Computer Threats PowerPoint

advertisement
Computer Threats
I can understand computer threats and
how to protect myself from these
threats.
Copy down these questions. Leave 3-4 spaces
between each question to write your answers.
1. Define hacker.
2. Are there different kinds of hackers?
3. What about teenage hackers?
4. Why would a hacker be interested in my
computer?
5. Can hackers steal credit cards?
6. What do hackers do with the information
they steal?
7. Is there anything else hackers can do if
they break into a computer?
What is a Hacker?

Although there is a great deal of
disagreement as to what a hacker actually is
(especially among hackers themselves), a
hacker is most commonly defined as anyone
who unlawfully breaks into a computer
system, whether an individual computer or a
network.
Are there different kinds of hackers?

Some hackers are offended by being labeled
as criminals and therefore attempt to divide
hackers into classes. Many hackers who
break into systems just for the challenge of it
(and who don't wish to steal or wreak havoc
on the systems) refer to themselves as whitehat hackers. They tout themselves as experts
who are performing a needed service for
society by helping companies uncover the
vulnerabilities in their systems.
Are there different kinds of hackers?

These white-hat hackers look down on those
hackers who use their knowledge to destroy
information or for illegal gain. These hackers are
known as black-hat hackers. (The terms white hat
and black hat are references to old Western movies
in which the heroes wore white hats and the outlaws
wore black hats.) Regardless of the hackers'
opinions, the laws in the United States and in many
other countries consider any unauthorized access to
computer systems a crime.
What about the teenage hackers who
get caught every so often?

These amateur hackers are often referred to
as script kiddies. Script kiddies don't create
programs used to hack into computer
systems; instead, they use tools created by
skilled hackers that enable unskilled novices
to wreak the same havoc as professional
hackers. Unfortunately, it is easy to find these
tools on the Web.
What about the teenage hackers who
get caught every so often?

Fortunately, because the users of these
programs are amateurs, they're usually not
proficient at covering their electronic tracks.
Therefore, it's relatively easy for law
enforcement officials to track them down and
prosecute them. Still, script kiddies can cause
a lot of disruption and damage to computers,
networks, and Web sites before they're
caught.
Why would a hacker be interested in
breaking into my home computer?


Some hackers just like to snoop. They enjoy the
challenge of breaking into systems and seeing what
information they can find. Other hackers are
hobbyists seeking information about a particular
topic wherever they can find it.
Because many people keep proprietary business
information on their home computers, hackers bent
on industrial espionage may break into home
computers. For other hackers, hacking is a way to
pass time.
Could a hacker steal my credit card
number?

If you perform financial transactions online such as
banking or buying goods and services, then you
probably do so using a credit card. Credit card and
bank account information can thus reside on your
hard drive and may be detectable by a hacker. Also,
many sites that you access require you to provide a
logon ID and password to gain access. Even if this
data is not stored on your computer, a hacker may
be able to capture it when you're online by using a
packet sniffer .
Could a hacker steal my credit card
number?

If you perform financial transactions online such as
banking or buying goods and services, then you
probably do so using a credit card. Credit card and
bank account information can thus reside on your
hard drive and may be detectable by a hacker. Also,
many sites that you access require you to provide a
logon ID and password to gain access. Even if this
data is not stored on your computer, a hacker may
be able to capture it when you're online by using a
packet sniffer .
Is there anything else hackers can do if
they break into my computer?


Hackers often use individuals' computers as a staging area for
mischief. To perpetrate widespread computer attacks, for
example,
hackers need to control many computers at the same time. To
this end, hackers often use Trojan horses to install other
programs on computers. A Trojan horse is a program that
appears to be something useful or desirable (like a game or a
screen saver), but at the same time does something malicious in
the background without your knowledge. The term Trojan horse
derives from Greek mythology and refers to the wooden horse
that the Greeks used to sneak into the city of Troy and conquer
it. Therefore, computer programs that contain a hidden (and
usually dreadful) "surprise" are referred to as Trojan horses.
What damage can Trojan horses do?

Often, the malicious activity perpetrated by a Trojan
horse program is the installation of backdoor
programs that allow hackers to take almost
complete control of your computer without your
knowledge. Using a backdoor program, hackers can
access and delete all files on your computer, send
e-mail, run programs, and do just about anything
else you can do with your computer. Computers that
hackers control in this manner are referred to as
zombies.
Download