180 likes | 305 Views
Protection from Internet Theft. By James Seegars. What Is Hacking?. Definition A)To change or alter(Computer Program) B) To gain access to (a computer file or network) illegally or without authorization. Who are the Hackers. Stereotype
E N D
Protection from Internet Theft By James Seegars
What Is Hacking? • Definition • A)To change or alter(Computer Program) • B) To gain access to (a computer file or network) illegally or without authorization.
Who are the Hackers • Stereotype • Anti-social, creepy, maybe (Fat), person in the basement of their parents house, usually very intelligent or good with computers • Truth • Anybody can be hackers now.
How Does one Hack? • This can be answered in a variety of different ways. • Spyware- is a software that aids in gathering of information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.
Hacking Cont. • Vulnerability scanner • A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses. Hackers also commonly use port scanners. • Port scanner- Software that probes a server or host for open ports.
Still Cont. • Password cracking • Process of getting passwords from data that has been stored in or transmitted by a computer system. • Can also be done by just guessing passwords.
Packet Sniffer • A packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.
Rootkit • A rootkit is designed to conceal a attack of a computer's security, and can represent any of a set of programs which work to take control of an operating system from its owners. Usually, a rootkit will hide its installation and attempt to stop its removal through a subversion of standard system security. Rootkits may include replacements for system binaries so that it becomes impossible for the owner to detect the program on the system by looking at process tables.
Social Engineering • This is when hackers use alternative methods to get into systems. By emailing spyware by masquerading as a customer or any variety of thing to get information on the system.
Trojans • I’m not talking bout the condoms either. • It’s usually a virus that looks like one thing but is something else. Try to open up a backdoor to systems.
Viruses • We all now what these are. At least I hope.
Worms • Similar to a virus but doesn't attach itself to any program to replicate. • It also goes through entire networks.
Key logger • Well kind of self explanatory. It is a program like a virus or trojan that installs itself on a computer and records key strokes for later uses.
What can we do to stop this? • Update your computer regularly along with your virus protection(Norton etc). • Don’t download unsafe programs or open email from people you don’t know. • Have a firewall on your computer. • Check your firewall and make sure there have not been any attacks on your computer or network.
Identity Theft • This happens when you get hacked and they get important info(Solcial Security Number, Address, Phone Number etc.) • When this happens 1 of 2 things happened • 1) you got hacked and information about you was stolen and they used that to steal your identity. • 2) Or a company that has your information got hacked and they are at fault for you losing credit or money.
Things that help • Have a company that can protect from identity theft (Lifelock etc.)
Problem with hackers • If they are good enough and actually want in your system, they can get in. • It’s impossible to make a perfect system that will protect you completely from hackers. • All you can do is make it harder for them to get at you.
References • Record Data Breaches in 2007. (2008). Information Management Journal, 42(2), 16. • Gilman, N. N. (2009). Hacking goes pro [engineering security]. Engineering & Technology • (17509637), 4(3), 26-29. doi:10.1049/et.2009.0304 • The Cybersecurity Risk. (2012). Communications of the ACM, 55(6), 29-32. • doi:10.1145/2184319.2184330 • Sturdevant, C. (2005). Best defense is good offense. Eweek, 22(12), 45-46. • Hacking Attacks - Prevention. (n.d.). High Traffic Web Hosting | Dedicated Hosting | Dedicated • Servers | Web Hosting | Reseller Hosting | Managed Hosting | Remote Backup Storage | Server • Security // Crucial Paradigm. Retrieved May 8, 2013, from • http://www.crucialp.com/resources/tutorials/website-web-page-site-optimization/hackingattacks- • prevention.php