Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
Hacking && Anonymous
Transcript of Hacking && Anonymous
) who started hacking at the age of 15. He was arrested in 1995. "it was thought that he could start a nuclear war just by whistling codes into payphone”
) who had hacked about 100 American military and NASA servers in one year.
is a group of ‘
’ it was created in 2003 and has done many attacks as a response to defend humans’ safety.
Main questions discussed in the presentation:
Throughout history the term
was related to
breaking the law
There are good hackers sometimes called legal or
white hat hackers
and their counterpart
black hat hackers
how can we distinguish between them
Do both of them break Computer sciences’ ethics
What are some of the strategies followed in hacking
What is the position of Anonymous group ethically speaking
What may be the solution
hacking is a proactive form of information security.
The purpose of
hacking is to evaluate the
of a network or system's infrastructure.
tend to be found in poor or improper system configuration, known and unknown hardware or software
What is "Ethical Hacking" ?
basically use their skills for the sake of mankind’s security.
seek critical information and use hacking skills for their own profit.
either ignores or intentionally defies legal or regulatory statutes with presumably little interest in ethical frameworks.
Black OR White ?
Hacking && Anonymous
By Wiam Benhammou && Oumaima Yaakoubi
The first hacker in the history:
Strategies of Black&White hat hacker ?
group of hacktivits can be considred as
hackers with their famous attacks against extremist organizations. (e.g Vs
group has shown its technical capabilities through its discreet methods of communication and spread of online propaganda.
It also employs a help desk staffed with operatives to protect its communications network 24 hours a day,
NBC News reports.
Anonymous and hacking:
and system cracking appeared with the first electronic computers.
The first hacking operation was made by the british
's public demonstration of
's (an italian iventor and electrical engineer) purportedly secure wireless telegraphy technology, sending insulting Morse code messages through the auditorium's projector”.
Duplicate content =>
Relevant content =>
The hacker collective on Tuesday
boasted it had shut down more than
Twitter accounts connected to ISIS.
often targets the online data of governments or corporations
What Can Be Done ?
The solution starts with software known as a
The best firewalls
incoming messages to touch the rest of the network.
thwarts intruders from sending the high-tech equivalent of damaging subliminal messages.
Restricting hackers with laws leaves more undiscovered vulnerabilities
NO hackers => NO reason to fix undiscovered vulnerabilities.
NO hackers => A little reason to improve security measures.
As long as the questions “
” and “
” are asked, hackers will always exist.
A world without hackers would be a world without curiosity and innovation.
White hat hacker
does not break laws nor ethics related to computer science.
are employed in security agencies all over the world, and help in tracking
and prevent their potential attacks.
Target emails and Twitter accounts.
Slow the jihadists' online coordination and propaganda by shutting down bitcoin donation hubs.
Waging distributed denial-of-service attacks to overload the terror group's servers.
is always changing and expanding, so there will always be new hacks.
There will always be new
in protocol specifications.
It’s up to everyone interested in computer science to expand upon it by continually figuring out how things work, thinking of the things that the developers
didn’t think of
It’s up to
to make the
Information itself isn’t a crime !
The number of electronic crimes is
increasing more rapidly
than the ability to stop them.
respondents: They had been victims of computer viruses.
acknowledged that unauthorized use of their computer systems had occurred in the prior
Companies recently victimized:
Boeing, Netscape Communications, Rockwell International, and Sun Microsystems
Bank of London
, have even paid
a total of more than a
. (keep mum)
Tech crimes cost
$63 B/ Y
the user to
another site or page.
Links from sites with
links and references.
spelling and grammar.
HTML. Unique and