1 / 15

Hackers

Hackers. IT 3700/01 By Erin Clough. Hacker : is a technical term that refers to a person engaged in a criminal act of attempting to gain access to a computers system without authorization.

Antony
Download Presentation

Hackers

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Hackers IT 3700/01 By Erin Clough

  2. Hacker: is a technical term that refers to a person engaged in a criminal act of attempting to gain access to a computers system without authorization. Title 18, United States code section 1030, enacted in 1984; Specifically states that in order for a crime to be illegal the perpetrator must “knowingly” be committing the crime. For the crime to be a federal offence the attacker must have caused at least $5,000 in damages. What Is A Hacker?

  3. Who Are YourMajor Threats? • Disgruntled employees: most dangerous and likely to occur with company security, these attacks can do serious damage to the network • Security experts: work with internet service companies to test their security systems and often find new hacking exploits in systems • Script kiddies: students who use hacking as a way to get free stuff: software and music. These attacks comprise 90% of internet hacking

  4. Who Are Your Major Threats? • Underemployed adults: are often the creators of “crackz” used to unlock commercial software • Ideological hackers: use hacking as a way to further a political purpose, by defacing websites or dos attacks like the “code red” worm • Criminal hackers: seek out personal information for monetary gain and revenge, seeks out such things as credit card and bank account numbers • Corporate spies: found in high technology businesses

  5. How Hackers Access Your Network Internet Wireless Modem Door

  6. How Hackers Access Your Network • Internet: attackers find vulnerabilities or flaws in the web servers and operating systems to deface the web site or penetrate the network • Wireless LANs: attackers can easily access networks as long as they are in a close vicinity to the companies WLAN, commonly known as “war driving”

  7. How Hackers Access Your Network • Direct intrusion (Door): attackers can enter the building directly and if left unattended can access the administrative user accounts to create a new user identity and access the network remotely • Dial-up (Modem): attackers can enter company networks through exploiting a modem connected to the company’s remote assess server

  8. Targeting TheVictim • Factors that determine the specific computer a hacker will attack • Domain Name Service • Network Address Scanning • Port Scanning • Service Scanning

  9. Information Gathering-How Hackers Collect the Data- • SNMP Data Gathering: simple network management protocol, allows remote querying to maintain the status and control of the operating network systems • Directory Service Lookups • Architecture Probes: “fingerprinting” allows hackers to communicate to host computers by sending and receiving error messages in order to determine the hosts operating system • Sniffing

  10. Denial of Service Floods: attacks protocols that transmit data in order to slow or crash the server network Forged E-mail Automated Password Guessing Buffer Overruns Source Routing Session Hijacking Man-in-the-Middle Trojan Horses: returns your information to the hacker or allows direct access to your computer Most Common Attack Methods

  11. General Attack Trends In Business Attacks vary depending on • Days of the Week • Certain Hours of the Day • Industry • Size of the Company • In 2002, on average 30 attacks were recorded per week per company • 85% were classified as pre-attack reconnaissance, like launching a scan to detect a particular service • 15% were actual attempts or successful attacks on networks • 2003 beginning year attacks skyrocketed by 84% in the first three months

  12. Attacks During The Week

  13. Percentage of Industry Attacks

  14. 80% of all attacks originate from 10 countries 1. United States 2. South Korea 3. China 4. Germany 5. France 6. Taiwan 7. Canada 8. Italy 9. Great Britain 10. Japan -The growth of Broadband connection is the major influencing factor in cyber attacks Top Ten Countries That Account For Cyber Attacks

  15. What’s Next? • Information Security is the “hottest topic” for anyone who uses the computer for personal or business purposes • The next sections will discuss • Current news event trends in security • How organizations can design and implement successful security for their networks • What is the Internet and how to protect your information • Current technological companies in the security market • Why understanding internet security is critical for IT and IS

More Related