SlideShare uma empresa Scribd logo
1 de 25
Hackers, Crackers, and Network Intruders CS-480b Dick Steflik
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hacker Terms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hacking through the ages ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The threats ,[object Object],[object Object],[object Object],[object Object],[object Object]
CIA.gov defacement example
Web site defacement example
Types of hackers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types of Hackers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Top intrusion justifications ,[object Object],[object Object],[object Object],[object Object]
Gaining access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Back doors & Trojans ,[object Object],[object Object],[object Object]
Software vulnerability exploitation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Password guessing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Password/key theft ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Once inside, the hacker can... ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Intrusion detection systems (IDS) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Intrusion detection systems (IDS) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Intrusion prevention ,[object Object],[object Object],[object Object],[object Object],[object Object]
Risk management Probability Impact Ignore (e.g. delude yourself) Prevent (e.g. firewalls, IDS, patches) Backup Plan (e.g. redundancies) Contain & Control (e.g. port scan)
Legal and ethical questions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Port scanner example
Computer Crimes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Federal Statutes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Legal Recourse ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & SecurityNetstarterSL
 
Insider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoInsider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoMatt Frowert
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsGoutama Bachtiar
 
Web Application Security Session for Web Developers
Web Application Security Session for Web DevelopersWeb Application Security Session for Web Developers
Web Application Security Session for Web DevelopersKrishna Srikanth Manda
 
Ethical hacking - Good Aspect of Hacking
Ethical hacking - Good Aspect of HackingEthical hacking - Good Aspect of Hacking
Ethical hacking - Good Aspect of HackingDivy Singh Rathore
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce JenVidaB
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Securityprimeteacher32
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeMurray Security Services
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerceSensePost
 
How to analyze cyber threats
How to analyze cyber threatsHow to analyze cyber threats
How to analyze cyber threatsAkankshaPathak27
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-securityMarya Sholevar
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debateDavid Strom
 
Ethical Hacking - Explained
Ethical Hacking - ExplainedEthical Hacking - Explained
Ethical Hacking - ExplainedGunjan Panara
 

Mais procurados (20)

Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
Insider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoInsider Threats Webinar Final_Tyco
Insider Threats Webinar Final_Tyco
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Cyber security
Cyber securityCyber security
Cyber security
 
Web Application Security Session for Web Developers
Web Application Security Session for Web DevelopersWeb Application Security Session for Web Developers
Web Application Security Session for Web Developers
 
Ethical hacking - Good Aspect of Hacking
Ethical hacking - Good Aspect of HackingEthical hacking - Good Aspect of Hacking
Ethical hacking - Good Aspect of Hacking
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Phishing
PhishingPhishing
Phishing
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
How to analyze cyber threats
How to analyze cyber threatsHow to analyze cyber threats
How to analyze cyber threats
 
Hacking
HackingHacking
Hacking
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-security
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking - Explained
Ethical Hacking - ExplainedEthical Hacking - Explained
Ethical Hacking - Explained
 

Destaque

Social Media in Law - "Flash in the Pan" or Competitive Advantage?
Social Media in Law - "Flash in the Pan" or Competitive Advantage?Social Media in Law - "Flash in the Pan" or Competitive Advantage?
Social Media in Law - "Flash in the Pan" or Competitive Advantage?Erik Schmidt
 
Training teachers and instructors to teach in prisons
Training teachers and instructors to teach in prisonsTraining teachers and instructors to teach in prisons
Training teachers and instructors to teach in prisonsPeter Mortimer
 
Beyond Valence In Customer Dissatisfaction A Review And New Findings On Behav...
Beyond Valence In Customer Dissatisfaction A Review And New Findings On Behav...Beyond Valence In Customer Dissatisfaction A Review And New Findings On Behav...
Beyond Valence In Customer Dissatisfaction A Review And New Findings On Behav...jcpham
 
Presentación inglés 16 abril
Presentación inglés 16 abrilPresentación inglés 16 abril
Presentación inglés 16 abrilGenerador de Olas
 
Keith Cowling & Dennis C. Mueller (1978)-The social costs of monopoly power
Keith Cowling & Dennis C. Mueller (1978)-The social costs of monopoly powerKeith Cowling & Dennis C. Mueller (1978)-The social costs of monopoly power
Keith Cowling & Dennis C. Mueller (1978)-The social costs of monopoly powerjcpham
 
Guanxi connections as subtitutes for formal institutional support
Guanxi connections as subtitutes for formal institutional supportGuanxi connections as subtitutes for formal institutional support
Guanxi connections as subtitutes for formal institutional supportjcpham
 
Kotabe global competitive marketing strategy ch08
Kotabe global competitive marketing strategy ch08Kotabe global competitive marketing strategy ch08
Kotabe global competitive marketing strategy ch08jcpham
 
Motywy Wordpressa Historia Prawdziwa
Motywy Wordpressa Historia PrawdziwaMotywy Wordpressa Historia Prawdziwa
Motywy Wordpressa Historia PrawdziwaTomasz Dziuda
 
Motywy dla WordPressa - historia prawdziwa - WordUp Warszawa
Motywy dla WordPressa - historia prawdziwa - WordUp WarszawaMotywy dla WordPressa - historia prawdziwa - WordUp Warszawa
Motywy dla WordPressa - historia prawdziwa - WordUp WarszawaTomasz Dziuda
 
Pronoms febles exercicis i solució
Pronoms febles exercicis i solucióPronoms febles exercicis i solució
Pronoms febles exercicis i solucióXavi Queral
 
