Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Computer Science

No description
by

Omar Al Bastami

on 30 September 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Computer Science

Explore the world of ...
Table of Contents
Table of Contents:
What Is Computer Science?
The study of computers and how they can be used. Computer scientists must be adept at modeling and analyzing problems and solving them, which requires precision, creativity, and careful reasoning.
Computer engineering is a field where engineers design and develop computer systems and other technological devices. Computer engineers must have experience in challenging areas such as software design, electronic engineering and integrating software and hardware.
What is Software Engineering?
Development of procedures and system applications that are used on electronic machines. This particular type of engineering considers what type of machine the software will be used on and how the software will work with the machine.
HACKING
The activity of illegally using a computer to access information stored on another computer system or to spread a computer virus. Hacking is now much more sophisticated and harder to detect than before.
Jonathan James (aka c0mrade)
He was imprisoned for hacking into large networks in the U.S like the U.S Department of Defense and NASA when he was only 15. He downloaded information equal to $1.7 million.
Kevin Mitnick (The most wanted computer criminal in history)
After spending a year in prison, he went on a 2.5-year hacking spree that involved breaching the national defense warning system and stealing corporate secrets. He was imprisoned for 5 years. He now runs Mitnick Security Consulting, LLC.
Tsutomu Shimomura
He is a 'good' hacker credited for capturing Kevin Mitnick. In 1994, Kevin hacked and published some of Tsutomu's personal files online. So Tsutomu came up with a trace-dialing technique to locate Kevin. With his information, the FBI was able to capture Kevin.
Computer Science
Table of Contents
What is Computer Science? (and its opportunities)
What is Computer Engineering? (and its opportunities)
What is Software Engineering? (and its opportunities)
How do they relate to I.T?
What is Computer Engineering?
How do they all relate to I.T?
The three programs stress an understanding of digital hardware and software, and they improve problem-solving skills. Meanwhile, I.T deals with the use of computers to store and transmit information. Therefore, they are all branches of I.T.
Introduction to hacking
Timeline
THE DAWN OF HACKING
Hackers started to appear from M.I.T in 1960s, but hackers referred to people who were really good at doing anything on the computer by making computing tasks quicker, not the 'bad' hacking.
PHONE PHREAKS AND CAP'N CRUNCH
Phone hackers started emerging in 1970s known as phreakers. They break into phone networks to make free phone calls. A whistle given in a Cap'n Crunch cereal was used with a blue box to make free calls.
Where do we use Computer Science in the future?
There are many opportunities in computer science, including computer engineering, software engineering, computer architecture, graphics, artificial intelligence, computational science and many more. Each specialty focuses on different challenges.
What Opportunities does Computer Engineering Provide?
Computer engineering allows professionals to engage in a number of areas such as analyzing and designing anything from simple microprocessors to highly featured circuits, software design, and operating system development.
What do Software Engineers do?
A software engineer, or a programmer, designs, writes and tests computer programs. Software engineering covers technical aspects of building software systems and management issues like scheduling and budgeting.
HACKING GROUPS
In 1980, hacking groups were formed. They used the electronic bulletin board systems, which were the ancestors to Usenet newsgroups and e-mail, to share stolen passwords and credit card numbers.
HACKER MAGAZINE
In 1984, the first hacker magazine called 2600 is published. This magazine was published regularly and offered tips for would-be hackers and phone phreaks. Even today, larger retail bookstores sell copies of 2600.
USE A COMPUTER, GO TO JAIL!
In 1986, the congress passes the Computer Fraud and Abuse Act due to the alarming number of break-ins. This made it a crime to illegally break into computer networks. The law did not apply to juveniles.
THE MORRIS WORM
In 1988, Robert Morris was convicted under the Computer Fraud and Abuse Act. He launched an Internet worm, which crashed government and university computers. He was sentenced to a three years trial and was fined $10,000.
WHY BUY A CAR WHEN YOU CAN HACK ONE?
In 1993, during a call-in contest, Kevin Poulsen and his two friends broke into the phone systems to let only their calls through and "won" the prize. Kevin was sentenced for five years in prison.
HACKING TOOLS R US
In 1994, publishing of the internet made hacker groups abandon the Bulletin Board Systems and set up hacker websites. Information related to hacking became more widely available making it dangerous.
THE MITNICK TAKEDOWN
In 1995, serial computer criminal, Kevin Mitnick, is captured and charged with stealing 20,000 credit card numbers. He was kept in prison for five years ,which sparked a huge disorder among the hacking community.
THE AVALANCHE OF SECURITY
In 1999, Microsoft released Windows 98. Newly found bugs and security loopholes were detected in Windows and other software packages. Therefore, many security related products make their entry into the market to protect computers.
I LOVE YOU!
In 2000, the ILOVEYOU worm was released. It is a computer worm that infected millions of computers within a few hours of its release. The teenager was the first juvenile to serve jail time for hacking.
DENIAL OF SERVICE ATTACKS
A new form of attack called the “Denial of service” attack emerged, where hackers target popular websites. In 2001, hackers launched an effective DoS attack that knocked sites such as Yahoo! and Amazon offline.
POPULATION OF HACKERS INCREASING
Over the years 2001-2013, the hacking population almost doubled in number, and many groups were formed, some became well-known like Anonymous, and several worms were published as well as advanced security systems.
THE PRESENT
Nowadays, everyone is familiar with hackers. Hearing about a security breach in a company isn't a big deal anymore. Hackers have now access to mostly everything. Not even toilets are safe from hacking!
Jonathan James
Kevin Mitnick
Tsutomu Shimomura
Kevin Poulsen
Albert Gonzalez
Kevin Poulsen
(aka Dark Dante)
He hacked into the radio station's phone lines and 'won' a Porsche. He also hacked into federal systems and stole information. He was arrested in a supermarket and imprisoned for 51 months. He is now a senior editor for Wired News.
Albert Gonzalez ( leader of ShadowCrew)
He stole over 170 million credit card numbers and sold them with his hacking group ShadowCrew. They also counterfeited identities, health insurance cards and passports. He also hacked into TJX companies and Heartland Payment Systems. He was imprisoned for 20 years.
Born December 12, 1983 - Died May 18, 2008

