SlideShare a Scribd company logo
1 of 22
.    /$$   /$$                      /$$
.   | $$ | $$                      | $$ /$$ /$$
.   | $$ | $$ /$$$$$$$     /$$$$$$$| $$ /$$ |    /$$$$$$$$   /$$$$$$$
.   | $$$$$$$$ /$$___/$$  /$$_____/| $$/$$    $$| $$___/ $$ /$$___/ $$
.   | $$ | $$| $$    |$$ | $$      | $$$$   | $$| $$   | $$| $$   | $$
.   | $$ | $$| $$    |$$ | $$      | $$ $$ | $$| $$   | $$| $$   | $$
.   | $$ | $$| $$$$$$$$$$| $$$$$$$| $$  $$| $$| $$    | $$| $$$$$$$$$
.   |__/ |__/ _________/ _______/|__/ _/|__/|__/    |__/|______| $$
                                                                  | $$
                                                                  | $$
                                                             /$$$$$$$/
                                                             |______/
                                     Yours truly,
                  Marc Leprince, Connor Kistler,
         Lauren Stracquatanio, and Nick Cortese
   Computer Security:
     Finding, and exploiting weaknesses of
     computers
      ○ Phishing, Spam E-mail, Virus, bots…

   Computer Science:
     The process of finding insights in problem-
     solving to create, innovate, and share
      ○ Computer Security, Facebook, Subculture
   White Hat:
     Ethical Hacker
   Black Hat:
     Malicious Hacker
   Cracker:
     people who enjoy breaking into computers and
      phreaking the phone system
      ○ The basic difference is this: hackers build things,
        crackers break them.
   Script Kiddie:
     Leeches/computer game hacks
 http://catb.org/~esr/faqs/hacker-howto.html
   Range from the Internet equivalent of
    petty theft to state-sponsored
    terrorism
     Personal Computer Users
     Corporations
     Governments/ National Security
   Spam E-mails
   Identity Theft
   Sony
     171 Million Dollar Loss
     News Report
   Citibank
“Phonemasters”
   People who break into a computer system and inform the
    company that they have done so. They are either concerned
    employees or security professionals who are paid to find
    vulnerabilities. White hat hackers are the „good guys.‟”
   White Hat Hackers are hired to find the holes in security in
    order to improve the security mainframe more efficiently..
   Famous White Hat Hackers Include:
     Steve Wozniak—the other Apple founder named Steve, started his
      career creating blue boxes with Steve Jobs that allowed users to
      hack the phone system and access free long distance calling.
     Kevin Mitnick—a white hat consultant and writer for big companies
      nowadays, Mitnick started his career in 1982 by hacking a computer
      in the North American Air Defense Command in Colorado Springs,
      CO. He also altered a phone program to misdirect federal agents
      trying to trace his call, sending them barging into the home of a
      Middle Eastern immigrant watching television.
 The government, specifically the NSA
  (National Security Association), is looking
  for new white hat and black hackers who
  can help improve offensive and defensive
  tactics and abilities in cyber warfare.
 As of June 2012 there were over 15,000
  job offers posted online for ethical hacking
  positions.
     The hacking and computer security is growing
     significantly, and the most effective way to
     protect ourselves from cyber warfare is to
     increase the man power operating, improving,
     and implementing our online security.
