34
HISTORY OF HACKING AND CYBE RCRIME BY BRUCE PHIL LI PS CRISSY HUGHES CARLOS BETETTA

History of Hacking and Cybercrime

  • Upload
    lilah

  • View
    50

  • Download
    0

Embed Size (px)

DESCRIPTION

History of Hacking and Cybercrime. By Bruce Phillips Crissy Hughes Carlos Betetta. Technological Developments . Blackberry. Xbox. IPad. Technological Developments. Internet & Computer Networks. Personal Computers . John draper aka captain crunch. John draper aka captain crunch. - PowerPoint PPT Presentation

Citation preview

Page 1: History of Hacking and Cybercrime

HISTORY

OF HACKING

AND CYBERCRIME

BY

BRUCE PH I L L I PS

CR ISSY HUGHES

CARLOS BETETTA

Page 2: History of Hacking and Cybercrime

TECHNOLOGICAL DEVELOPMENTS

IPad Blackberry

Xbox

Page 3: History of Hacking and Cybercrime

TECHNOLOGICAL DEVELOPMENTS

Personal Computers

Internet & Computer Networks

Page 4: History of Hacking and Cybercrime

JOHN DRAPER AKA CAPTAIN CRUNCH

Page 5: History of Hacking and Cybercrime

JOHN DRAPER AKA CAPTAIN CRUNCHKNOWN AS FATHER OF MODERN HACKING

ORIGINALLY RADAR TECHNICIAN

SUPPOSDLY CALLED NIXON

HACKED PHONE WITH THE USE OF A CAPTAIN CRUNCH CEREAL WHISTLE

TAUGHT STEVE WOZNIAK AND STEVE JOBS HOW TO MAKE “BLUE BOXES”

Page 6: History of Hacking and Cybercrime

JOHN DRAPER AKA CAPTAIN CRUNCH70’S SERVED TWO STINTS IN PRISON

CURRENTLY UNEMPLOYED

HACKED FOR THE FUN OF IT, NOT FOR $$$

Page 7: History of Hacking and Cybercrime

STEVE WOZNIAK

Page 8: History of Hacking and Cybercrime

STEVE WOZNIAKCO-FOUNDER OF APPLE

1970’S WAS A STUDENT AT BERKLEY & MEMBER OF “CALIFORNIA’S HOMEBREW COMPUTER CLUB”

MASS PRODUCED “BLUE BOXES” FOR TWO REASONS

1) GENERATE ENOUGH CASH FOR THEIR STARTUP COMPANY “APPLE”

2) FASCINATION BEHIND “THE POWER OF IDEAS” “THAT TWO TEENAGERS COULD BUILD A SMALL BOX FOR A HUNDRED DOLLARS AND CONTROL HUNDRED MILLIONS OF DOLLARS OF PHONE INFRASTRUCTURE

Page 9: History of Hacking and Cybercrime
Page 10: History of Hacking and Cybercrime

KEVIN MITNIK

Page 11: History of Hacking and Cybercrime

KEVIN MITNIKSTARTED AT AGE 12

HACKED:LA’s BUS PUNCH CARD SYSTEMCELL PHONESFAST FOOD SPEAKER SYSTEMSDEC COMPUTER SYSTEM

WENT ON TWO AND A HALF YEAR HACKING SPREE ACROSS THE COUNTRYCAUGHT BY “CELLULAR FREQUENCY DIRECTION-FINDING ANTENNA HOOKED UP TO A LAPTOP TO NARROW THE SEARCH TO AN APARTMENT COMPLEX”SENTENCED TO FIVE YEARS OF PRISON AND EIGHT MONTHS OF SOLITARY

Page 12: History of Hacking and Cybercrime

KEVIN MITNIKOWNS HIS OWN COMPUTER SECURITY CONSULTING COMPANY (MITNIK SECURITY CONSULTING, LLC)

NOW CAN LEGALLY HACK INTO SERVERS

STATED “IF I HAD PERFORMED THE SAME HACKS THAT I HAD DONE IN THE PAST TODAY, I WOULD MOST LIKELY BE IN GUANTANAMO BAY, CONSIDERING ALL THE SECURITY LAWS PASSED AFTER 9/11

Page 13: History of Hacking and Cybercrime
Page 14: History of Hacking and Cybercrime

