Cybercrime
Download
1 / 13

Cybercrime - PowerPoint PPT Presentation


  • 138 Views
  • Uploaded on

Cybercrime. Computer Hacking. (1). What is Computer Hacking? Types of Computer Hackers. Table of Contents. Origins Motivation Consequences Major Crimes Ethical Stands. What is Computer Hacking?. (2). 1960 MIT (Massachusetts Institute of Technology) Tools & Hackers

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Cybercrime' - kaveri


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Cybercrime

Cybercrime

Computer Hacking

(1)


Table of contents

Table of Contents


What is computer hacking

  • Origins

  • Motivation

  • Consequences

  • Major Crimes

  • Ethical Stands

What is Computer Hacking?

(2)


Computer hacking history

Computer Hacking - History


Computer hacking motivation

Computer Hacking - Motivation


Computer hacking consequences

Computer Hacking - Consequences

(3)


Computer hacking major crimes

  • Adrian Lamo (New York 2003) electronic hardware)

    • Unauthorized access to a computer and possession of illegal stolen access devices

  • Kevin Mitnick

    • Most wanted computer criminal (U.S)

    • 1979 Unauthorized access (age 16)

    • Valuable info/ (Cellular telephone and computer companies, computer passwords)

Computer Hacking – Major Crimes


Computer hacking ethical stands

Computer Hacking – Ethical Stands

(4)


Types of computer hackers

Types of Computer Hackers

(5)


Types of computer hackers attitudes

  • White Hat electronic hardware)

    • Non-malicious reasons, enjoy learning (ex. testing their own security system)

  • Grey Hat

    • Beyond the point of a malicious intend

  • Black Hat/Cracker

    • Malicious reasons, uses technology for a wrong end, linked to illegal activity

  • Script kiddie

    • Non-expert, uses automated tools by other creators

  • Hacktivist

    • Defends ideological, religious or political means

Types of Computer Hackers - Attitudes


Types of computer hackers methods

  • Network enumeration electronic hardware)

    • Discovering information about the intended target.

  • Vulnerability analysis

    • Test the system.

  • Exploitation

    • Exploit vulnerabilities on the system.

  • Accessing Tools

    • Social engineering, Virus, Trojans, Worms, Key Loggers, etc.

Types of Computer Hackers - Methods


Summary conclusion
Summary & Conclusion electronic hardware)

  • Computer hacking was once an apt crime for a person whose computer skills exceeded others’. Now computer hacking could be performed by anybody that knows how to use the internet. Furthermore this crime is one of the hardest to detect, because the criminals do not leave any mark behind.


References
References electronic hardware)

  • http://www.britannica.com/blogs/2009/02/cybercrime-on-the-rise/ (1)

  • http://miklasnjor.com/en/2009/photography/illustration/computer-hacking-id-theft-common/ (2)

  • http://www.orkut-scrapping.com/Computer-Humor-14/default.aspx (3)

  • http://www.teentechguru.com/password-and-network-hacking-tools/ (4)

  • http://www.clipartguide.com/_pages/0511-0906-2321-1306.html (5)

  • http://www.voipcentral.org/entry/pc-hacking-though-voip-is-possible/ (6)


ad