1 / 12

Unit 20 The ex-hacker

Unit 20 The ex-hacker. Prepared by: Nahed Al-Salah. Button. Who is a hacker ?. He is a person who attempts to gain unauthorized access to network system. They are often young teenagers through they are usually fairly skilled programmer ( people who write computer programs)

Download Presentation

Unit 20 The ex-hacker

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Unit 20The ex-hacker Prepared by: Nahed Al-Salah Button

  2. Who is a hacker ? • He is a person who attempts to gain unauthorized access to network system. • They are often young teenagers through they are usually fairly skilled programmer ( people who write computer programs) • The hackers could be named • geek ( an expert lacking in social skills) Note : it now used in computer to mean a dedicated expert. • anorak : ( a slang term for an eccentric , socially inept person with little or no fashion sense and having an obsessive interest in a hobby or subject.

  3. People become hackers for many reasons • Making many • Criminals purposes • Expose political informal • People hack ( break into a computer system) because it’s an exciting challenge.

  4. Is hacking legal or illegal? • Since hacking ( attempting to gain unauthorized access to a network system ) is illegal. • Hackers wants to keep their true identity is secret. • They like to call themselves by special names such as “ analyzer” . • They like to form hacking groups or teams that work together and exchange ideas.

  5. How hackers attack and penetrated computer systems? • hackers like to attack and penetrate the computer systems belonging to large companies such as :- • Pentagon’s computer system • Computer systems belonging to US military bases. • Hotmail “ free email service provided by Microsoft Corporation”

  6. Steps for breaking computer systems • Hacking is done gradually : • Hackers gaining entry to system gradually. • Planting password in the systems , allowing them to gain access to the system more easily.

  7. What are the things done to computer systems ? • Most hacks are done by company staff misusing the company network. • downloading files ( copying files from a server computer) and leaking confidential information. Posting information is the term used for making information available to a large number of users in a newsgroup( an internet discussion group that uses a restricted area on a server computer to display messages about a common interest) or on bulletin board ( an electronic notice board system that enables users to read ). • exposing email ( electronic email) correspondence managed by well-known email services, causing the services to be shut down while the exposed weakness in the system is repaired.

  8. Programming email server computers to reroute email ( send to different email address than the one it was originally sent to ). • Hijacking websites by redirecting the web address ( URL) to point to another website. • Defacing websites by changing the text and graphics on the webpages, sometimes leaving very rude messages on the system. • Blackmailing ( the owners of websites by threatening to damage their systems by doing something like releasing virus ( a program that can reproduce itself and is written with the purpose of causing damage or causing a computer to behave in an usual way) onto their system, although such a threat often turns out to be nothing more than a hoax.

  9. When the large companies hired the hackers • Large companies as security experts employ hackers to test out the companies systems by trying to hack into them and fins any weakness in their system and to make Cyberspace safer ( is the combination of all data on all the computer network throughout the world , accessed by using internet. • “A white hat “ hacker is a person who uses hacker skills to make Cyberspace safer. • A computer system can be hacked in various ways • Guessing somebody’s password( secret code used to control access to a network system). • Finding bug ( a fault in a system ) that allows certain passwords to access information they are not supposed to access. • Phoning a company, pretending to be a company employee and asking for a password. People tend to be too trusting.

  10. Different ways of avoiding being hacked • Installing firewall ( a combination of hardware and software used to control the data going into and out of a network). • Using a callback system ( a system that automatically disconnected a telephone line after receiving a call and then dials the telephone number of the system that made the call, to reconnect the line. It is used to remote access systems to make sure that connections can only be made from permitted telephone numbers.) • Having really secure passwords ( secret codes used to control access to a network system ) -don’t use common names or dictionary words. • Auditing the system regularly ( checking the system regularly using event logs to find failed access attempts ).

  11. What could you do to avoid credit card theft on the internet • Using a separate credit card for internet purchases. • Having a small credit card limit on the credit card you use. • Buying a pre-paid charge card for small purchases. • Note : In the future, smart cards( plastic cards containing a processors and memory chip that can be used to store large amounts of confidential data) will be used instead of credit cards. This will require smart cards readers (devices used for reading smart cards) to be attached to computers.

  12. Exercises Text Book

More Related