0% found this document useful (0 votes)
34 views15 pages

Hacherii in Ziua de Azi 222222

This document provides an overview of hacking today, including definitions of different types of hackers (white hat, black hat, gray hat), descriptions of famous hackers throughout history, and tips to protect yourself from hackers. It defines a hacker as someone who uses computer skills to overcome technical problems, sometimes illegally. It outlines how white hat hackers do security testing, black hat hackers access systems maliciously, and gray hats fall in between. The document then gives examples of major hacks through time and lists the top 15 tips to protect yourself, such as using strong passwords, two-factor authentication, keeping systems updated, and avoiding public Wi-Fi without a VPN.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views15 pages

Hacherii in Ziua de Azi 222222

This document provides an overview of hacking today, including definitions of different types of hackers (white hat, black hat, gray hat), descriptions of famous hackers throughout history, and tips to protect yourself from hackers. It defines a hacker as someone who uses computer skills to overcome technical problems, sometimes illegally. It outlines how white hat hackers do security testing, black hat hackers access systems maliciously, and gray hats fall in between. The document then gives examples of major hacks through time and lists the top 15 tips to protect yourself, such as using strong passwords, two-factor authentication, keeping systems updated, and avoiding public Wi-Fi without a VPN.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Theme:

Hacking today
S T UDENT O F T HE T I R - 3 6 G R O U P
Contents

Who is a Hacker?
Tips of Hacheries.
Hacker Terms
Hacking through the ages
Types of Hackers
The most famous hackers
Top 15 Tips To Protect Yourself From Hackers
Who is a Hacker?
• A hacker is an individual who uses computer,
networking or other skills to overcome a technical
problem. The term hacker may refer to anyone with
technical skills, but it often refers to a person who
uses his or her abilities to gain unauthorized access
to systems or networks in order to commit crimes.
A hacker may, for example, steal information to hurt
people via identity theft, damage or bring down
systems and, often, hold those systems hostage to
collect ransom.
Who is a Hacker?
• The term hacker has historically been a divisive one, sometimes
being used as a term of admiration for an individual who exhibits a
high degree of skill, as well as creativity in his or her approach to
technical problems. However, the term is more commonly applied
to an individual who uses this skill for illegal or unethical purposes.
Types of hackers
• The security community has informally used references to hat color as a way
different types of hacker are identified, usually divided into three types:
white hat, black hat and gray hat
Who are “white hat hackers?”
• White hat hackers, also known as ethical hackers,
strive to operate in the public's best interest, rather
than to create turmoil. Many white hat hackers work
doing penetration testing, hired to attempt to break
into the company's networks to find and report on
security vulnerabilities. The security firms then help
their customers mitigate security issues before
criminal hackers can exploit them.
Who are “black hat hackers?”
• Black hat hackers intentionally gain unauthorized access to
networks and systems with malicious intent, whether to
steal data, spread malware or profit from ransomware,
vandalize or otherwise damage systems or for any other
reason -- including gaining notoriety. Black hat hackers are
criminals by definition because they violate laws against
accessing systems without authorization, but they may also
engage in other illegal activity, including identity theft and
distributed denial-of-service attacks.
Who are “gray hat hackers?”
• Gray hat hackers fall somewhere between white hat hackers and
black hat hackers. While their motives may be similar to those of
white hat hackers, gray hats are more likely than white hat hackers
to access systems without authorization; at the same time, they are
more likely than black hat hackers to avoid doing unnecessary
damage to the systems they hack. Although they aren't typically --
or only -- motivated by money, gray hat hackers may offer to fix
vulnerabilities they have discovered through their own,
unauthorized, activities rather than using their knowledge to exploit
vulnerabilities for illegal profit.
Hacker Terms
• Hacking - showing computer expertise
• Cracking - breaching security on software or systems
• Phreaking - cracking telecom networks
• Spoofing - faking the originating IP address in a
datagram
• Denial of Service (DoS) - flooding a host with sufficient
network traffic so that it can’t respond anymore
• Port Scanning - searching for vulnerabilities
Hacking through the ages
 1 9 6 9 - UNIX ‘ HACK E D ’ TO G E T HE R
 1 9 71 - CA P ‘ N CR UNCH P HO NE E X P LO IT D I S COVE RE D
 1 9 8 8 - MO R R IS INT E R NET WO R M CR A S HE S 6 , 0 0 0 S E R VE R S
 1 9 9 4 - $ 1 0 MIL L ION T R A NS F E R RE D F R O M CI T I B A NK ACCO U NT S
 1 9 9 5 - K E VI N MI T NICK SENT ENCED TO 5 YEAR S IN J AIL
 20 0 0 - MA J O R WE B S I T ES S U CCU MB TO D D O S
 20 0 0 - 1 5,70 0 CR E DIT A ND D E B I T CA R D NU MB ER S S TO L E N F R O M WE S T E RN U NIO N
(HACK E D WHIL E WE B D ATA B A S E WA S U NDER GO ING MA I NT E NA NCE)
 20 0 1 CO DE R E D
 exploited bug in MS IIS to penetrate & spread
 probes random IPs for systems running IIS
 had trigger time for denial-of-service attack
 2nd wave infected 360000 servers in 14 hours
 CODE R E D 2 - HA D BACKDOOR INSTALLED TO ALLOW R EMOT E CONT R OL
 NIMDA - U SED MU LTIPLE INFECT ION MECHANISMS EMAIL, SHAR ES, WEB CLIENT, I I S
 20 02 – SL A MME R WO R M B R I NG S WE B TO I T S K NE E S B Y AT TACK I NG MS S QL
S E R VE R
Types of Hackers
• Criminal Hackers
• Real criminals, are in it for whatever they can get no matter who it
hurts

• Corporate Spies
• Are relatively rare

• Disgruntled Employees
• Most dangerous to an enterprise as they are “insiders”
• Since many companies subcontract their network services a
disgruntled vendor could be very dangerous to the host enterprise
The most famous hackers
But any medal has its two sides, the same situation with
computers and the Internet. If there are some means to
facilitate our lives, then there is someone who wants to
illegally use other people’s data. Such people are called
“hackers”. About them films are shot, after them special
services are chased. Meanwhile, the names of the ten
most famous hackers in history are already known. In
many ways, they have one thing in common: they all
have been caught by the authorities.
The most famous hackers
Kevin Mitnick Kevin Poulsen Adrian Lamo

Vladimir Levin Fred Cohen Mark Aben


Top 15 Tips To Protect Yourself From Hackers

 Step 1. Use Strong Passwords  Step 8: Use a Really Good Firewall


 Step 2: Use Two-Factor Authentication  Step 9. Make Your Phone’s Lock Code More Secure
 Step 3: Never Click on Suspicious Links  Step 10. Look Out for Social Engineering Attacks
 Step 4: Do Not Use P2P File Sharing Networks  Step 11. Lock Down Your Wireless Router
 Step 5: Keep Your System & Apps Updated  Step 12. Don’t Use Public Wi-Fi Without A VPN
 Step 6: Use Antivirus Products & Keep Them Up to Date  Step 13. Be careful while using thumb drive
 Step 7: Do Not Use Adobe Flash  Step 14. Try not to use public computers

 Step 15. Clear your browser history


THE END

You might also like