HACKER LAWS• Why do we have hacker laws? • Development of New Technologies for

business and / or personal use

•Computers and Microchips

Page 15: History of Hacking and Cybercrime

HACKER LAWSOld Days

Thief’s Tools Crow Bar

Page 16: History of Hacking and Cybercrime

HACKER LAWSToday

Computer Wireless Sniffer Device

Page 17: History of Hacking and Cybercrime

FIRST COMPUTER HACKER LAWS• Computer Fraud and Abuse Act of 1984

to protect from cybercrimes Defined illegal acts with computer Computer EspionageComputer TrespassingDamage and Fraud with Computer

Page 18: History of Hacking and Cybercrime

FIRST COMPUTER HACKER LAWS• Computer Fraud and Abuse Act of 1984

Defined Criminal Conduct Accessing computers without authorization Accessing computers in excess of authority

** Company must have a good DBA and access policy

And using stolen information to cause loss, damage or fraud

Page 19: History of Hacking and Cybercrime

FIRST COMPUTER HACKER LAWS• Computer Fraud and Abuse Act of 1984 • In 1984, why the need for new computer

hacker laws? • Latest High Tech Device: Personal Computer

IBM-PC Bill Gates and Windows

Page 20: History of Hacking and Cybercrime

FIRST COMPUTER HACKER LAWS• Computer Fraud and Abuse Act of 1984

In 1984, Expansion of Programming Writing computer code to develop ‘Apps’ (software tools)

Some Programmers succumb to the Dark Side and developed worms and viruses

Page 21: History of Hacking and Cybercrime

PATRIOT ACT OF 2001 Disclosure of Electronic Communications to Law Enforcement

Authorities can get permission to intercept communications on Protected Computers

Bypassing Wiretap Statutes Including Computers outside the United States

Page 22: History of Hacking and Cybercrime

CALIFORNIA COMPREHENSIVE COMPUTER DATA ACCESS AND FRAUD

ACT State Specific Law

Allows Civil Actions (Lawsuits) and Compensatory Damages

Fines of $10,000 per offense and / or prison time

Page 23: History of Hacking and Cybercrime

SARBANES-OXLEY ACT 2002 created to improve corporate and auditing responsibilities

Section 404 establishing and maintaining internal controls

Results: Better internal controls and higher protection standards for all companies

Most companies implemented COSO

Page 24: History of Hacking and Cybercrime

CRITICS OF SARBANES-OXLEY ACT 2002 requirements are too strict and waste precious company resources

Association of Certified Fraud Examiners

Argued waste of company resources

2010 Restoring American Financial Stability Act – removed Sect 404 requirement for non-accelerated filers

Page 25: History of Hacking and Cybercrime

SARBANES-OXLEY ACT & PCAOB Audit Standard 5 provides guidance for conducting audits of the effectiveness of Internal Controls of Financial Reporting

Critics complain about the vagueness of the guidance and reporting standards

Page 26: History of Hacking and Cybercrime

People are the problem!

Page 27: History of Hacking and Cybercrime

Getting Into The Network• Keeping attackers out of your IT network all together provides

the best protection. • Hackers are continually finding new ways to get beyond

corporations’ IT security. • Employee education

•What needs to be protected?•What are the procedures and policies to follow?

• When an attack is successful, data and applications can be affected.

Page 28: History of Hacking and Cybercrime

Inside the Network BarrierUSB thumb drives

Laptops

Netbooks

Page 29: History of Hacking and Cybercrime

Inside the Network BarrierMP3 players

Digital Cameras

Printers

Scanners

Page 30: History of Hacking and Cybercrime

Inside the Network BarrierSmart Phones are carried in and out of corporations on a daily basis.

Page 31: History of Hacking and Cybercrime

Inside the Network BarrierCloak and Dagger!

• A hacker disguised as a repairman?

• Do they look like they should be there?

Page 32: History of Hacking and Cybercrime

Inside the Network BarrierIdentity Theft• Is your home network safe.• Do you understand and know the threats that are out

there.• Corporate protection of customer data.

Page 33: History of Hacking and Cybercrime

Inside the Network BarrierEmployee Threats• Can be intentional or unintentional.• Work stations left unattended.• Allowing a fellow employee access to an unauthorized

area.• Education of employees is essential.

Page 34: History of Hacking and Cybercrime

History of Hacking and Cybercrime

• Questions?