SIT Hacking presentation

22
. /$$ /$$ /$$ . | $$ | $$ | $$ /$$ /$$ . | $$ | $$ /$$$$$$$ /$$$$$$$| $$ /$$ | /$$$$$$$$ /$$$$$$$ . | $$$$$$$$ /$$___/$$ /$$_____/| $$/$$ $$| $$___/ $$ /$$___/ $$ . | $$ | $$| $$ |$$ | $$ | $$$$ | $$| $$ | $$| $$ | $$ . | $$ | $$| $$ |$$ | $$ | $$\ $$ | $$| $$ | $$| $$ | $$ . | $$ | $$| $$$$$$$$$$| $$$$$$$| $$ \ $$| $$| $$ | $$| $$$$$$$$$ . |__/ |__/ \_________/ \_______/|__/ \_/|__/|__/ |__/|______| $$ | $$ | $$ /$$$$$$$/ |______/ Yours truly, Marc Leprince, Connor Kistler, Lauren Stracquatanio, and Nick Cortese

description

AWESOME presentation made by Marc, Nick, Connor, and Lauren. It gets babes.

Transcript of SIT Hacking presentation

Page 1: SIT Hacking presentation

. /$$ /$$ /$$

. | $$ | $$ | $$ /$$ /$$

. | $$ | $$ /$$$$$$$ /$$$$$$$| $$ /$$ | /$$$$$$$$ /$$$$$$$

. | $$$$$$$$ /$$___/$$ /$$_____/| $$/$$ $$| $$___/ $$ /$$___/ $$

. | $$ | $$| $$ |$$ | $$ | $$$$ | $$| $$ | $$| $$ | $$

. | $$ | $$| $$ |$$ | $$ | $$\ $$ | $$| $$ | $$| $$ | $$

. | $$ | $$| $$$$$$$$$$| $$$$$$$| $$ \ $$| $$| $$ | $$| $$$$$$$$$

. |__/ |__/ \_________/ \_______/|__/ \_/|__/|__/ |__/|______| $$ | $$ | $$ /$$$$$$$/ |______/

Yours truly,

Marc Leprince, Connor Kistler,

Lauren Stracquatanio, and Nick Cortese

Page 2: SIT Hacking presentation

What is Hacking? Types of Hackers

Computer Security:Finding, and exploiting weaknesses of

computers○ Phishing, Spam E-mail, Virus, bots…

Computer Science:The process of finding insights in problem-

solving to create, innovate, and share○ Computer Security, Facebook, Subculture

Page 3: SIT Hacking presentation

Types of Hackers White Hat:

Ethical Hacker Black Hat:

Malicious Hacker Cracker:

people who enjoy breaking into computers and phreaking the phone system○ The basic difference is this: hackers build things,

crackers break them.

Script Kiddie:Leeches/computer game hacks

Page 5: SIT Hacking presentation

Black-Hats, Crackers, Script Kiddies and

More

Page 6: SIT Hacking presentation

Risks of Hacking What is Hacking?

Range from the Internet equivalent of petty theft to state-sponsored terrorismPersonal Computer UsersCorporationsGovernments/ National Security

Page 7: SIT Hacking presentation

Personal Computer Users

Spam E-mails Identity Theft

Page 8: SIT Hacking presentation

Corporations

Sony171 Million Dollar LossNews Report

Citibank

Page 9: SIT Hacking presentation

Governments/National Security

“Phonemasters”

Page 10: SIT Hacking presentation

White hats and the good side of hacking

Page 11: SIT Hacking presentation

White Hat Hackers People who break into a computer system and inform the

company that they have done so. They are either concerned employees or security professionals who are paid to find vulnerabilities. White hat hackers are the ‘good guys.’”

White Hat Hackers are hired to find the holes in security in order to improve the security mainframe more efficiently..

Famous White Hat Hackers Include: Steve Wozniak—the other Apple founder named Steve, started his

career creating blue boxes with Steve Jobs that allowed users to hack the phone system and access free long distance calling.

Kevin Mitnick—a white hat consultant and writer for big companies nowadays, Mitnick started his career in 1982 by hacking a computer in the North American Air Defense Command in Colorado Springs, CO. He also altered a phone program to misdirect federal agents trying to trace his call, sending them barging into the home of a Middle Eastern immigrant watching television.