   Every year, Las Vegas hosts one of the
    largest anonymous hacking conventions in
    the world called DEFCON.
     The convention does not require attendees to
      provide their name, email address, or social
      security number, and is attended by hundreds if
      not thousands of federal agents looking to
      recruit new experts every year.
     The cooperation between hackers and the
      government has grown significantly.
      ○ NSA director General Keith Alexander spoke at
        the recent 2012 DEFCON convention.
   White hat hackers, those who protect
    the United States from foreign cyber
    threats, are in high demand.
     The chances of getting hacked as an
     individual are slim, since for the majority of
     people nothing would be accomplished.
     ○ As an enemy to the U.S., hacking the nation‟s
       military and intelligence agencies is more
       lucrative and beneficial. For this reason we
       need more White Hat Hackers to defend us.
- Operate using quantum physics
- Ability to solve problems that today‟s
  computers can not
    - Credit card hacking
-   Black Holes
    - Idea that black holes can be used as
     quantum computer to store information
- Taking control of automobiles using
  computer-programming skills
- Modern cars‟ operating systems are all
  connected in a network called the
  controller-area-network bus (CAN bus)
- Examples:
    - Door Locks
    - Telematics System
    - Automatic Key
 Terrorists have become very “cyber savvy”
 Using cyber space to conduct operations
  (not just to spread ideas and recruit)
     Planned May 2010 Times Square bombings
   Trying to get trade secrets by hacking
 “Organized crime in cyber space offers a
  higher profit with a lower probability of
  being identified and prosecuted.”
 FBI is fighting back
 http://www.youtube.com/watch?v=U0
 OZlGu-kMo
 Now that you know how advanced hacking
  has gotten today, does this make you any
  less trusting or wary of the internet?
 Have the new opportunities in hacking
  presented today inspired any of you to look
  for employment in the field? Explain.
 To what uses could hacking be specialized
  towards in the future and for what reason?
   http://en.wikipedia.org/wiki/Hacker_%28computer_security%29
   http://catb.org/~esr/faqs/hacker-howto.html
   http://www.santafenewmexican.com/LocalNews/Santa-Fe-institute-
    Secrets-at-risk-when-code-breaking-takes-qua
   http://www.dailygalaxy.com/my_weblog/2012/03/-hacking-the-cosmos-
    quantum-computers-will-solve-problems-that-would-take-todays-
    computers-longer-th.html
   http://www.caranddriver.com/features/can-your-car-be-hacked-feature
   http://www.fbi.gov/news/speeches/combating-threats-in-the-cyber-world-
    outsmarting-terrorists-hackers-and-spies
   http://www.pbs.org/wgbh/pages/frontline/shows/hackers/risks
   http://www.wired.com/gamelife/2011/05/sony-psn-hack-losses/
   http://www.telegraph.co.uk/technology/news/8589664/Hacking-the-risks-
    to-internet-users-arent-going-away.html
   http://www.pcmag.com/encyclopedia_term/0,1237,t=white+hat+hacker&i
    =54434,00.asp
   http://www.investopedia.com/financial-edge/0811/famous-white-hat-
    hackers.aspx#axzz26m8qtRyP
   http://www.forbes.com/sites/andygreenberg/2012/06/15/new-grad-looking-for-a-job-
    pentagon-contractors-post-openings-for-black-hat-hackers-2/2/
   http://www.huffingtonpost.com/2012/07/20/defcon-2012_n_1691246.html

