1 / 34

History of Hacking and Cybercrime

History of Hacking and Cybercrime. By Bruce Phillips Crissy Hughes Carlos Betetta. Technological Developments . Blackberry. Xbox. IPad. Technological Developments. Internet & Computer Networks. Personal Computers . John draper aka captain crunch. John draper aka captain crunch.

lilah
Download Presentation

History of Hacking and Cybercrime

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. History of Hacking and Cybercrime By Bruce Phillips Crissy Hughes Carlos Betetta

  2. TechnologicalDevelopments Blackberry Xbox IPad

  3. Technological Developments Internet & Computer Networks Personal Computers

  4. John draper aka captain crunch

  5. John draper aka captain crunch • KNOWN AS FATHER OF MODERN HACKING • ORIGINALLY RADAR TECHNICIAN • SUPPOSDLY CALLED NIXON • HACKED PHONE WITH THE USE OF A CAPTAIN CRUNCH CEREAL WHISTLE • TAUGHT STEVE WOZNIAK AND STEVE JOBS HOW TO MAKE “BLUE BOXES”

  6. John draper aka captain crunch • 70’S SERVED TWO STINTS IN PRISON • CURRENTLY UNEMPLOYED • HACKED FOR THE FUN OF IT, NOT FOR $$$

  7. Steve wozniak

  8. STEVE WOZNIAK • CO-FOUNDER OF APPLE • 1970’S WAS A STUDENT AT BERKLEY & MEMBER OF “CALIFORNIA’S HOMEBREW COMPUTER CLUB” • MASS PRODUCED “BLUE BOXES” FOR TWO REASONS • 1) GENERATE ENOUGH CASH FOR THEIR STARTUP COMPANY “APPLE” • 2) FASCINATION BEHIND “THE POWER OF IDEAS” “THAT TWO TEENAGERS COULD BUILD A SMALL BOX FOR A HUNDRED DOLLARS AND CONTROL HUNDRED MILLIONS OF DOLLARS OF PHONE INFRASTRUCTURE

  9. Kevin mitnik

  10. Kevin mitnik • STARTED AT AGE 12 • HACKED: • LA’s BUS PUNCH CARD SYSTEM • CELL PHONES • FAST FOOD SPEAKER SYSTEMS • DEC COMPUTER SYSTEM • WENT ON TWO AND A HALF YEAR HACKING SPREE ACROSS THE COUNTRY • CAUGHT BY “CELLULAR FREQUENCY DIRECTION-FINDING ANTENNA HOOKED UP TO A LAPTOP TO NARROW THE SEARCH TO AN APARTMENT COMPLEX” • SENTENCED TO FIVE YEARS OF PRISON AND EIGHT MONTHS OF SOLITARY

  11. Kevin mitnik • OWNS HIS OWN COMPUTER SECURITY CONSULTING COMPANY (MITNIK SECURITY CONSULTING, LLC) • NOW CAN LEGALLY HACK INTO SERVERS • STATED “IF I HAD PERFORMED THE SAME HACKS THAT I HAD DONE IN THE PAST TODAY, I WOULD MOST LIKELY BE IN GUANTANAMO BAY, CONSIDERING ALL THE SECURITY LAWS PASSED AFTER 9/11

  12. Hacker Laws • Why do we have hacker laws? • Development of New Technologies for business and / or personal use • Computers and Microchips

  13. Hacker Laws Old Days Thief’s Tools Crow Bar

  14. Hacker Laws Today Computer Wireless Sniffer Device

  15. First Computer Hacker Laws • Computer Fraud and Abuse Act of 1984 • to protect from cybercrimes • Defined illegal acts with computer • Computer Espionage • Computer Trespassing • Damage and Fraud with Computer

  16. First Computer Hacker Laws • Computer Fraud and Abuse Act of 1984 • Defined Criminal Conduct • Accessing computers without authorization • Accessing computers in excess of authority • ** Company must have a good DBA and access policy • And using stolen information to cause loss, damage or fraud

  17. First Computer Hacker Laws • Computer Fraud and Abuse Act of 1984 • In 1984, why the need for new computer hacker laws? • Latest High Tech Device: Personal Computer • IBM-PC • Bill Gates and Windows

  18. First Computer Hacker Laws • Computer Fraud and Abuse Act of 1984 • In 1984, Expansion of Programming • Writing computer code to develop ‘Apps’ (software tools) • Some Programmers succumb to the Dark Side and developed worms and viruses

  19. PATRIOT Act of 2001 • Disclosure of Electronic Communications to Law Enforcement • Authorities can get permission to intercept communications on Protected Computers • Bypassing Wiretap Statutes • Including Computers outside the United States

  20. California Comprehensive Computer Data Access and Fraud Act • State Specific Law • Allows Civil Actions (Lawsuits) and Compensatory Damages • Fines of $10,000 per offense and / or prison time

  21. Sarbanes-Oxley Act 2002 • created to improve corporate and auditing responsibilities • Section 404 establishing and maintaining internal controls • Results: Better internal controls and higher protection standards for all companies • Most companies implemented COSO

  22. Critics of Sarbanes-Oxley Act 2002 • requirements are too strict and waste precious company resources • Association of Certified Fraud Examiners • Argued waste of company resources • 2010 Restoring American Financial Stability Act – removed Sect 404 requirement for non-accelerated filers

  23. Sarbanes-Oxley Act & PCAOB • Audit Standard 5 provides guidance for conducting audits of the effectiveness of Internal Controls of Financial Reporting • Critics complain about the vagueness of the guidance and reporting standards

  24. People are the problem!

  25. Getting Into The Network • Keeping attackers out of your IT network all together provides the best protection. • Hackers are continually finding new ways to get beyond corporations’ IT security. • Employee education • What needs to be protected? • What are the procedures and policies to follow? • When an attack is successful, data and applications can be affected.

  26. Inside the Network Barrier • USB thumb drives • Laptops • Netbooks

  27. Inside the Network Barrier • MP3 players • Digital Cameras • Printers • Scanners

  28. Inside the Network Barrier • Smart Phones are carried in and out of corporations on a daily basis.

  29. Inside the Network Barrier • Cloak and Dagger! • A hacker disguised as a repairman? • Do they look like they should be there?

  30. Inside the Network Barrier • Identity Theft • Is your home network safe. • Do you understand and know the threats that are out there. • Corporate protection of customer data.

  31. Inside the Network Barrier • Employee Threats • Can be intentional or unintentional. • Work stations left unattended. • Allowing a fellow employee access to an unauthorized area. • Education of employees is essential.

  32. History of Hacking and Cybercrime • Questions?

More Related