Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Hacking Presentation

School Project
by

Connor Black

on 22 January 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Hacking Presentation

Hacking By Alex and Connor Types of hackers Black Hat Grey Hat White hat -The worst kind of hacker - Hacks system for malicious purposes or self gain - Also known as "crackers" - The common media portrayal of what a hacker is - Steals passwords - Uses spam and DDoS attacks to bring servers down - Some wipe memory off of others computers for fun - In the moral grey area for hacking, hence the name - Some hack into systems with no malicious intent, but without permission - Some find flaws in systems and then sell them to the company, or highest bidder - Not liked by White Hats or Black Hats - The good guys in the hacking world - Some have successful jobs hacking into a companies system and patching the security flaws - White Hat hackers are the creators of anti-virus programs and fire walls - They try their best to outwit Black Hats at every turn; White Hats create the security system, and the Black Hats try to break into them. Prevention Preemptive Prevention Active Prevention What to do When Hacked - Install anti-virus software - Have backups of any important information on your computer stored separately (external hard drive) - Install a firewall/make sure you have one - Update both your computer and your programs whenever you are prompted to - Whenever you choose a password for an account, make sure to:
>Make it fairly long
>Include numbers and letters
>Use a different password for every account
>Make it something unique, not obvious (birthday) - Use common sense whenever browsing the web. Don't click on links to websites you don't trust, don't give out your password to anyone. -Signs that there is a hacker inside your computer:
> Programs opening and closing on their own
> Your computer shutting on and off by itself
> Finding programs that you don't remember installing -The first thing to do is to disconnect your computer from the internet, by either; unplugging the ethernet cable, or turning of your router manually -Run a scan for any viruses on your computer - Attempt to uninstall any programs the hacker put on your computer -Take it to a professional if problems persist -First computer hack was in late 1960’s when Bell Labs successfully hacked and modified a UNIX operating system
-In 1980s people started to hack computer systems to gain access to confidential information
-Several groups formed “electronic gangs,” driven to tap into sensitive information
-Gangs began fighting in early 1990s
-In late 1990’s law enforcers began to take hacking seriously by making stricter laws against hacking History The darker side of hacking has three main motivations:
1) to gain unauthorized access in order to tamper with or destroy information
2) gain unauthorized access to systems or computer services in order to steal data for
criminal purposes
3) terrorism The Dark Side of Hacking There are three types of hackers
-One is an enthusiastic, skillful computer programmer or user.
-Another uses computers to gain unauthorized access to data
directs knowledge toward criminal acts,
such as distribution of pirated software, games, viruses and worms that could virtually shut down systems.
-The third kind is in between the good and the bad What is a Hacker? HUE LEET SNIPEZ 420 SMOKE WEED Shhhhhh, only dreams now.
Full transcript