More Related Content

Recently uploaded

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

SIT Hacking presentation

  • 1. . /$$ /$$ /$$ . | $$ | $$ | $$ /$$ /$$ . | $$ | $$ /$$$$$$$ /$$$$$$$| $$ /$$ | /$$$$$$$$ /$$$$$$$ . | $$$$$$$$ /$$___/$$ /$$_____/| $$/$$ $$| $$___/ $$ /$$___/ $$ . | $$ | $$| $$ |$$ | $$ | $$$$ | $$| $$ | $$| $$ | $$ . | $$ | $$| $$ |$$ | $$ | $$ $$ | $$| $$ | $$| $$ | $$ . | $$ | $$| $$$$$$$$$$| $$$$$$$| $$ $$| $$| $$ | $$| $$$$$$$$$ . |__/ |__/ _________/ _______/|__/ _/|__/|__/ |__/|______| $$ | $$ | $$ /$$$$$$$/ |______/ Yours truly, Marc Leprince, Connor Kistler, Lauren Stracquatanio, and Nick Cortese
  • 2. Computer Security:  Finding, and exploiting weaknesses of computers ○ Phishing, Spam E-mail, Virus, bots…  Computer Science:  The process of finding insights in problem- solving to create, innovate, and share ○ Computer Security, Facebook, Subculture
  • 3. White Hat:  Ethical Hacker  Black Hat:  Malicious Hacker  Cracker:  people who enjoy breaking into computers and phreaking the phone system ○ The basic difference is this: hackers build things, crackers break them.  Script Kiddie:  Leeches/computer game hacks
  • 5.
  • 6. Range from the Internet equivalent of petty theft to state-sponsored terrorism  Personal Computer Users  Corporations  Governments/ National Security
  • 7. Spam E-mails  Identity Theft
  • 8. Sony  171 Million Dollar Loss  News Report  Citibank
  • 10.
  • 11. People who break into a computer system and inform the company that they have done so. They are either concerned employees or security professionals who are paid to find vulnerabilities. White hat hackers are the „good guys.‟”  White Hat Hackers are hired to find the holes in security in order to improve the security mainframe more efficiently..  Famous White Hat Hackers Include:  Steve Wozniak—the other Apple founder named Steve, started his career creating blue boxes with Steve Jobs that allowed users to hack the phone system and access free long distance calling.  Kevin Mitnick—a white hat consultant and writer for big companies nowadays, Mitnick started his career in 1982 by hacking a computer in the North American Air Defense Command in Colorado Springs, CO. He also altered a phone program to misdirect federal agents trying to trace his call, sending them barging into the home of a Middle Eastern immigrant watching television.
  • 12.  The government, specifically the NSA (National Security Association), is looking for new white hat and black hackers who can help improve offensive and defensive tactics and abilities in cyber warfare.  As of June 2012 there were over 15,000 job offers posted online for ethical hacking positions.  The hacking and computer security is growing significantly, and the most effective way to protect ourselves from cyber warfare is to increase the man power operating, improving, and implementing our online security.
  • 13. Every year, Las Vegas hosts one of the largest anonymous hacking conventions in the world called DEFCON.  The convention does not require attendees to provide their name, email address, or social security number, and is attended by hundreds if not thousands of federal agents looking to recruit new experts every year.  The cooperation between hackers and the government has grown significantly. ○ NSA director General Keith Alexander spoke at the recent 2012 DEFCON convention.
  • 14. White hat hackers, those who protect the United States from foreign cyber threats, are in high demand.  The chances of getting hacked as an individual are slim, since for the majority of people nothing would be accomplished. ○ As an enemy to the U.S., hacking the nation‟s military and intelligence agencies is more lucrative and beneficial. For this reason we need more White Hat Hackers to defend us.
  • 15.
  • 16. - Operate using quantum physics - Ability to solve problems that today‟s computers can not - Credit card hacking - Black Holes - Idea that black holes can be used as quantum computer to store information
  • 17. - Taking control of automobiles using computer-programming skills - Modern cars‟ operating systems are all connected in a network called the controller-area-network bus (CAN bus) - Examples: - Door Locks - Telematics System - Automatic Key
  • 18.  Terrorists have become very “cyber savvy”  Using cyber space to conduct operations (not just to spread ideas and recruit)  Planned May 2010 Times Square bombings  Trying to get trade secrets by hacking  “Organized crime in cyber space offers a higher profit with a lower probability of being identified and prosecuted.”  FBI is fighting back
  • 20.
  • 21.  Now that you know how advanced hacking has gotten today, does this make you any less trusting or wary of the internet?  Have the new opportunities in hacking presented today inspired any of you to look for employment in the field? Explain.  To what uses could hacking be specialized towards in the future and for what reason?
  • 22. http://en.wikipedia.org/wiki/Hacker_%28computer_security%29  http://catb.org/~esr/faqs/hacker-howto.html  http://www.santafenewmexican.com/LocalNews/Santa-Fe-institute- Secrets-at-risk-when-code-breaking-takes-qua  http://www.dailygalaxy.com/my_weblog/2012/03/-hacking-the-cosmos- quantum-computers-will-solve-problems-that-would-take-todays- computers-longer-th.html  http://www.caranddriver.com/features/can-your-car-be-hacked-feature  http://www.fbi.gov/news/speeches/combating-threats-in-the-cyber-world- outsmarting-terrorists-hackers-and-spies  http://www.pbs.org/wgbh/pages/frontline/shows/hackers/risks  http://www.wired.com/gamelife/2011/05/sony-psn-hack-losses/  http://www.telegraph.co.uk/technology/news/8589664/Hacking-the-risks- to-internet-users-arent-going-away.html  http://www.pcmag.com/encyclopedia_term/0,1237,t=white+hat+hacker&i =54434,00.asp  http://www.investopedia.com/financial-edge/0811/famous-white-hat- hackers.aspx#axzz26m8qtRyP  http://www.forbes.com/sites/andygreenberg/2012/06/15/new-grad-looking-for-a-job- pentagon-contractors-post-openings-for-black-hat-hackers-2/2/  http://www.huffingtonpost.com/2012/07/20/defcon-2012_n_1691246.html

Editor's Notes

  1. The basic difference is this: hackers build things, crackers break them.
  2. http://www.geekyard.com/os/windows/top-5-fbi-hd-desktop-wallpapers-collection/