Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Hacking && Anonymous

No description
by

wiam benhammou

on 12 December 2015

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Hacking && Anonymous

Some of the most significant yet dangerous hackers are:

.
Kevin Mitnick
(Alias: 
The Condor
) who started hacking at the age of 15. He was arrested in 1995. "it was thought that he could start a nuclear war just by whistling codes into payphone”

.
Gary McKinnon
(Alias:
Solo
) who had hacked about 100 American military and NASA servers in one year.

.
Anonymous
is a group of ‘
hacktivits
’ it was created in 2003 and has done many attacks as a response to defend humans’ safety.
Main questions discussed in the presentation:
Throughout history the term

hacking

was related to

breaking the law
.

There are good hackers sometimes called legal or
white hat hackers

and their counterpart
 
black hat hackers


So

how can we distinguish between them
?
Do both of them break Computer sciences’ ethics
?
What are some of the strategies followed in hacking
?
What is the position of Anonymous group ethically speaking
?
What may be the solution
?


Ethical
hacking is a proactive form of information security.



The purpose of
ethical
hacking is to evaluate the
security
of a network or system's infrastructure.



Vulnerabilities
tend to be found in poor or improper system configuration, known and unknown hardware or software
flaws
..
What is "Ethical Hacking" ?
Good hackers
basically use their skills for the sake of mankind’s security.



Crackers
seek critical information and use hacking skills for their own profit.



Black-hat hacker
either ignores or intentionally defies legal or regulatory statutes with presumably little interest in ethical frameworks.

Black OR White ?
Hacking && Anonymous
By Wiam Benhammou && Oumaima Yaakoubi
The first hacker in the history:
Strategies of Black&White hat hacker ?

Anonymous
group of hacktivits can be considred as
ethical
hackers with their famous attacks against extremist organizations. (e.g Vs
ISIS
)


Unfortunately the
jihadist
group has shown its technical capabilities through its discreet methods of communication and spread of online propaganda.


It also employs a help desk staffed with operatives to protect its communications network 24 hours a day,
NBC News reports.

Anonymous and hacking:

Hacking
 and system cracking appeared with the first electronic computers.

The first hacking operation was made by the british
Nevil Maskelyn
in 1903.


Nevil
had disrupted 
John Ambrose

Fleming
's public demonstration of 
Guglielmo Marconi
's (an italian iventor and electrical engineer) purportedly secure wireless telegraphy  technology, sending insulting Morse code messages through the auditorium's projector”.
Black
Hat Strategies:


Duplicate content =>

White
Hat Strategies:


Relevant content =>

The hacker collective on Tuesday
17/11
boasted it had shut down more than
5,500
Twitter accounts connected to ISIS.



Anonymous
often targets the online data of governments or corporations


What Can Be Done ?


The solution starts with software known as a
firewall
.


It keeps
unauthorized
people
out
.


The best firewalls
don't allow
incoming messages to touch the rest of the network.


A good
firewall
thwarts intruders from sending the high-tech equivalent of damaging subliminal messages.

Conclusion
:

Restricting hackers with laws leaves more undiscovered vulnerabilities


~~
ONE perspective
:
NO hackers => NO reason to fix undiscovered vulnerabilities.
NO hackers => A little reason to improve security measures.

~~
BUT
:
As long as the questions “
Why?
” and “
What if?
” are asked, hackers will always exist.

A world without hackers would be a world without curiosity and innovation.



Work Cited:

http://searchsecurity.techtarget.com/definition/ethical-hacker

http://www.complex.com/pop-culture/2015/02/the-most-dangerous-hackers-and-groups/anonymous
http://eds.b.ebscohost.com/eds/ebookviewer/ebook/bmxlYmtfXzQ0MDA0Nl9fQU41?sid=806ab7e0-3a9e-4460-b235-f1c92829776e@sessionmgr198&vid=2&format=EB&rid=5

http://eds.b.ebscohost.com/eds/detail/detail?vid=3&sid=806ab7e0-3a9e-4460-b235-f1c92829776e%40sessionmgr198&hid=120&bdata=JnNpdGU9ZWRzLWxpdmU%3d#AN=440046&db=nlebk

Thank You.
White hat hacker
does not break laws nor ethics related to computer science.



Many of
WHH
are employed in security agencies all over the world, and help in tracking
terrorists
and prevent their potential attacks.
What

can

Anonymous

do
to
ISIS
:


Target emails and Twitter accounts.
Slow the jihadists' online coordination and propaganda by shutting down bitcoin donation hubs.
Waging distributed denial-of-service attacks to overload the terror group's servers. 
Technology
is always changing and expanding, so there will always be new hacks.


There will always be new
vulnerabilities
in software,
ambiguities
in protocol specifications.

It’s up to everyone interested in computer science to expand upon it by continually figuring out how things work, thinking of the things that the developers
didn’t think of
.




It’s up to
YOU
to make the
BEST
of these
discoveries
.


Information itself isn’t a crime !
The number of electronic crimes is
increasing more rapidly
than the ability to stop them.

53%
of
428
respondents: They had been victims of computer viruses.

42%
acknowledged that unauthorized use of their computer systems had occurred in the prior
12 mths
.

Companies recently victimized:
Boeing, Netscape Communications, Rockwell International, and Sun Microsystems
.

The
Bank of London
, have even paid
hackers
a total of more than a
half-M $
. (keep mum)

Tech crimes cost
U.S
. corporations
$63 B/ Y
.
Invisible
text and
stuffed
keywords.

Cloaking
or
re-directing
the user to
another site or page.


Links from sites with
non
-relevant
content.
Well-labeled
images.


Relevant
links and references.


Complete
sentences with
good
spelling and grammar.


Standards
-
compliant
HTML. Unique and
relevant
page titles.
Full transcript