SlideShare a Scribd company logo
1 of 22
.    /$$   /$$                      /$$
.   | $$ | $$                      | $$ /$$ /$$
.   | $$ | $$ /$$$$$$$     /$$$$$$$| $$ /$$ |    /$$$$$$$$   /$$$$$$$
.   | $$$$$$$$ /$$___/$$  /$$_____/| $$/$$    $$| $$___/ $$ /$$___/ $$
.   | $$ | $$| $$    |$$ | $$      | $$$$   | $$| $$   | $$| $$   | $$
.   | $$ | $$| $$    |$$ | $$      | $$ $$ | $$| $$   | $$| $$   | $$
.   | $$ | $$| $$$$$$$$$$| $$$$$$$| $$  $$| $$| $$    | $$| $$$$$$$$$
.   |__/ |__/ _________/ _______/|__/ _/|__/|__/    |__/|______| $$
                                                                  | $$
                                                                  | $$
                                                             /$$$$$$$/
                                                             |______/
                                     Yours truly,
                  Marc Leprince, Connor Kistler,
         Lauren Stracquatanio, and Nick Cortese
   Computer Security:
     Finding, and exploiting weaknesses of
     computers
      ○ Phishing, Spam E-mail, Virus, bots…

   Computer Science:
     The process of finding insights in problem-
     solving to create, innovate, and share
      ○ Computer Security, Facebook, Subculture
   White Hat:
     Ethical Hacker
   Black Hat:
     Malicious Hacker
   Cracker:
     people who enjoy breaking into computers and
      phreaking the phone system
      ○ The basic difference is this: hackers build things,
        crackers break them.
   Script Kiddie:
     Leeches/computer game hacks
 http://catb.org/~esr/faqs/hacker-howto.html
   Range from the Internet equivalent of
    petty theft to state-sponsored
    terrorism
     Personal Computer Users
     Corporations
     Governments/ National Security
   Spam E-mails
   Identity Theft
   Sony
     171 Million Dollar Loss
     News Report
   Citibank
“Phonemasters”
   People who break into a computer system and inform the
    company that they have done so. They are either concerned
    employees or security professionals who are paid to find
    vulnerabilities. White hat hackers are the „good guys.‟”
   White Hat Hackers are hired to find the holes in security in
    order to improve the security mainframe more efficiently..
   Famous White Hat Hackers Include:
     Steve Wozniak—the other Apple founder named Steve, started his
      career creating blue boxes with Steve Jobs that allowed users to
      hack the phone system and access free long distance calling.
     Kevin Mitnick—a white hat consultant and writer for big companies
      nowadays, Mitnick started his career in 1982 by hacking a computer
      in the North American Air Defense Command in Colorado Springs,
      CO. He also altered a phone program to misdirect federal agents
      trying to trace his call, sending them barging into the home of a
      Middle Eastern immigrant watching television.
 The government, specifically the NSA
  (National Security Association), is looking
  for new white hat and black hackers who
  can help improve offensive and defensive
  tactics and abilities in cyber warfare.
 As of June 2012 there were over 15,000
  job offers posted online for ethical hacking
  positions.
     The hacking and computer security is growing
     significantly, and the most effective way to
     protect ourselves from cyber warfare is to
     increase the man power operating, improving,
     and implementing our online security.