August 23, 1999 - October 27, 1999: broke into systems of BellSouth, Miami-Dade school, US Department of Defense and NASA.

26 January, 2000: Arrested, convicted and sentenced
Born August 6, 1963

1979: first unauthorized computer access

1980 - 1995: broke into DEC and Pacific Bell. He fled after he was issued for arrest. He used cloned cell phones to hide him. He broke into many more computer systems, stole passwords and faked identities.

1995: arrested, convicted and sentenced for 5 years.

Born October 23, 1964

1989: he became a computer security expert and worked for the National Security Agency.

1992: upgraded privacy and security of cell phones.

1995: tracked down Kevin Mitmick's location for revenge and gave it to the FBI.



Born November 30, 1965

1988: cracks into a database and gets pursued, so he disappears. He also stole information from the FBI.

1993: breaks into radio station phone lines and 'wins' a brand new Porsche. He was later arrested for 5 years.

After he was free he worked as a journalist for Wired News.


Born in 1981

1990: He was actively removing computer viruses. At school, he hacked into the government of India.

2005-2007: stole over 170 million credit cards and sold them (the biggest fraud in history)

March 25, 2010 he was sentenced for 20 years in jail
References
http://www.cs.mtu.edu/~john/whatiscs.html
http://www.tryengineering.org/become.php?major=Computer+Engineering
http://www.businessdictionary.com/definition/software-engineering.html
http://www.techhive.com/article/45764/article.html
http://www.makeuseof.com/tag/5-of-the-worlds-most-famous-hackers-what-happened-to-them/
http://www.maximumpc.com/article/features/pc_pioneers_10_hackers_who_made_history


A blue box
The Bulletin Board System
Done by: Omar Al Bastami
Full transcript