120 likes | 247 Views
Lecture 17 Introduction to Hacking. WHAT IS NETWORK SECURITY?. Security is much larger than just packets, firewalls, and hackers. Security includes: Policies and procedures Liabilities and laws Human behavior patterns Corporate security programs and implementation
E N D
WHAT IS NETWORK SECURITY? • Security is much larger than just packets, firewalls, and hackers. Security includes: • Policies and procedures • Liabilities and laws • Human behavior patterns • Corporate security programs and implementation • Technical aspects- firewalls, intrusion detection systems, proxies, encryption, antivirus software, hacks, cracks, and attacks • Understanding hacking tools and how attacks are carried out is only one piece of the puzzle.
Hacking • THE PROCESS OF ATTEMPTING TO GAIN OR SUCCESSFULLY GAINING,UNOTHORIZED ACCESS TO COMPUTER RESOURCES FOR THE PURPOSE OF HELP OR SECURE SYSTEM IS CALLED HACKING
HISTORY OF HACKING • 1966 – ROBERT MORRIS INTRODUCES THE CONCEPT OF SAFE HACKING. • 1969 – DEVELOPMENT IN THE FIELD OF HACKING. • 1990 – ELECTRONIC FRONTIER FOUNDATION WAS FOUNDED. • 1995 – MARK ANDREESSON & ERIC RELEASE MOSAIC.
WHO IS HACKER? • HACKER IS NOT CYBER CRIMINAL BUT HE IS THE VERY INTELLIGENT PERSON WHO USES HIS KNOWLEDGE IN CONSTRUCTIVE MANNER TO SECURE SYSTEM & NEVER DAMAGE DATA • HE KNOWS ALL ABOUT THE OPERATING SYSTEM & DIFFERENT HOLES IN THE SYSTEM
WHO IS CRACKER? • PERSON WHO ENTER INTO OTHER’S SYSTEM AND VIOLET THE SYSTEM,DAMAGE THE DATA,CREATE HAVOC IS CALLED CRACKER • CRACKER IS CYBER CRIMINAL • THEY CAN BE EASILY IDENTIFIED BECAUSE THEIR ACTIONS ARE MALICIOUS
WHY DO CRACKERS EXIST? • CRACKERS EXIST BECAUSE HUMAN NATURE IS JUST SO,FREQUENTLY DRIVEN BY TO DESTROY INSTEAD OF CREATE • THEY ARE USED FOR DIFFERENT PURPOSES LIKE FOR PROFIT,SOME COMPANY USE THEM FOR DISABLING THE COMPITITOR COMPANY, FOR CRACKING CREDIT CARD NUMBER
DIFFERENCE BETWEEN HACKER & CRACKER • HACKER’S PROGRAMS TO CHECK INTIGRITY OF OTHER PROGRAMS.THUS WHEN HACKERS CREATE PROGRAM IT AUTOMATICALLY CHECKS REMOTE MACHINE SECURITY STRUCTURE • THEY ALWAYS DO CONTRUCTIVE WORK • CRACKERS RARELY MAKE THEIR OWN PROGRAM .INSTEAD ,THEY STEAL TOOL,PROGRAMS FROM OTHERS • CRACKERS CREATES NOTHING & DESTROY MUCH
WHICH OPERATING SYSTEM HACKER USE • SUN • UNIX • MICROSOFT
SUN • HACKERS Use EITHER SOLARIC X86 OR SCO AS A PLATFORM. • THIS IS BECAUSE THESE PRODUCTS ARE LICENSED WARE & THEY CAN EASILY BE OBTAINED.
UNIX • POPULAR PLATFORM BECAUSE THEY REQUIRED A LOW OVERHEAD. • WE CAN RUN LINUX ON A PALTRAY 386 AND GAIN GOOD PERFORMANCE. • THIS IS REASONABLE.
MICROSOFT • THIS SUPPORTS MANY SECURITY TOOLS THAT CAN BE USED TO ATTACK REMOTE MACHINE. • IT HAS ADVANCED TOOLS FOR NETWORKING AS WELL.