Jak nadążyć za światem front-endu - WordPress Training Day
Jak nadążyć za światem front-endu - WordPress Training DayJak nadążyć za światem front-endu - WordPress Training Day
Jak nadążyć za światem front-endu - WordPress Training DayTomasz Dziuda
 
Dokąd zmierza WordPress?
Dokąd zmierza WordPress?Dokąd zmierza WordPress?
Dokąd zmierza WordPress?Tomasz Dziuda
 
Statycznie czy dynamicznie? v.2.0
Statycznie czy dynamicznie? v.2.0Statycznie czy dynamicznie? v.2.0
Statycznie czy dynamicznie? v.2.0Tomasz Dziuda
 
GAS LICUADO DE PETROLEO - GLP
GAS LICUADO DE PETROLEO - GLPGAS LICUADO DE PETROLEO - GLP
GAS LICUADO DE PETROLEO - GLPGEA SRL
 
Gas licuado de petroleo (2)
Gas licuado de petroleo (2)Gas licuado de petroleo (2)
Gas licuado de petroleo (2)GEA SRL
 
Motywy dla WordPressa - historia prawdziwa - WordUp Katowice
Motywy dla WordPressa - historia prawdziwa - WordUp KatowiceMotywy dla WordPressa - historia prawdziwa - WordUp Katowice
Motywy dla WordPressa - historia prawdziwa - WordUp KatowiceTomasz Dziuda
 

Destaque (17)

Paradigma
ParadigmaParadigma
Paradigma
 
Social Media in Law - "Flash in the Pan" or Competitive Advantage?
Social Media in Law - "Flash in the Pan" or Competitive Advantage?Social Media in Law - "Flash in the Pan" or Competitive Advantage?
Social Media in Law - "Flash in the Pan" or Competitive Advantage?
 
Training teachers and instructors to teach in prisons
Training teachers and instructors to teach in prisonsTraining teachers and instructors to teach in prisons
Training teachers and instructors to teach in prisons
 
Beyond Valence In Customer Dissatisfaction A Review And New Findings On Behav...
Beyond Valence In Customer Dissatisfaction A Review And New Findings On Behav...Beyond Valence In Customer Dissatisfaction A Review And New Findings On Behav...
Beyond Valence In Customer Dissatisfaction A Review And New Findings On Behav...
 
Presentación inglés 16 abril
Presentación inglés 16 abrilPresentación inglés 16 abril
Presentación inglés 16 abril
 
Keith Cowling & Dennis C. Mueller (1978)-The social costs of monopoly power
Keith Cowling & Dennis C. Mueller (1978)-The social costs of monopoly powerKeith Cowling & Dennis C. Mueller (1978)-The social costs of monopoly power
Keith Cowling & Dennis C. Mueller (1978)-The social costs of monopoly power
 
Guanxi connections as subtitutes for formal institutional support
Guanxi connections as subtitutes for formal institutional supportGuanxi connections as subtitutes for formal institutional support
Guanxi connections as subtitutes for formal institutional support
 
Kotabe global competitive marketing strategy ch08
Kotabe global competitive marketing strategy ch08Kotabe global competitive marketing strategy ch08
Kotabe global competitive marketing strategy ch08
 
Motywy Wordpressa Historia Prawdziwa
Motywy Wordpressa Historia PrawdziwaMotywy Wordpressa Historia Prawdziwa
Motywy Wordpressa Historia Prawdziwa
 
Motywy dla WordPressa - historia prawdziwa - WordUp Warszawa
Motywy dla WordPressa - historia prawdziwa - WordUp WarszawaMotywy dla WordPressa - historia prawdziwa - WordUp Warszawa
Motywy dla WordPressa - historia prawdziwa - WordUp Warszawa
 
Pronoms febles exercicis i solució
Pronoms febles exercicis i solucióPronoms febles exercicis i solució
Pronoms febles exercicis i solució
 
Jak nadążyć za światem front-endu - WordPress Training Day
Jak nadążyć za światem front-endu - WordPress Training DayJak nadążyć za światem front-endu - WordPress Training Day
Jak nadążyć za światem front-endu - WordPress Training Day
 
Dokąd zmierza WordPress?
Dokąd zmierza WordPress?Dokąd zmierza WordPress?
Dokąd zmierza WordPress?
 
Statycznie czy dynamicznie? v.2.0
Statycznie czy dynamicznie? v.2.0Statycznie czy dynamicznie? v.2.0
Statycznie czy dynamicznie? v.2.0
 
GAS LICUADO DE PETROLEO - GLP
GAS LICUADO DE PETROLEO - GLPGAS LICUADO DE PETROLEO - GLP
GAS LICUADO DE PETROLEO - GLP
 
Gas licuado de petroleo (2)
Gas licuado de petroleo (2)Gas licuado de petroleo (2)
Gas licuado de petroleo (2)
 
Motywy dla WordPressa - historia prawdziwa - WordUp Katowice
Motywy dla WordPressa - historia prawdziwa - WordUp KatowiceMotywy dla WordPressa - historia prawdziwa - WordUp Katowice
Motywy dla WordPressa - historia prawdziwa - WordUp Katowice
 

Semelhante a Hackers

Semelhante a Hackers (20)

Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
How to become Hackers .
How to become Hackers .How to become Hackers .
How to become Hackers .
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
Hackers Cracker Network Intruder
Hackers Cracker Network IntruderHackers Cracker Network Intruder
Hackers Cracker Network Intruder
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threads
 
Hackers
HackersHackers
Hackers
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats
 
TAMUC LO 7
TAMUC LO 7TAMUC LO 7
TAMUC LO 7
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Beekman5 std ppt_12
Beekman5 std ppt_12Beekman5 std ppt_12
Beekman5 std ppt_12
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 

Hackers