Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Hacking and Cyber Security
Transcript of Hacking and Cyber Security
Hacking is the process of gaining unauthorized access to computer data.
System Failure Matrix
Began in the 60's.
"Hacker" was originally used to describe a master of computers.
In the 70's, John Draper used a whistle from a box of Captain Crunch to make unlimited free calling.
Steve Jobs and Steve Wozniak (the founders of Apple) began making Blue Boxes, which are designed to hack into phone systems.
In the 80's the hacking group 414 was arrested.
First National Bank of Chicago falls victim of a $70 million computer heist (St. Petersburg Times Online).
What is Hacking?
The History of Hacking
Cyber security appears in many different aspects of our daily lives. It helps us protect:
Credit card information
Personal information, and accounts
It is also important because many businesses rely on good security to keep their businesses running and connected with their consumers. Which means that if a large business is attacked and its websites are down, it's losing money which hurts our economy.
Importance of Cyber Security
Hactivist- "A computer hacker whose activity is aimed at promoting a social or political cause" (Oxford Dictionary).
Motives Behind Hacking
Hacking and Cyber Security
By Colin T and Dillon F
153 million credit cards were stolen from Adobe's servers.
42 million credit cards were stolen from Cupid Media.
World's largest cuber attack (Times of India).
Started by Anonymous in 2012.
Occurs every year on April 7th (the eve of Holocaust Remembrance Day) (Forbes).
This year, they attacked 700 sites, including gov. websites (RT).
Electronic Crimes Task Force
Defense Against Cyber Crime
More than 75,000 computer systems were hacked.
almost 2,500 companies in 196 countries were targeted.
Began in 2008.
Was the largest cyber attack of its time.
Targeted: emails, "corporate data," credit card info, and website logins (The Washington Post).
"Combat Cyber Crime." Cyber Security. Wordpress, n.d. Web. 2 June 2014.
Cyber Security Diplomats. N.p., n.d. Web. 4 June 2014. <http://cybersecuritydiplomats.weebly.com/
"Hactivist Definition." Oxford Dictionary. N.p.: Oxford UP, n.d. N. pag. Print.
"A History of Hacking." St. Petersburg Times Online. St. Petersburg Times, n.d. Web. 31 May 2014.
Nakashima, Ellen. "More than 75,000 Computer Systems Hacked in One of Largest Cyber Attacks,
Security Firm Says." The Washington Post. Washington Post, 18 Feb. 2010. Web. 31 May 2014.
"#OpIsrael: Anonymous Attacks Hundreds of Israeli Websites." RT. Autonomous Nonprofit Organization,
26 Apr. 2014. Web. 31 May 2014. <http://rt.com/news/anonymous-israel-cyber-attack-737/>.
Opposing Views. N.p., n.d. Web. 4 June 2014. <http://www.opposingviews.com/i/technology/internet/
Peck, Michael. Why Did Anonymous Have to Attack Israel on Holocaust Memorial Day? Forbes. Forbes,
n.d. Web. 31 May 2014. <http://www.forbes.com/sites/michaelpeck/2013/04/08/
Sihna, Kounteya. "World's Biggest Cyberattack Detected, 360 Million Accounts, 1.25 Billion Email
Addresses Hacked." Times of India. India Times, 28 Feb. 2014. Web. 31 May 2014.
United States Secret Service. N.p., n.d. Web. 3 June 2014. <http://www.secretservice.gov/
Security Vs. Privacy
Cyber Security Debate
As technology has become more and more prominent in our lives, cyber crime has become more of a threat. Because of this, groups like the Electronic Crimes Task Force have created in order to help combat the many criminals out there (United States Secret Service).
Security or privacy? While many people may prefer privacy over security, it all comes down to what's best for us. The government feels that in order protect the US critical infrastructure they have to replace privacy with greater gov. control (Opposing Views).