8/3/2019 Who is Using Your PC
http://slidepdf.com/reader/full/who-is-using-your-pc 1/21
PresentedBy
X
8/3/2019 Who is Using Your PC
http://slidepdf.com/reader/full/who-is-using-your-pc 2/21
Who are hackers?
Why they do hacking?
How it affects the society?
8/3/2019 Who is Using Your PC
http://slidepdf.com/reader/full/who-is-using-your-pc 3/21
•Phishing •Malware
•DOS •Trojan Horses
•Worms •Virus
•Botnet
•
Spyware
•Spam
8/3/2019 Who is Using Your PC
http://slidepdf.com/reader/full/who-is-using-your-pc 4/21
Black Hat
White Hat
oGray Hat
oBlue Hat
8/3/2019 Who is Using Your PC
http://slidepdf.com/reader/full/who-is-using-your-pc 5/21
Terror Organization
Smugglers
Online Thief
Mafia
8/3/2019 Who is Using Your PC
http://slidepdf.com/reader/full/who-is-using-your-pc 6/21
Al-Qaida /Taliban
For Terrorist Activities
Main Weapon – Viruses
Join Task Force-Global Network Operations
8/3/2019 Who is Using Your PC
http://slidepdf.com/reader/full/who-is-using-your-pc 7/21
Stacey Davida
Credit card and, Shippingand Billing Address
3asfh.net
8/3/2019 Who is Using Your PC
http://slidepdf.com/reader/full/who-is-using-your-pc 8/21
Financed 2002 explosion
Killed more than 200 people
“Learn to Hack”-Imam Samudra
8/3/2019 Who is Using Your PC
http://slidepdf.com/reader/full/who-is-using-your-pc 9/21
Celebrity Phone hacking (2010)
Sony Hacking Case (2009)-PlayStation network
shut down
Phone Hacking case (2011)- News of the world
8/3/2019 Who is Using Your PC
http://slidepdf.com/reader/full/who-is-using-your-pc 10/21
T.J. Maxx theft- 45.7 million credit/ debit
card user at risk
Pentagon hacking case- Gary McKinnon
(biggest military computer hack of all time)
8/3/2019 Who is Using Your PC
http://slidepdf.com/reader/full/who-is-using-your-pc 11/21
Targeting
Research and Information Gathering
Code program
Break code
8/3/2019 Who is Using Your PC
http://slidepdf.com/reader/full/who-is-using-your-pc 12/21
PCQ VMJYPD LBYK LYSO KBXBJXWXV BXV ZCJPO EYPD KBXBJYUXJ LBJOOKCPK. CP LBO LBCMKXPV XPV IYJKL PYDBL, QBOP KBO BXV OPVOV LBOLXRO CI SX'XJMI, KBO JCKO XPV EYKKOV LBO DJCMPV ZOICJO BYS,KXUYPD: “DJOXL EYPD, ICJ X LBCMKXPV XPV CPO PYDBLK Y BXNO ZOOP
JOACMPLYPD LC UCM LBO IXZROK CI FXKL XDOK XPV LBO RODOPVK CIXPAYOPL EYPDK. SXU Y SXEO KC ZCRV XK LC AJXNO X IXNCMJ CI UCMJSXGOKLU?” OFYRCDMO, LXROK IJCS LBO LBCMKXPV XPV CPO PYDBLK
8/3/2019 Who is Using Your PC
http://slidepdf.com/reader/full/who-is-using-your-pc 13/21
We identify the most common characters, diagrams and trigrams in
the cipher text
PCQ VMJYPD LBYK LYSO KBXBJXWXV BXV ZCJPO EYPDKBXBJYUXJ LBJOO KCPK. CP LBO LBCMKXPV XPV IYJKL PYDBL,QBOP KBO BXV OPVOV LBO LXRO CI SX'XJMI, KBO JCKO XPVEYKKOV LBO DJCMPV ZOICJO BYS, KXUYPD: “DJOXL EYPD, ICJ
X LBCMKXPV XPV CPO PYDBLK Y BXNO ZOOP JOACMPLYPD LCUCM LBO IXZROK CI FXKL XDOK XPV LBO RODOPVK CI XPAYOPLEYPDK. SXU Y SXEO KC ZCRV XK LC AJXNO X IXNCMJ CI UCMJSXGOKLU?” OFYRCDMO, LXROK IJCS LBO LBCMKXPV XPV CPO PYDBLK
First guess:◦ LBO is THE
8/3/2019 Who is Using Your PC
http://slidepdf.com/reader/full/who-is-using-your-pc 14/21
Assuming LBO represents THE, we replace L with T, B with H,
and O with E and get
PCQ VMJYPD THYK TYSE KHXHJXWXV HXV ZCJPE EYPDKHXHJYUXJ THJEE KCPK. CP THE THCMKXPV XPV IYJKTPYDHT, QHEP KHO HXV EPVEV THE LXRE CI SX'XJMI, KHE JCKEXPV EYKKEV THE DJCMPV ZEICJE HYS, KXUYPD: “DJEXT EYPD, ICJ X THCMKXPV XPV CPE PYDHTK Y HXNE ZEEP JEACMPTYPDTC UCM THE IXZREK CI FXKT XDEK XPV THE REDEPVK CIXPAYEPT EYPDK. SXU Y SXEE KC ZCRV XK TC AJXNE X IXNCMJCI UCMJ SXGEKTU?”
EFYRCDME, TXREK IJCS THE THCMKXPV XPV CPE PYDBTK
8/3/2019 Who is Using Your PC
http://slidepdf.com/reader/full/who-is-using-your-pc 16/21
Now during this time Shahrazad had borne King Shahriyar threesons.
On the thousand and first night, when she had ended the tale of
Ma'aruf , she rose and kissed the ground before him, saying: “Great
King, for a thousand and one nights I have been recounting toyou the fables of past ages and the legends of ancient kings.May I make so bold as to crave a favour of your majesty?”
Epilogue, Tales from the Thousand and One Nights
8/3/2019 Who is Using Your PC
http://slidepdf.com/reader/full/who-is-using-your-pc 17/21
1. ILOVEYOU
2. Mydoom
3. Blaster4. Sobig Worm
5. Code Red
6. CIH
7. Klez
8. Melissa9. Sasser
10. Bagle
8/3/2019 Who is Using Your PC
http://slidepdf.com/reader/full/who-is-using-your-pc 18/21
Check Email details
Valid website
Secure online payment
Spam unsecure mail
8/3/2019 Who is Using Your PC
http://slidepdf.com/reader/full/who-is-using-your-pc 19/21
Never keep Personal information Online
Never use unsecure network
Change password once a month
Get update with online security
8/3/2019 Who is Using Your PC
http://slidepdf.com/reader/full/who-is-using-your-pc 20/21
Online security is today's main concern.
R&D should put more concern on it.
World need to fight together.
Never try it, its illegal.