Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

Virus

Hackers

  • A virus on the other hand contains bits of code created with a specific purpose.

  • Viruses need to be downloaded or brought onto the system by the users and self-replicate from there.

  • Hackers sometimes UTILIZE viruses in order to gain information about things such as key strokes or log in information which will help them with their overall goals.

Conclusion

1. How this effects our country

- Is democracy in danger?

2. Possible solutions

3. How this lesson effects me

  • A hacker is a person who writes and/or distributes malicious code with a specific goal in mind.
  • Usually hackers target individuals amd businesses in order to steal valuable information.

Effects on our Country

My opinion

I believe that our country has been and is being hacked by threats. But I also believe that this is no new concept especially since the U.S has been able to hack into others countries for years. The new threat to our elections makes the attacks much more dangerous than a physical war. It allows countries the opportunity to destroy the U.S through the inside and from it's own people. When comparing how citizens react to outside assaults we band together but when threats or opposing views are within our walls we divide and attack each other. These cyber attacks are extremely dangerous to our functioning and existence of our country.

ENDING CONCLUSION

Although I was aware of the issues our country was facing from the elections and the potential threat Russia posed - I am surprised to learn about the security breach through twitter. I wasn't aware that most employees or officials even had twitters. This information is important to know for all citizens so when looking forward in whatever profession we choose we can be aware of our surroundings when it comes to cyber security especially because things keep advancing.

Elections:

  • In recent years with the burst in technological advancements concerns regarding the U.S have been brought to light. One in particular is the safety of our democratic system. With some major states using electronic methods as a form of casting and counting votes it leaves officials and constituents to question the safety of their voices.
  • According to TIME magazine 71% of voters in 2016 used a paper or mail in ballot but the other 40 million used electronic machines with no paper trail.
  • These machines used in 22 states are over 10 years old and lack basic security programming. Making these devices incredibly easy to hack once an individual has access to a machine.

Government:

  • A new report from TIME revealed that Russian intelligence has been hacking the U.S State Department by sending malware to over 10,000 accounts through twitter accounts. This programming allowed Russian intelligence to gain access and control of the individual's phone or computer.

Solutions

Deciding on potential solutions to these threats is no easy task. I personally cannot even begin to fathom how complex it must be. With my basic knowledge of computer malware, hacking, and programming I can only suggest a couple basic possible fixes. These fixes come from a better understanding of the political system rather than the cyber security of each country.

Solutions:

1) Issue larger warnings and educate citizens are the threats of hackers and malware - inform individuals about how their social media accounts can be used as a weapon.

2) Put money aside to update and replace all current electronic voting devices so that they have the proper technology to protect the voting system.

3) Public officials and members working for different government departments should only be permitted to use secure accounts or use different devices for work and personal accounts/information.

Hacking vs Cracking

Case #1

Chipotle

Case #3

Target

Computer Crimes

When: March 24 - April 18 2017

How: Hackers used a type of malware and installed this programming into the register systems so that credit card information (stored in the magnetic strip) could be copied and sent to the hackers.

  • This technique of cyber attacks is not new or uncommon for large restaurant chains such as Arby's which is currently facing a similar security breach.

Damage: 2,250 restaurants affected

  • Information stolen can be used to make fraudulent purchases

When: November 27 - December 15, 2013

How:

  • Attackers used legitimate credentials to initially enter the system. They began with stolen credentials from an HVAC company that acts as a contractor to Target locations. Then the hackers were able to exploit an unknown flaw in the retailer point-of-sale encryption.
  • Information stolen: Names, Addresses, emails, credit card numbers, CVV numbers and expiration dates. (The emails were kept to send out phishing scams after card numbers were compromised).
  • Breach in Security was not detected by Target officials but was brought to the company's attention after credit card companies started to see a trend in their fraudulent purchases among consumer accounts.

Damage: 100 million credit/debit cards' information was compromised through attack.

Case #2

DYN Home Security

When: October 21 2016

- 7:10 a.m. - 6:30 p.m.

How:

  • Hackers used a simple platform called Mirairi which can take over online devices and use them to launch DDoS attacks.
  • The software uses malware from phishing emails to infect a computer or home network, then spreads to everything - taking over DVRs, cable set-top boxes, routers and Internet-connected cameras used by stores and businesses for surveillance.
  • These devices then used to create a robot network to send the millions of messages that knocks out victims' computer systems.

Damage:

  • Caused internet services to be blocked to users and took the company 11 hours to solve the issue due to the flood of messages that kept them on their toes. Users could not gain access to many popular websites such as amazon, netflix, paypal and others during this time.
  • It is considered one of the largest cyber attacks of 2016 and what makes it so different from others is the hackers were extremely skilled but they used a simple program to thwart the company.

Computer crimes: acts performed by a computer user, that illegally browses or steals a company's or individual's private information.

Hacking

  • Stealing personal/ private information without the owner's knowledge.
  • Examples: stealing passwords, creating a bot net, or anything that invades individual's information secretly.

Cracking

  • Editing a program's source code, or you could create a program and tricking it into thinking a certain process has happened.
  • In other words - Cracking is a method of finding "back doors" in applications or software and exploiting these weaknesses for malicious purposes.
  • Examples: a key generator for Adobe Master Collection tricks the software into thinking that the correct key was entered, and does not require verification with the server.

**a hacker is someone that uses their extensive knowledge of computer logic and code for malicious purposes, while a cracker - looks for back doors in programs, and exploits those back doors**

SOURCES

  • http://hackingvscrackingb31.blogspot.com/2012/04/difference-between-hacking-and-cracking.html
  • http://www.techntechie.com/whats-the-difference-between-getting-hacked-and-getting-a-virus.html
  • http://www.catalogs.com/info/gadgets/difference-between-hacked-and-virus.html
  • http://scienceline.ucsb.edu/getkey.php?key=52
  • https://www.usatoday.com/story/tech/2016/10/21/cyber-attack-takes-down-east-coast-netflix-spotify-twitter/92507806/
  • https://www.eater.com/2017/4/26/15433866/chipotle-data-breach-credit-cards
  • https://www.tripwire.com/state-of-security/security-awareness/5-social-engineering-attacks-to-watch-out-for/
  • http://money.cnn.com/2017/05/28/technology/chipotle-credit-card-hack/index.html
  • https://www.forbes.com/sites/laurashin/2017/01/04/be-prepared-the-top-social-engineering-scams-of-2017/#1529e1ec7fec
  • http://time.com/4783932/inside-russia-social-media-war-america/
  • http://fortune.com/2017/01/11/russia-cyber-hack-election/
  • http://time.com/4498995/voting-hackers-safety-security-polling-station/
  • https://www.angelkings.com/target-corporation/
  • https://www.livescience.com/56787-how-are-votes-counted.html
  • https://www.nytimes.com/interactive/2015/02/05/technology/recent-cyberattacks.html

Social Engineering and Hacking

Social engineering: an attack vector that relies heavily on human interaction

  • Social engineering requires various manipulation techniques in order to gain the confidential information desired.
  • Types: MOST COMMON
  • Phishing
  • Pretexting
  • Baiting
  • Quid Pro Quo
  • Tailgating

Malicious Computer Activities Effecting Society

Learn more about creating dynamic, engaging presentations with Prezi