Hackers (Presentation)

advertisement
Hackers
Who are they? What do they do?

A hacker is a person who accesses
someone else’s computer without
authorization.
2
The Beginning of a Hacking Era

1960- The MIT (Massachusetts Institute
Technology) was the first institution to
offer a course in computer programming
and computer science. This was also the
place where hacking first started. The
MIT students called themselves hackers
because they were able to take
programs and make them perform
actions that it was not programmed to do
it was a practical joke to “hack away” all
day on the key board
3
Phone Phreaking

Phone Phreaking- a term
referred to exploration of
the phone network without
authorization. The first hack
was accomplished by John
Draper (also known as the
whistler and the grandfather
of Phreaking) his technique
was that he could perfectly
whistle into the phone and
make a free call.
4
Young Hackers
2010 -Hacker’s can be of any age the youngest hacker
was a 9- year old boy . “The boy used a teacher's login to
access Blackboard, and then modified class enrollment lists,
changed the password login details of teachers, and
modified homework assignments” April 21, 2010 Virginia
 1991- Mark Abene, 19, was the first hacker to serve time
in a Federal prison. He crashed the AT&T phone system
leaving 60,000 without a phone line for 9 hours.
 1983- FBI busted six teen-age hackers known as the
414’s. They were accused of 60 computer break-ins
including the Memorial Sloan- Kettering cancer center
and Los Alamos national Laboratory.

5
War Games

“War games: is a movie that
introduced hacking to the
public and the legend
hackers as “Cyber heroes”.
In the movie, the main
character, Matthew
Broderick, attempts to hack
into a videogame but
instead he hacks into the
military’s nuclear combat
stimulator computer.
6
Hacker Attitudes

White hat-A white hat hacker breaks security for non-malicious
reasons, for instance testing their own security system

Black Hat-Sometimes called "cracker", is someone who breaks
computer security without authorization or uses technology (usually
a computer, phone system or network) for vandalism, credit card
fraud, identity theft, piracy, or other types of illegal activity.

Grey Hat- A gray hat hacker is a combination of a Black Hat Hacker
and a White Hat Hacker. A Grey Hat Hacker will surf the internet
and hack into a computer system for the sole purpose of notifying
the administrator that their system has been hacked. Then they will
offer to repair their system for a small fee
7
Hacker Attitudes Continued

Blue Hat-A blue hat hacker is someone outside computer security
consulting firms who is used to bug test a system prior to its launch,
looking for exploits so they can be closed.

Elite -Elite is a term used to describe the most advanced hackers
who are said to be on “The cutting edge" of computing and network
technology.

Script Kiddie-A script kiddie is a non-expert who breaks into computer
systems by using pre-packaged automated tools written by others.

Neophyte-A neophyte or “Newbie" is a term used to describe
someone who is new to hacking or phreaking and has almost no
knowledge or experience of the workings of technology, and hacking

Hacktivist -a hacker who utilizes technology to announce a social,
ideological, religious, or political message..
8
Famous Hackers



Kevin Mitnick- “The most famous
hacker, he made a name for himself in
1981 at the age of 17 by getting into a
phone exchange, which allowed him to
redirect subscriber calls in any way he
wanted.”
1983- he achieved his first major coup
- and also his first arrest , when he
accessed a Pentagon computer. He
was sentenced to five years in prison
in the 1990s
Today he is a Security consultant and
owns his own company: Mitnick
Security.
9
Kevin Poulsen
He is the current editor in
chief of Wired.
 In 1983 he made his first
unlawful entry into different
networks. He was arrested in
April 1991 and in 1994 he
was sentenced to 4 years in
prison.

10
Famous Hackers
Black hat hackers
White hat hackers

Jonathan James

Stephen Wozniak:

Adrian Lamo

Tim Berners-Lee

Kevin Mitnick

Linus Torvalds

Kevin Poulsen

Richard Stallman

Robert Tappan Morris

Tsutomu Shimomura
11
Sources

http://www.focus.com/fyi/itsecurity/history-hacking/

http://www.tomshardware.com
/reviews/fifteen-greatesthacking-exploits,1790-2.html

http://www.francesfarmersreve
nge.com/stuff/misc/hack/index
.htm

http://www.itsecurity.com/fe
atures/top-10-famoushackers-042407/
12
Download
Study collections