Page 12: SIT Hacking presentation

Government and Hacking

The government, specifically the NSA (National Security Association), is looking for new white hat and black hackers who can help improve offensive and defensive tactics and abilities in cyber warfare.

As of June 2012 there were over 15,000 job offers posted online for ethical hacking positions.The hacking and computer security is growing

significantly, and the most effective way to protect ourselves from cyber warfare is to increase the man power operating, improving, and implementing our online security.

Page 13: SIT Hacking presentation

Government and Hacking (cont.)

Every year, Las Vegas hosts one of the largest anonymous hacking conventions in the world called DEFCON. The convention does not require attendees to

provide their name, email address, or social security number, and is attended by hundreds if not thousands of federal agents looking to recruit new experts every year.

The cooperation between hackers and the government has grown significantly.○ NSA director General Keith Alexander spoke at the

recent 2012 DEFCON convention.

Page 14: SIT Hacking presentation

Positives of Hacking

White hat hackers, those who protect the United States from foreign cyber threats, are in high demand.The chances of getting hacked as an

individual are slim, since for the majority of people nothing would be accomplished. ○ As an enemy to the U.S., hacking the nation’s

military and intelligence agencies is more lucrative and beneficial. For this reason we need more White Hat Hackers to defend us.

Page 15: SIT Hacking presentation

THE FUTURE OF HACKING:

Page 16: SIT Hacking presentation

Quantum Computers- Operate using quantum physics- Ability to solve problems that today’s

computers can not- Credit card hacking

- Black Holes- Idea that black holes can be used as

quantum computer to store information

Page 17: SIT Hacking presentation

Car Hacking- Taking control of automobiles using

computer-programming skills- Modern cars’ operating systems are all

connected in a network called the controller-area-network bus (CAN bus)

- Examples:- Door Locks- Telematics System- Automatic Key

Page 18: SIT Hacking presentation

Cyber Warfare

Terrorists have become very “cyber savvy” Using cyber space to conduct operations

(not just to spread ideas and recruit)Planned May 2010 Times Square bombings

Trying to get trade secrets by hacking “Organized crime in cyber space offers a

higher profit with a lower probability of being identified and prosecuted.”

FBI is fighting back

Page 20: SIT Hacking presentation
Page 21: SIT Hacking presentation

Discussion Questions

Now that you know how advanced hacking has gotten today, does this make you any less trusting or wary of the internet?

Have the new opportunities in hacking presented today inspired any of you to look for employment in the field? Explain.

To what uses could hacking be specialized towards in the future and for what reason?

Page 22: SIT Hacking presentation

Sources http://en.wikipedia.org/wiki/Hacker_%28computer_security%2

9 http://catb.org/~esr/faqs/hacker-howto.html http://www.santafenewmexican.com/LocalNews/Santa-Fe-insti

tute-Secrets-at-risk-when-code-breaking-takes-qua http://www.dailygalaxy.com/my_weblog/2012/03/-hacking-the-

cosmos-quantum-computers-will-solve-problems-that-would-take-todays-computers-longer-th.html

http://www.caranddriver.com/features/can-your-car-be-hacked-feature

http://www.fbi.gov/news/speeches/combating-threats-in-the-cyber-world-outsmarting-terrorists-hackers-and-spies

http://www.pbs.org/wgbh/pages/frontline/shows/hackers/risks http://www.wired.com/gamelife/2011/05/sony-psn-hack-losses/ http://www.telegraph.co.uk/technology/news/8589664/Hacking

-the-risks-to-internet-users-arent-going-away.html http://www.pcmag.com/encyclopedia_term/0,1237,t=white+hat

+hacker&i=54434,00.asp http://www.investopedia.com/financial-edge/0811/famous-whit

e-hat-hackers.aspx#axzz26m8qtRyP http://www.forbes.com/sites/andygreenberg/2012/06/15/new-grad-looking-

for-a-job-pentagon-contractors-post-openings-for-black-hat-hackers-2/2/

http://www.huffingtonpost.com/2012/07/20/defcon-2012_n_1691246.html