1 / 13

Hacking

Hacking. Pushing Technology Forward Jackson Kleintz. What is Computer Hacking?. Hacking, in the computer world, refers to security related cyber crime. Hackers access information and media that they should not have access to. Birth of Hacking 1.

Download Presentation

Hacking

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Hacking Pushing Technology Forward Jackson Kleintz

  2. What is Computer Hacking? • Hacking, in the computer world, refers to security related cyber crime. • Hackers access information and media that they should not have access to

  3. Birth of Hacking1 • The first instance of hacking occurred when a group of teenagers wanted to understand the Bell Telephone system1 • Rather than actually connect calls, they fooled around, “hacking” the system, and were eventually caught and fired 8

  4. Why do people hack? • Previously, people would hack for fun and simply to gain access to new information • Hackers now are often in it for money, with the ability to sell their acquired information on the black market • The data they steal is very valuable, stolen from major companies or government agencies, and others are willing to pay a hefty sum

  5. History of Hacking1 • 1971: John Draper uses a whistle to perfectly replicate the tones needed for unlimited long distance calling • 1987: Herbert Zinn, 17, is arrested in his home for nearly hacking into the central telephone-switching system and essentially bringing communication to a stand still • 1998: “The Masters of Downloading” claim to have broken into Pentagon databases and threaten to sell military satellite system software to terrorist organizations

  6. Influential Hackers The world of technology is constantly being driven forward by hacking. As hacking pushed technology, these men pushed hacking.

  7. Julian Assange7 • Assange created Wikileaks in 2006 with other like-minded people • Developed a nomadic lifestyle to prevent arrest and constantly change jurisdictions • He became prominent in the world after releasing classified military documents and videos in 2010 • After escaping U.S. persecuting, Switzerland filed for extradition for accused rape charges • He is currently avoiding extradition in the Ecuadorean Embassy in London 2

  8. Kevin Mitnick1 • Arrested in 1995 • Hacked into over 20,000 U.S. computers • Stole addresses, phone numbers and credit card information 9

  9. Vladamir Levin1 • Also arrested in 1995 • Hacked into Citibank’s international database from Berlin • Tried in U.S. and served 3 years in federal prison 3

  10. Fight against Hacking Hacking was never a problem that the founding fathers could have foreseen, but luckily measures are in place to allow the U.S. government to react accordingly.

  11. Laws and Acts • 1984 Computer Fraud and Abuse Acti. • Over time, the Computer Fraud and Abuse Act has been modified often to improve the ability to prosecute. • The Cyber Security Enhancement Act was passed in 2002, in hand with the Homeland Security Act, to even further extend the reach of the Computer Fraud and Abuse Act.

  12. The Future of Hacking6 • Potential of quantum computing will make hacking incredibly easier for black hat hackers • Hackers interested in getting a real job can look to major companies for “white hat” hacking jobs • Companies want their own hackers finding the flaws in their security and fixing them before anyone else does

  13. References • http://www.dynamicchiropractic.com/mpacms/dc/article.php?id=18078 • http://thedailyblog.co.nz/2014/08/26/assange-greenwald-to-appear-at-town-hall-meeting-kdc-is-not-the-hacker-after-all/ • http://www.rockefellercenter.com/shop-and-eat/citibank/ • http://www.sans.org/reading-room/whitepapers/legal/federal-computer-crime-laws-1446 • http://www.wired.com/2006/11/trials_underway/ • http://www.businessweek.com/articles/2014-08-28/for-quantum-hackings-threat-startups-offer-futureproofing • http://www.bbc.com/news/world-11047811 • http://en.wikipedia.org/wiki/Telephone_switchboard • http://www.rugusavay.com/kevin-mitnick-quotes/

More Related