology businesses
How Hackers Access Your Network Internet Wireless Modem Door
How Hackers Access Your Network • Internet: attackers find vulnerabilities or flaws in the web servers and operating systems to deface the web site or penetrate the network • Wireless LANs: attackers can easily access networks as long as they are in a close vicinity to the companies WLAN, commonly known as “war driving”
How Hackers Access Your Network • Direct intrusion (Door): attackers can enter the building directly and if left unattended can access the administrative user accounts to create a new user identity and access the network remotely • Dial-up (Modem): attackers can enter company networks through exploiting a modem connected to the company’s remote assess server
Targeting TheVictim • Factors that determine the specific computer a hacker will attack • Domain Name Service • Network Address Scanning • Port Scanning • Service Scanning
Information Gathering-How Hackers Collect the Data- • SNMP Data Gathering: simple network management protocol, allows remote querying to maintain the status and control of the operating network systems • Directory Service Lookups • Architecture Probes: “fingerprinting” allows hackers to communicate to host computers by sending and receiving error messages in order to determine the hosts operating system • Sniffing
Denial of Service Floods: attacks protocols that transmit data in order to slow or crash the server network Forged E-mail Automated Password Guessing Buffer Overruns Source Routing Session Hijacking Man-in-the-Middle Trojan Horses: returns your information to the hacker or allows direct access to your computer Most Common Attack Methods
General Attack Trends In Business Attacks vary depending on • Days of the Week • Certain Hours of the Day • Industry • Size of the Company • In 2002, on average 30 attacks were recorded per week per company • 85% were classified as pre-attack reconnaissance, like launching a scan to detect a particular service • 15% were actual attempts or successful attacks on networks • 2003 beginning year attacks skyrocketed by 84% in the first three months
80% of all attacks originate from 10 countries 1. United States 2. South Korea 3. China 4. Germany 5. France 6. Taiwan 7. Canada 8. Italy 9. Great Britain 10. Japan -The growth of Broadband connection is the major influencing factor in cyber attacks Top Ten Countries That Account For Cyber Attacks
What’s Next? • Information Security is the “hottest topic” for anyone who uses the computer for personal or business purposes • The next sections will discuss • Current news event trends in security • How organizations can design and implement successful security for their networks • What is the Internet and how to protect your information • Current technological companies in the security market • Why understanding internet security is critical for IT and IS