   Every year, Las Vegas hosts one of the
    largest anonymous hacking conventions in
    the world called DEFCON.
     The convention does not require attendees to
      provide their name, email address, or social
      security number, and is attended by hundreds if
      not thousands of federal agents looking to
      recruit new experts every year.
     The cooperation between hackers and the
      government has grown significantly.
      ○ NSA director General Keith Alexander spoke at
        the recent 2012 DEFCON convention.
   White hat hackers, those who protect
    the United States from foreign cyber
    threats, are in high demand.
     The chances of getting hacked as an
     individual are slim, since for the majority of
     people nothing would be accomplished.
     ○ As an enemy to the U.S., hacking the nation‟s
       military and intelligence agencies is more
       lucrative and beneficial. For this reason we
       need more White Hat Hackers to defend us.
- Operate using quantum physics
- Ability to solve problems that today‟s
  computers can not
    - Credit card hacking
-   Black Holes
    - Idea that black holes can be used as
     quantum computer to store information
- Taking control of automobiles using
  computer-programming skills
- Modern cars‟ operating systems are all
  connected in a network called the
  controller-area-network bus (CAN bus)
- Examples:
    - Door Locks
    - Telematics System
    - Automatic Key
 Terrorists have become very “cyber savvy”
 Using cyber space to conduct operations
  (not just to spread ideas and recruit)
     Planned May 2010 Times Square bombings
   Trying to get trade secrets by hacking
 “Organized crime in cyber space offers a
  higher profit with a lower probability of
  being identified and prosecuted.”
 FBI is fighting back
 http://www.youtube.com/watch?v=U0
 OZlGu-kMo
 Now that you know how advanced hacking
  has gotten today, does this make you any
  less trusting or wary of the internet?
 Have the new opportunities in hacking
  presented today inspired any of you to look
  for employment in the field? Explain.
 To what uses could hacking be specialized
  towards in the future and for what reason?
   http://en.wikipedia.org/wiki/Hacker_%28computer_security%29
   http://catb.org/~esr/faqs/hacker-howto.html
   http://www.santafenewmexican.com/LocalNews/Santa-Fe-institute-
    Secrets-at-risk-when-code-breaking-takes-qua
   http://www.dailygalaxy.com/my_weblog/2012/03/-hacking-the-cosmos-
    quantum-computers-will-solve-problems-that-would-take-todays-
    computers-longer-th.html
   http://www.caranddriver.com/features/can-your-car-be-hacked-feature
   http://www.fbi.gov/news/speeches/combating-threats-in-the-cyber-world-
    outsmarting-terrorists-hackers-and-spies
   http://www.pbs.org/wgbh/pages/frontline/shows/hackers/risks
   http://www.wired.com/gamelife/2011/05/sony-psn-hack-losses/
   http://www.telegraph.co.uk/technology/news/8589664/Hacking-the-risks-
    to-internet-users-arent-going-away.html
   http://www.pcmag.com/encyclopedia_term/0,1237,t=white+hat+hacker&i
    =54434,00.asp
   http://www.investopedia.com/financial-edge/0811/famous-white-hat-
    hackers.aspx#axzz26m8qtRyP
   http://www.forbes.com/sites/andygreenberg/2012/06/15/new-grad-looking-for-a-job-
    pentagon-contractors-post-openings-for-black-hat-hackers-2/2/
   http://www.huffingtonpost.com/2012/07/20/defcon-2012_n_1691246.html

