Upload
fatimah
View
10.015
Download
0
Embed Size (px)
Citation preview
TOPIC : HACKINGTOPIC : HACKING
PRESENTER : PRESENTER :
FATIMAH ZUBAIDAH BINTI MOHDFATIMAH ZUBAIDAH BINTI MOHD
CONTENTCONTENT DEFINITIONDEFINITION HISTORY OF HACKERSHISTORY OF HACKERS SECURITY MEASURESECURITY MEASURE CONCLUSION CONCLUSION
DEFINITIONDEFINITION Hacking is a source of threat to Hacking is a source of threat to
security in computer.security in computer. It is define as unauthorized access to It is define as unauthorized access to
the computer system by a hacker.the computer system by a hacker. Hackers are persons who learn about Hackers are persons who learn about
the computer system in details. They the computer system in details. They write program referred to as hacks.write program referred to as hacks.
Hackers may use a modem or cable Hackers may use a modem or cable to hack the targeted computers.to hack the targeted computers.
THE HISTORY OF THE HISTORY OF HACKERSHACKERS Gary McKinnon:Gary McKinnon: This 41-year-old Scotsman, also known as Solo, is the This 41-year-old Scotsman, also known as Solo, is the
person behind of what’s considered the biggest hack in the history of person behind of what’s considered the biggest hack in the history of computer science - into a military system. Not satisfied with this, in the computer science - into a military system. Not satisfied with this, in the years 2001 and 2002, he made a mockery of the information security of years 2001 and 2002, he made a mockery of the information security of NASA itself and the Pentagon. Currently he is at liberty awarding his NASA itself and the Pentagon. Currently he is at liberty awarding his extradition to the U.S. and prohibited access to a computer with Internet extradition to the U.S. and prohibited access to a computer with Internet connection.connection.
Vladimir Levin: Vladimir Levin: This Russian biochemist and mathematician was accused This Russian biochemist and mathematician was accused of having committed one of the biggest bank robberies of all times. From of having committed one of the biggest bank robberies of all times. From Saint Petersburg, Levin managed to transfer funds estimated at Saint Petersburg, Levin managed to transfer funds estimated at approximately 10 million dollars from Citibank in New York to accounts approximately 10 million dollars from Citibank in New York to accounts he had opened in distant parts of the world. He was arrested by he had opened in distant parts of the world. He was arrested by INTERPOL in 1995 at Heathrow airport (England). Although he managed INTERPOL in 1995 at Heathrow airport (England). Although he managed to rob more than 10 million dollars, he was only sentenced to three years in to rob more than 10 million dollars, he was only sentenced to three years in prison. Currently he is free.prison. Currently he is free.
Timothy Lloyd: In 1996, information services company Omega, Timothy Lloyd: In 1996, information services company Omega, provider of NASA and the United States Navy, suffered losses of provider of NASA and the United States Navy, suffered losses of around 10 million dollars. And it was none other than Tim Lloyd, around 10 million dollars. And it was none other than Tim Lloyd, an x-employee fired some weeks earlier, who was the cause of this an x-employee fired some weeks earlier, who was the cause of this financial disaster. Lloyd left a virtually activated information bomb financial disaster. Lloyd left a virtually activated information bomb in the company’s codes, which finally detonated July 31 of that in the company’s codes, which finally detonated July 31 of that same year. same year.
David Smith: Not all hackers can boast of creating the virus that David Smith: Not all hackers can boast of creating the virus that spread the fastest to computers the width and breadth of the spread the fastest to computers the width and breadth of the globe - David Smith can. In 1999, the father of the Melissa virus globe - David Smith can. In 1999, the father of the Melissa virus managed to infect and crash 100,000 email accounts with his managed to infect and crash 100,000 email accounts with his malicious creation. Smith, who was thirty years old at the time, malicious creation. Smith, who was thirty years old at the time, was sentenced and freed on bail.was sentenced and freed on bail.
MafiaBoy: In February of 2000, many of the most important online MafiaBoy: In February of 2000, many of the most important online companies in the US, such as eBay, Yahoo and Amazon, suffered a companies in the US, such as eBay, Yahoo and Amazon, suffered a technical glitch called Denial of Service, which caused a total of technical glitch called Denial of Service, which caused a total of 1700 million dollars in losses. But did these sites know that the 1700 million dollars in losses. But did these sites know that the perpetrator of the attack was a 16 year-old Canadian who perpetrator of the attack was a 16 year-old Canadian who responded to the alias MafiaBoy? Surely not, although it didn’t responded to the alias MafiaBoy? Surely not, although it didn’t take them long to find out, thanks to his bragging about his bad take them long to find out, thanks to his bragging about his bad deed to his classmates at school.deed to his classmates at school.
SECURITY MEASURESECURITY MEASURE DATA BACKUPDATA BACKUP
• Data backup is a program of file duplication. Data backup is a program of file duplication. Backup of data applications are necessary so Backup of data applications are necessary so that they can be recovered in case of an that they can be recovered in case of an emergency.emergency.
ANTI-VIRUSANTI-VIRUS• An antivirus program protects a computer An antivirus program protects a computer
against viruses by identifying and removing against viruses by identifying and removing any computer viruses found in the computer any computer viruses found in the computer memory, on storage media or incoming email memory, on storage media or incoming email files.files.
ANTI-SPYWAREANTI-SPYWARE• Spyware is a program place on a computer Spyware is a program place on a computer
without the user’s knowlegde. It secretly without the user’s knowlegde. It secretly collects infofmation about the user. collects infofmation about the user. Communicates information to the outside Communicates information to the outside source.source.
FIREWALLFIREWALL• Firewall is a piece of hardware or software Firewall is a piece of hardware or software
which function in a networked environment which function in a networked environment to prevent some communication forbidden to prevent some communication forbidden by the security policy.by the security policy.
CONCLUSIONCONCLUSION Hacking is a criminal.Hacking is a criminal. Computers need good security Computers need good security
measure system to prevent from measure system to prevent from hacking.hacking.
Example of security measure Example of security measure system is Data Backup, Anti-system is Data Backup, Anti-Virus, Anti-Spyware and Firewall. Virus, Anti-Spyware and Firewall. Disaster Recovary system.Disaster Recovary system.
REFERENCEREFERENCE INTERNETINTERNET
•www.wikipedia.comwww.wikipedia.com•www.trendwww.trend--micro.commicro.com
BOOKBOOK•Introduction to information and Introduction to information and
communication technologycommunication technology ( (• page 43, 45, 46 & 47) (page 43, 45, 46 & 47) (• SMK Pekan 2006.SMK Pekan 2006.
--THAT’S ALL-THAT’S ALL-
-THANK YOU--THANK YOU-