1 / 0

Chapter 4: Closing Case 2

Hacker Hunters. Chapter 4: Closing Case 2. John Hohenstein IS 340 Section 6 Spring 2010. What is a Hacker Hunter?. New breed of crime fighter Searching for illegal activities in online world “World is Flat” opened up not only business highways of communication

anevay
Download Presentation

Chapter 4: Closing Case 2

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Hacker Hunters

    Chapter 4: Closing Case 2

    John Hohenstein IS 340 Section 6 Spring 2010
  2. What is a Hacker Hunter? New breed of crime fighter Searching for illegal activities in online world “World is Flat” opened up not only business highways of communication Searching often for computers or numbers at first rather than individuals
  3. Methods Used by Hackers Target Computer Networks or Devices Malware Denial-of-Service Attacks Computer Viruses Use Computer Networks or Devices Cyber Stalking Fraud and Identity Theft Phishing Scams
  4. ShadowCrew Gang of 4,000 members Made more than $4 million over two years Identity Theft Bank Account Pillaging Selling Illegal Goods on the Internet Comparable to a black market Ebay Traded credit card information, passports, equipment to make fake identity documents
  5. ShadowCrew October 26, 2004 Operation Firewall Andres Mantovani, 23 Part-time community college student David Appleyard, 45 New Jersey mortgage broker “Scarface” Sold 115,695 credit card numbers in single transaction
  6. Bust of ShadowCrew Hang ranking group member turned informant called a group meeting Simultaneously arrested 28 members in 6 countries Authorities seized Dozens of computers Found 1.7 million credit card numbers 18 million email accounts
  7. What types of crimes do hackers commit? A) Crimes Using Computer Networks B) Crimes Targeting Computer Networks C) Crimes Using and Targeting Computer Networks D) Selling Prescription Drugs Illegally Online?
  8. How many members were the in ShadowCrew? A) 4,000 B) 3,000 C) 12,000 D) 1.8 Million
  9. How many ShadowCrew members were arrested? A) 12 B) 18 C) 25 D) 28
  10. Computer hackers have had to adjust to different operating systems and encryption codes online. Why do you think these people are working against the companies that would gladly employ them and pay them handsomely for it?
More Related