Chapter13 - Objectives Learn about the origins about computer hacking Learn about some of the motivations for hackers and crackers Learn about

Info iconThis preview shows pages 1–12. Sign up to view the full content.

View Full Document Right Arrow Icon
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Connecting with Computer Science 2 Objectives Learn about the origins about computer hacking Learn about some of the motivations for hackers and crackers Learn about technologies that system intruders use Learn about malicious code Learn what social engineering is and how it works
Background image of page 2
Connecting with Computer Science 3 Objectives (continued) Learn how security experts categorize types of system attacks Learn about physical and technical safeguards Learn how to select a good password Learn about antivirus software Learn about encryption
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Connecting with Computer Science 4 Objectives (continued) Learn about preventive system setup, including firewalls and routers Learn about laws to protect intellectual property and prosecute cracking Learn about ethical behavior in computing Learn about privacy in computing and ways to assure it
Background image of page 4
Connecting with Computer Science 5 The Intruder A hacker is a technically proficient individual who breaks into a computer system Originally connoted good intent, but usage today is similar to cracker A cracker is an unwelcome system intruder with malicious intent A script kiddie is an amateur hacker that simply uses the hacking tools developed by others
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Connecting with Computer Science 6 The Intruder (continued) Two types of intentional intruders An undirected hacker is motivated by the challenge of breaking into a system A directed hacker is motivated by greed and/or politics Hacktivism is cracking into a system as a political act The Hacker’s Manifesto is an anonymous document that justifies cracking into systems as an ethical exercise
Background image of page 6
Connecting with Computer Science 7 How Do They Get In? Holes in the system System configuration, programming, security Malicious software programs (viruses) Social engineering Taking advantage of the innocent human tendency to be helpful One of the most effective tools for hackers
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Connecting with Computer Science 8 Holes in the System Open nature of the Internet and networks Remote access, mounting drives on other machines Backdoors Shortcuts into programs created by system designers Sloppy programming Leaving sensitive information in a URL string Buffer overflow Placing more information into a memory location than that location can handle
Background image of page 8
Connecting with Computer Science 9 Viruses, Worms, and Other Nasty Things Malicious code is designed to breach system security and threaten digital information Viruses are uninvited guest programs on your computer with the potential to damage files and the operating system A virus may be silent for awhile Users who share files can transmit a virus E-mail attachments can host a virus when the attachment is opened
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Connecting with Computer Science 10 Figure 13-1 A typical virus e-mail warning
Background image of page 10
Connecting with Computer Science 11 Viruses, Worms, and Other Nasty Things (continued) A worm is a bot that actively reproduces itself across
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 12
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/08/2012 for the course SADSAD sdsadasdas taught by Professor Dasda during the Spring '11 term at Alaska Bible.

Page1 / 55

Chapter13 - Objectives Learn about the origins about computer hacking Learn about some of the motivations for hackers and crackers Learn about

This preview shows document pages 1 - 12. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online