More Related Content

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

SIT Hacking presentation

  • 1. . /$$ /$$ /$$ . | $$ | $$ | $$ /$$ /$$ . | $$ | $$ /$$$$$$$ /$$$$$$$| $$ /$$ | /$$$$$$$$ /$$$$$$$ . | $$$$$$$$ /$$___/$$ /$$_____/| $$/$$ $$| $$___/ $$ /$$___/ $$ . | $$ | $$| $$ |$$ | $$ | $$$$ | $$| $$ | $$| $$ | $$ . | $$ | $$| $$ |$$ | $$ | $$ $$ | $$| $$ | $$| $$ | $$ . | $$ | $$| $$$$$$$$$$| $$$$$$$| $$ $$| $$| $$ | $$| $$$$$$$$$ . |__/ |__/ _________/ _______/|__/ _/|__/|__/ |__/|______| $$ | $$ | $$ /$$$$$$$/ |______/ Yours truly, Marc Leprince, Connor Kistler, Lauren Stracquatanio, and Nick Cortese
  • 2. Computer Security:  Finding, and exploiting weaknesses of computers ○ Phishing, Spam E-mail, Virus, bots…  Computer Science:  The process of finding insights in problem- solving to create, innovate, and share ○ Computer Security, Facebook, Subculture
  • 3. White Hat:  Ethical Hacker  Black Hat:  Malicious Hacker  Cracker:  people who enjoy breaking into computers and phreaking the phone system ○ The basic difference is this: hackers build things, crackers break them.  Script Kiddie:  Leeches/computer game hacks
  • 5.
  • 6. Range from the Internet equivalent of petty theft to state-sponsored terrorism  Personal Computer Users  Corporations  Governments/ National Security
  • 7. Spam E-mails  Identity Theft
  • 8. Sony  171 Million Dollar Loss  News Report  Citibank
  • 10.
  • 11. People who break into a computer system and inform the company that they have done so. They are either concerned employees or security professionals who are paid to find vulnerabilities. White hat hackers are the „good guys.‟”  White Hat Hackers are hired to find the holes in security in order to improve the security mainframe more efficiently..  Famous White Hat Hackers Include:  Steve Wozniak—the other Apple founder named Steve, started his career creating blue boxes with Steve Jobs that allowed users to hack the phone system and access free long distance calling.  Kevin Mitnick—a white hat consultant and writer for big companies nowadays, Mitnick started his career in 1982 by hacking a computer in the North American Air Defense Command in Colorado Springs, CO. He also altered a phone program to misdirect federal agents trying to trace his call, sending them barging into the home of a Middle Eastern immigrant watching television.
  • 12.  The government, specifically the NSA (National Security Association), is looking for new white hat and black hackers who can help improve offensive and defensive tactics and abilities in cyber warfare.  As of June 2012 there were over 15,000 job offers posted online for ethical hacking positions.  The hacking and computer security is growing significantly, and the most effective way to protect ourselves from cyber warfare is to increase the man power operating, improving, and implementing our online security.
  • 13. Every year, Las Vegas hosts one of the largest anonymous hacking conventions in the world called DEFCON.  The convention does not require attendees to provide their name, email address, or social security number, and is attended by hundreds if not thousands of federal agents looking to recruit new experts every year.  The cooperation between hackers and the government has grown significantly. ○ NSA director General Keith Alexander spoke at the recent 2012 DEFCON convention.
  • 14. White hat hackers, those who protect the United States from foreign cyber threats, are in high demand.  The chances of getting hacked as an individual are slim, since for the majority of people nothing would be accomplished. ○ As an enemy to the U.S., hacking the nation‟s military and intelligence agencies is more lucrative and beneficial. For this reason we need more White Hat Hackers to defend us.
  • 15.
  • 16. - Operate using quantum physics - Ability to solve problems that today‟s computers can not - Credit card hacking - Black Holes - Idea that black holes can be used as quantum computer to store information
  • 17. - Taking control of automobiles using computer-programming skills - Modern cars‟ operating systems are all connected in a network called the controller-area-network bus (CAN bus) - Examples: - Door Locks - Telematics System - Automatic Key
  • 18.  Terrorists have become very “cyber savvy”  Using cyber space to conduct operations (not just to spread ideas and recruit)  Planned May 2010 Times Square bombings  Trying to get trade secrets by hacking  “Organized crime in cyber space offers a higher profit with a lower probability of being identified and prosecuted.”  FBI is fighting back
  • 20.
  • 21.  Now that you know how advanced hacking has gotten today, does this make you any less trusting or wary of the internet?  Have the new opportunities in hacking presented today inspired any of you to look for employment in the field? Explain.  To what uses could hacking be specialized towards in the future and for what reason?
  • 22. http://en.wikipedia.org/wiki/Hacker_%28computer_security%29  http://catb.org/~esr/faqs/hacker-howto.html  http://www.santafenewmexican.com/LocalNews/Santa-Fe-institute- Secrets-at-risk-when-code-breaking-takes-qua  http://www.dailygalaxy.com/my_weblog/2012/03/-hacking-the-cosmos- quantum-computers-will-solve-problems-that-would-take-todays- computers-longer-th.html  http://www.caranddriver.com/features/can-your-car-be-hacked-feature  http://www.fbi.gov/news/speeches/combating-threats-in-the-cyber-world- outsmarting-terrorists-hackers-and-spies  http://www.pbs.org/wgbh/pages/frontline/shows/hackers/risks  http://www.wired.com/gamelife/2011/05/sony-psn-hack-losses/  http://www.telegraph.co.uk/technology/news/8589664/Hacking-the-risks- to-internet-users-arent-going-away.html  http://www.pcmag.com/encyclopedia_term/0,1237,t=white+hat+hacker&i =54434,00.asp  http://www.investopedia.com/financial-edge/0811/famous-white-hat- hackers.aspx#axzz26m8qtRyP  http://www.forbes.com/sites/andygreenberg/2012/06/15/new-grad-looking-for-a-job- pentagon-contractors-post-openings-for-black-hat-hackers-2/2/  http://www.huffingtonpost.com/2012/07/20/defcon-2012_n_1691246.html

Editor's Notes

  1. The basic difference is this: hackers build things, crackers break them.
  2. http://www.geekyard.com/os/windows/top-5-fbi-hd-desktop-wallpapers-collection/