Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Hacking and Cyber Security

No description

Colin Candles

on 4 June 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Hacking and Cyber Security

Masked Anonymous member
Hacking is the process of gaining unauthorized access to computer data.
System Failure Matrix
Began in the 60's.
"Hacker" was originally used to describe a master of computers.
In the 70's, John Draper used a whistle from a box of Captain Crunch to make unlimited free calling.
Steve Jobs and Steve Wozniak (the founders of Apple) began making Blue Boxes, which are designed to hack into phone systems.
In the 80's the hacking group 414 was arrested.
First National Bank of Chicago falls victim of a $70 million computer heist (St. Petersburg Times Online).
What is Hacking?
The History of Hacking
Cyber security appears in many different aspects of our daily lives. It helps us protect:
Credit card information
Bank accounts
Personal information, and accounts
It is also important because many businesses rely on good security to keep their businesses running and connected with their consumers. Which means that if a large business is attacked and its websites are down, it's losing money which hurts our economy.
Importance of Cyber Security
Hactivist- "A computer hacker whose activity is aimed at promoting a social or political cause" (Oxford Dictionary).
Motives Behind Hacking
Hacking and Cyber Security
By Colin T and Dillon F
Cyber Death
153 million credit cards were stolen from Adobe's servers.
42 million credit cards were stolen from Cupid Media.
World's largest cuber attack (Times of India).
Recent Events
Started by Anonymous in 2012.
Occurs every year on April 7th (the eve of Holocaust Remembrance Day) (Forbes).
This year, they attacked 700 sites, including gov. websites (RT).
Electronic Crimes Task Force
Defense Against Cyber Crime
More than 75,000 computer systems were hacked.
almost 2,500 companies in 196 countries were targeted.
Began in 2008.
Was the largest cyber attack of its time.
Targeted: emails, "corporate data," credit card info, and website logins (The Washington Post).
Works Cited

"Combat Cyber Crime." Cyber Security. Wordpress, n.d. Web. 2 June 2014.
Cyber Security Diplomats. N.p., n.d. Web. 4 June 2014. <http://cybersecuritydiplomats.weebly.com/
"Hactivist Definition." Oxford Dictionary. N.p.: Oxford UP, n.d. N. pag. Print.
"A History of Hacking." St. Petersburg Times Online. St. Petersburg Times, n.d. Web. 31 May 2014.
Nakashima, Ellen. "More than 75,000 Computer Systems Hacked in One of Largest Cyber Attacks,
Security Firm Says." The Washington Post. Washington Post, 18 Feb. 2010. Web. 31 May 2014.
"#OpIsrael: Anonymous Attacks Hundreds of Israeli Websites." RT. Autonomous Nonprofit Organization,
26 Apr. 2014. Web. 31 May 2014. <http://rt.com/news/anonymous-israel-cyber-attack-737/>.
Opposing Views. N.p., n.d. Web. 4 June 2014. <http://www.opposingviews.com/i/technology/internet/
Peck, Michael. Why Did Anonymous Have to Attack Israel on Holocaust Memorial Day? Forbes. Forbes,
n.d. Web. 31 May 2014. <http://www.forbes.com/sites/michaelpeck/2013/04/08/
Sihna, Kounteya. "World's Biggest Cyberattack Detected, 360 Million Accounts, 1.25 Billion Email
Addresses Hacked." Times of India. India Times, 28 Feb. 2014. Web. 31 May 2014.
United States Secret Service. N.p., n.d. Web. 3 June 2014. <http://www.secretservice.gov/

Security Vs. Privacy
Cyber Security Debate

As technology has become more and more prominent in our lives, cyber crime has become more of a threat. Because of this, groups like the Electronic Crimes Task Force have created in order to help combat the many criminals out there (United States Secret Service).
Security or privacy? While many people may prefer privacy over security, it all comes down to what's best for us. The government feels that in order protect the US critical infrastructure they have to replace privacy with greater gov. control (Opposing Views).
Full transcript