130 likes | 565 Views
AGAINST HACKING. Lysia Moua CIS1055 Sec 005 November 20, 2012. Background Information. What is hacking? “practice of modifying computer hardware and software to accomplish a goal outside of the creators original purpose”- Hinders What is a hacker?
E N D
AGAINST HACKING Lysia Moua CIS1055 Sec 005 November 20, 2012
Background Information • What is hacking? • “practice of modifying computer hardware and software to accomplish a goal outside of the creators original purpose”- Hinders • What is a hacker? • People who engage in the act of hacking computers • Who can hack? • Anyone
Types of Hackers • White Hat • Non-malicious intention • Security experts • Test the system • Ethical hackers • Black Hat • Also known as “crackers” • Malicious intention • Grey Hat • Will take advantage of vulnerable system • Elite Hacker • Hackers among all hackers • Script Kiddie • Amateur hacker
Ways To Protect Yourself From Hackers • Firewall • Keep firewall on • Helps protect the computer from hackers who tries to gain access to crash it, delete information, or even steal passwords or other sensitive information. • Antivirus Software • If it detects malicious code, like a virus or a worm, it works to disarm or remove it viruses.
Ways To Protect Yourself From Hackers Cont. • Keep Operating System Up to Date • Updated from time to time to stay in tune with technology requirements and to fix security holes. • Be Careful Of What Is Being Download • Carelessly downloading e-mail attachments can dodge even the most alert anti-virus software. • Never open an e-mail attachment from an unknown user, and be distrustful of forwarded attachments from unknown users. • Turn Off The Computer • The downside to having always leaving the computer makes computers more susceptible to hackers..
Ways To Protect Yourself From Hackers Cont. • Antispyware Technology • Collects information without • consent or produces unwanted pop-up ads on • web browser.
List of Famous Hackers • Chaos Computer Club • Found in Germany and other German-speaking countries. • This is popular among the older hackers generation. • Masters of Deception • w00w00 • One of the largest non-profit security teams in the world with more than 30 active participants. • TESO • was a famous hacker group, which originated in Austria and quickly became international. It was active from 1998 to 2004, and during its peak around 2000, it was responsible for a significant share of the exploits on the bugtraq mailing list. • L0pht • was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area.
List Of Famous Hackers Cont. • Cult of the Dead Cow • This group is also known as the cDc or the cDc Communications • They are computer hackers and DIY media organization found in Lubbock, Texas. • milw0rm • A group of hacktivists • Known for penetrating the computers of the Bhabha Atomic Research Centre in Mumbai. • TeaMp0isoN • A group of Black-Hat Computer Hackers • Anonymous • A group of hackers created in 2003.
List of Famous Hackers Cont. • LulzSec • Group of hackers created and separated in 2011 • Claimed to hack "for the lulz". • Decocidio • An anonymous, autonomous collective of hacktivists which is part of Earth First, a radical environmental protest organization • Climate Justice Action • Goatse Security (aka GoatSec) • A loose-knit, 9-person grey hat hacker group that specializes in uncovering security flaws. • Global kos • grey hat computer hacker group • globalHell • A group of hackers that disbanded in 1999 when 12 members were prosecuted for computer intrusion
List of Famous Hackers Cont. • Hackweiser • Underground hacking group and hacking magazine • Honker Union • Known for hacktivism • Found in Mainland China • Series of attacks on websites in the United States • mostly government-related sites. • Level Seven • A hacking group from the mid to late 90's but eventually separated in early 2000 when searched by the FBI • NCPH • Chinese hacker group found in Zigong in Sichuan Province.
The Cons of Hacking • Hackers often hack into computers and steal people’s identities and other important information • Hackers learn about how to become a cracker and get into an operating system in order to bypass the security • Many hackers are malicious hackers which they will spam a computer or send out viruses • http://www.applicure.com/solutions/hacking-attacks
The Cons of Hacking Cont. • Too many people who hack into the system • Causes people to feel unsafe with saving their information on their computers • Causes people to question the safety of the internet and computer world
More Information • "Essence of Hacking In Today's World." Techi Warehouse. N.p., July-Aug. 2004. Web. 18 Nov. 2012. <http://www.techiwarehouse.com/engine/a8376006/Essence-of-Hacking-In-Today%27s-World>. • Giridhar. "5 Most Notorious Hacking Groups Of All Time." HackDigital. N.p., July-Aug. 2011. Web. 18 Nov. 2012. <http://www.hackdigital.com/5-most-notorious-hacking-groups-of-all-time/>. • Hinders, Dana, and O. Wallace. WiseGeek. Conjecture, 08 Nov. 2012. Web. 18 Nov. 2012. <http://www.wisegeek.com/what-is-computer-hacking.htm>. • Murphy, Kate. "Build Up Your Phone's Defenses Against Hackers." The New York Times. The New York Times, 26 Jan. 2012. Web. 18 Nov. 2012. <http://www.nytimes.com/2012/01/26/technology/personaltech/protecting-a-cellphone-against-hackers.html>. • "Protect Your Computer." FBI. Web. 18 Nov. 2012. <http://www.fbi.gov/scams-safety/computer_protect>. • "Protecting Your Website Against Hacking." Squidoo.Web. 18 Nov. 2012. <http://www.squidoo.com/protect-your-website-against-hacking>. • "Types of Hacker." SecPoint. Web. 18 Nov. 2012. <http://www.secpoint.com/types-of-hacker.html>.