Hacking Final PPT JMD
Hacking Final PPT JMD
CONTENTS
What is hacking? Timeline of hacking Types of hacking The Threats Some Hacking Incidents Who is Hackers? Why do Hackers Hack? Hackers Attitudes Indian IT Act 2000 Computer Fraud And Abuse Act Conclusion References
WHAT IS HACKING?
In computer networking, hacking is any technical effort to manipulate the normal behavior of network
make
this
distinction,
however.
Outside
of
academia, its extremely common to see the term "hack" misused and be applied to cracks as well.
TIMELINE OF HACKING
1969 - Unix hacked together 1971 - Cap and Crunch phone exploit discovered 1988 - Morris Internet worm crashes 6,000 servers 1994 - $10 million transferred from CitiBank accounts
undergoing maintenance)
exploited bug in MS IIS to penetrate & spread probes random IPs for systems running IIS had trigger time for denial-of-service attack 2nd wave infected 360000 servers in 14 hours
Code Red 2 - had backdoor installed to allow remote control Nimda-used multiple infection mechanisms email,
TYPES OF HACKING
Normal data transfer
Interruption
Interception
Modification
Fabrication
THE THREATS
Denial of Service (Yahoo, eBay, CNN, MS) Loss of data (destruction, theft) Divulging private information (Air Miles, celebrities)
Internet Worm
Cuckoos Egg
German hackers.
WHO IS HACKER?
A
person
that
Just for fun Show off Notify many people their thought Steal important information Destroy enemys computer network during the war. For personal and financial gains.
HACKERS ATTITUDES
HACKERS ATTITUDE WHITE HAT HACKER DEFINITION A white hat hacker, also rendered as ethical hacker, is, in the realm of information technology, a person who is ethically
A black hat hacker is a person who compromises the security of a computer system without permission from an
HACKERS ATTITUDES
HACKERS ATTITUDE
GREY HAT HACKER
DEFINITION
They are a hybrid between white and black hat hackers who sometimes hacks ethically and sometimes illegally.
HACKERS ATTITUDES
HACKERS ATTITUDE SCRIPT KIDDIES DEFINITION A computer intruder with little or no skill; a person who simply follows directions or uses a cook-book approach. HACKTIVIST A hacktivist is a hacker who utilizes technology message. to announce a political
HACKERS ATTITUDES
HACKERS ATTITUDE ELITE HACKER DEFINITION A social status among hackers, elite is
A Neophyte or "newbie" is someone who is new to hacking and has almost no knowledge or experience of the workings of hacking technologies.
Black hat hacker is the alternate name for crackers who use their skills for destructive purposes.
A black hat hacker is a person who uses their knowledge of vulnerabilities and exploits for private gain, rather than revealing them either to the
Black hats may seek to expand holes in systems; prevent others from compromising the system on which they have already obtained secure control.
The term white hat hacker or ethical hacker is also often used to describe those who attempt to break into systems or networks in order to help the owners of the system by making them aware of
security flaws.
Many such people are employed by computer security companies; these professionals are
sometimes called sneakers. Groups of these people are called tiger teams.
Like black hats, white hats are often intimately familiar with the internal details of security systems, and can find a solution to a tricky problem.
A Grey Hat in the computer security community, includes a skilled hacker who sometimes acts destructively and other times in good will.
malicious
intentions,
but
may
or
may
not
A grey hat will not necessarily notify the system admin of a penetrated system of their carried out penetration.
Whoever with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the
Whoever commits hacking shall be punished with imprisonment up to three years, or with fine upto two lakh rupees, or with both.
Hacking law 1 as stated in the section 11 of the Atomic Energy Act of 1954
Knowingly accesses a computer without
authorization or exceeds authorized access, and by means of such conduct obtains information that has been determined by the United States Government
statute to require protection against unauthorized disclosure for reasons of national defense or foreign
Hacking law 2 as stated in section 1602 of title 15 of Fair Credit Reporting Act (15 U.S.C. 1681)
Intentionally
accesses
computer
without
authorization or exceeds authorized access, and thereby obtains information contained in a financial record of a financial institution, or of a card issuer as defined in section 1602(n) of title 15, as such
Hacking law 3
Intentionally, without authorization to access any computer of a department or agency of the United
States,
accesses
such
computer
of
that
department or agency that is exclusively for the use of the Government of the United States or, in the case of a computer not exclusively for such use, is used by or for the Government of the United States.
Hacking law 4
Knowingly and with intent to defraud, accesses a Federal interest computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value, unless the object of the fraud and the thing obtained consists only of the use of the computer. Shall be punished as provided in
SUBSECTION C
(A)A fine under this title or imprisonment for not
Hacking law 5 Intentionally accesses a Federal interest computer without authorization, and by means of one or more
commerce; or
(B) Such computer is used by or for the Government of the United States.
CONCLUSION
There is no separate detailed law in India for Computer Fraud, Abuse, Tempering and Hacking.
Provision should be made in Indian IT Act 2000 to encourage Ethical Hacking because Ethical
REFRENCES
1. 2.
www.cyberlawsindia.net www.protectivehacks.com/hackinglaws.html
3.
4. 5.
www.cybercrime.gov/reporting.htm
www.asianlaws.org/abuse/hacking www.kyrion.in/security/hacking