10
TOPIC : HACKING TOPIC : HACKING PRESENTER : PRESENTER : FATIMAH ZUBAIDAH BINTI MOHD FATIMAH ZUBAIDAH BINTI MOHD

Ict Hacking

  • Upload
    fatimah

  • View
    10.015

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Ict Hacking

TOPIC : HACKINGTOPIC : HACKING

PRESENTER : PRESENTER :

FATIMAH ZUBAIDAH BINTI MOHDFATIMAH ZUBAIDAH BINTI MOHD

Page 2: Ict Hacking

CONTENTCONTENT DEFINITIONDEFINITION HISTORY OF HACKERSHISTORY OF HACKERS SECURITY MEASURESECURITY MEASURE CONCLUSION CONCLUSION

Page 3: Ict Hacking

DEFINITIONDEFINITION Hacking is a source of threat to Hacking is a source of threat to

security in computer.security in computer. It is define as unauthorized access to It is define as unauthorized access to

the computer system by a hacker.the computer system by a hacker. Hackers are persons who learn about Hackers are persons who learn about

the computer system in details. They the computer system in details. They write program referred to as hacks.write program referred to as hacks.

Hackers may use a modem or cable Hackers may use a modem or cable to hack the targeted computers.to hack the targeted computers.

Page 4: Ict Hacking

THE HISTORY OF THE HISTORY OF HACKERSHACKERS Gary McKinnon:Gary McKinnon: This 41-year-old Scotsman, also known as Solo, is the This 41-year-old Scotsman, also known as Solo, is the

person behind of what’s considered the biggest hack in the history of person behind of what’s considered the biggest hack in the history of computer science - into a military system. Not satisfied with this, in the computer science - into a military system. Not satisfied with this, in the years 2001 and 2002, he made a mockery of the information security of years 2001 and 2002, he made a mockery of the information security of NASA itself and the Pentagon. Currently he is at liberty awarding his NASA itself and the Pentagon. Currently he is at liberty awarding his extradition to the U.S. and prohibited access to a computer with Internet extradition to the U.S. and prohibited access to a computer with Internet connection.connection.

Vladimir Levin: Vladimir Levin: This Russian biochemist and mathematician was accused This Russian biochemist and mathematician was accused of having committed one of the biggest bank robberies of all times. From of having committed one of the biggest bank robberies of all times. From Saint Petersburg, Levin managed to transfer funds estimated at Saint Petersburg, Levin managed to transfer funds estimated at approximately 10 million dollars from Citibank in New York to accounts approximately 10 million dollars from Citibank in New York to accounts he had opened in distant parts of the world. He was arrested by he had opened in distant parts of the world. He was arrested by INTERPOL in 1995 at Heathrow airport (England). Although he managed INTERPOL in 1995 at Heathrow airport (England). Although he managed to rob more than 10 million dollars, he was only sentenced to three years in to rob more than 10 million dollars, he was only sentenced to three years in prison. Currently he is free.prison. Currently he is free.

Page 5: Ict Hacking

Timothy Lloyd: In 1996, information services company Omega, Timothy Lloyd: In 1996, information services company Omega, provider of NASA and the United States Navy, suffered losses of provider of NASA and the United States Navy, suffered losses of around 10 million dollars. And it was none other than Tim Lloyd, around 10 million dollars. And it was none other than Tim Lloyd, an x-employee fired some weeks earlier, who was the cause of this an x-employee fired some weeks earlier, who was the cause of this financial disaster. Lloyd left a virtually activated information bomb financial disaster. Lloyd left a virtually activated information bomb in the company’s codes, which finally detonated July 31 of that in the company’s codes, which finally detonated July 31 of that same year. same year.

David Smith: Not all hackers can boast of creating the virus that David Smith: Not all hackers can boast of creating the virus that spread the fastest to computers the width and breadth of the spread the fastest to computers the width and breadth of the globe - David Smith can. In 1999, the father of the Melissa virus globe - David Smith can. In 1999, the father of the Melissa virus managed to infect and crash 100,000 email accounts with his managed to infect and crash 100,000 email accounts with his malicious creation. Smith, who was thirty years old at the time, malicious creation. Smith, who was thirty years old at the time, was sentenced and freed on bail.was sentenced and freed on bail.

MafiaBoy: In February of 2000, many of the most important online MafiaBoy: In February of 2000, many of the most important online companies in the US, such as eBay, Yahoo and Amazon, suffered a companies in the US, such as eBay, Yahoo and Amazon, suffered a technical glitch called Denial of Service, which caused a total of technical glitch called Denial of Service, which caused a total of 1700 million dollars in losses. But did these sites know that the 1700 million dollars in losses. But did these sites know that the perpetrator of the attack was a 16 year-old Canadian who perpetrator of the attack was a 16 year-old Canadian who responded to the alias MafiaBoy? Surely not, although it didn’t responded to the alias MafiaBoy? Surely not, although it didn’t take them long to find out, thanks to his bragging about his bad take them long to find out, thanks to his bragging about his bad deed to his classmates at school.deed to his classmates at school.

Page 6: Ict Hacking

SECURITY MEASURESECURITY MEASURE DATA BACKUPDATA BACKUP

• Data backup is a program of file duplication. Data backup is a program of file duplication. Backup of data applications are necessary so Backup of data applications are necessary so that they can be recovered in case of an that they can be recovered in case of an emergency.emergency.

ANTI-VIRUSANTI-VIRUS• An antivirus program protects a computer An antivirus program protects a computer

against viruses by identifying and removing against viruses by identifying and removing any computer viruses found in the computer any computer viruses found in the computer memory, on storage media or incoming email memory, on storage media or incoming email files.files.

Page 7: Ict Hacking

ANTI-SPYWAREANTI-SPYWARE• Spyware is a program place on a computer Spyware is a program place on a computer

without the user’s knowlegde. It secretly without the user’s knowlegde. It secretly collects infofmation about the user. collects infofmation about the user. Communicates information to the outside Communicates information to the outside source.source.

FIREWALLFIREWALL• Firewall is a piece of hardware or software Firewall is a piece of hardware or software

which function in a networked environment which function in a networked environment to prevent some communication forbidden to prevent some communication forbidden by the security policy.by the security policy.

Page 8: Ict Hacking

CONCLUSIONCONCLUSION Hacking is a criminal.Hacking is a criminal. Computers need good security Computers need good security

measure system to prevent from measure system to prevent from hacking.hacking.

Example of security measure Example of security measure system is Data Backup, Anti-system is Data Backup, Anti-Virus, Anti-Spyware and Firewall. Virus, Anti-Spyware and Firewall. Disaster Recovary system.Disaster Recovary system.

Page 9: Ict Hacking

REFERENCEREFERENCE INTERNETINTERNET

•www.wikipedia.comwww.wikipedia.com•www.trendwww.trend--micro.commicro.com

BOOKBOOK•Introduction to information and Introduction to information and

communication technologycommunication technology ( (• page 43, 45, 46 & 47) (page 43, 45, 46 & 47) (• SMK Pekan 2006.SMK Pekan 2006.

Page 10: Ict Hacking

--THAT’S ALL-THAT’S ALL-

-THANK YOU--THANK YOU-