hackers l.
Skip this Video
Loading SlideShow in 5 Seconds..
Hackers PowerPoint Presentation
Download Presentation

Loading in 2 Seconds...

play fullscreen
1 / 15

Hackers - PowerPoint PPT Presentation

  • Uploaded on

Hackers. IT 3700/01 By Erin Clough. Hacker : is a technical term that refers to a person engaged in a criminal act of attempting to gain access to a computers system without authorization.

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript


IT 3700/01

By Erin Clough

what is a hacker
Hacker: is a technical term that refers to a person engaged in a criminal act of attempting to gain access to a computers system without authorization.

Title 18, United States code section 1030, enacted in 1984; Specifically states that in order for a crime to be illegal the perpetrator must “knowingly” be committing the crime. For the crime to be a federal offence the attacker must have caused at least $5,000 in damages.

What Is A Hacker?
who are your major threats
Who Are YourMajor Threats?
  • Disgruntled employees: most dangerous and likely to occur with company security, these attacks can do serious damage to the network
  • Security experts: work with internet service companies to test their security systems and often find new hacking exploits in systems
  • Script kiddies: students who use hacking as a way to get free stuff: software and music. These attacks comprise 90% of internet hacking
who are your major threats4
Who Are Your Major Threats?
  • Underemployed adults: are often the creators of “crackz” used to unlock commercial software
  • Ideological hackers: use hacking as a way to further a political purpose, by defacing websites or dos attacks like the “code red” worm
  • Criminal hackers: seek out personal information for monetary gain and revenge, seeks out such things as credit card and bank account numbers
  • Corporate spies: found in high technology businesses
how hackers access your network
How Hackers Access Your Network





how hackers access your network6
How Hackers Access Your Network
  • Internet: attackers find vulnerabilities or flaws in the web servers and operating systems to deface the web site or penetrate the network
  • Wireless LANs: attackers can easily access networks as long as they are in a close vicinity to the companies WLAN, commonly known as “war driving”
how hackers access your network7
How Hackers Access Your Network
  • Direct intrusion (Door): attackers can enter the building directly and if left unattended can access the administrative user accounts to create a new user identity and access the network remotely
  • Dial-up (Modem): attackers can enter company networks through exploiting a modem connected to the company’s remote assess server
targeting the victim
Targeting TheVictim
  • Factors that determine the specific computer a hacker will attack
  • Domain Name Service
  • Network Address Scanning
  • Port Scanning
  • Service Scanning
information gathering how hackers collect the data
Information Gathering-How Hackers Collect the Data-
  • SNMP Data Gathering: simple network management protocol, allows remote querying to maintain the status and control of the operating network systems
  • Directory Service Lookups
  • Architecture Probes: “fingerprinting” allows hackers to communicate to host computers by sending and receiving error messages in order to determine the hosts operating system
  • Sniffing
most common attack methods
Denial of Service

Floods: attacks protocols that transmit data in order to slow or crash the server network

Forged E-mail

Automated Password Guessing

Buffer Overruns

Source Routing

Session Hijacking


Trojan Horses: returns your information to the hacker or allows direct access to your computer

Most Common Attack Methods
general attack trends in business
General Attack Trends In Business

Attacks vary depending on

  • Days of the Week
  • Certain Hours of the Day
  • Industry
  • Size of the Company
  • In 2002, on average 30 attacks were recorded per week per company
  • 85% were classified as pre-attack reconnaissance, like launching a scan to detect a particular service
  • 15% were actual attempts or successful attacks on networks
  • 2003 beginning year attacks skyrocketed by 84% in the first three months
top ten countries that account for cyber attacks
80% of all attacks originate from 10 countries

1. United States

2. South Korea

3. China

4. Germany

5. France

6. Taiwan

7. Canada

8. Italy

9. Great Britain

10. Japan

-The growth of Broadband connection is the major influencing factor in cyber attacks

Top Ten Countries That Account For Cyber Attacks
what s next
What’s Next?
  • Information Security is the “hottest topic” for anyone who uses the computer for personal or business purposes
  • The next sections will discuss
    • Current news event trends in security
    • How organizations can design and implement successful security for their networks
    • What is the Internet and how to protect your information
    • Current technological companies in the security market
    • Why understanding internet security is critical for IT and IS