Sie sind auf Seite 1von 15

hackers

By: Amir Agassi, Isabelle Bakhshaei, Amy Jun, Mirai Okada


Isabelle
Slide title Slide number

definition 3

types of hackers 4

Hacking techniques 5

How hackers guess your 6


Contents password

Current News Article 7

restrictions 8

statistics 10

impacts of hackers 11

opinion 12

bibliography 13
Mirai

Definition

A hacker is a person that uses the advantage of a computer and the


network to use their skills to overcome a technical problem or to
gain to unauthorized access to networks, computers and systems.
Mirai

Types of Hackers
❏ White hat hackers

❏ Black hat hackers

❏ Grey hat hackers


Amy

Frequently Used Hacking Techniques


- Hackers will find vulnerabilities
- Password guessing is called Brute Force attack (more on this later)
- May look at the traffic on WiFi
- They use Tor Networking System
- They can download all files on a victim’s computer onto their’s
Am
y

How Hackers Guess Your Password


- They can hack into your social media
- Find out personal info (important dates, family members,
etc.)
- Try multiple variations
- Usually doesn’t take too long
Routing the traffic from shop to shop, making it virtually untraceable. You made it
really hard for anyone to see it. But I saw it. With all the public info out there
on you; birth dates, anniversary dates, family names, pets… I cracked your password
in three minutes. -Elliot (Mr. Robot)
Am
y

Current News Article


- Police officer hacked personal info
of a woman from police database
- Sent her personal info to former
abusive husband
- Has been charged with 9 counts of
computer hacking
Isabelle

What restrictions should be put to prevent


the abuse of a hacker’s power?
1. Update security
2. Add computer laws
3. Install an encryption
software
Isabelle
Degree Amount of Damage or Harm Penalty
of Required
Computer
Crime Existing laws
1st degree Damage to or the value of the
property or computer services is
up to 20 years in
prison, a fine of up and penalties
over $10,000 to $15,000, or both

2nd degree Damage to or the value of the up to 10 years in


property or computer services is prison, a fine of up
over $5,000 to $10,000, or both

3rd degree ● Damage to or the value of the up to five years in


property or computer services is prison, a fine of up
over $1,000 to $5,000, or both
● Reckless conduct that creates
a risk of serious physical
injury to another person

4th degree Damage to or the value of the up to one year in


property or computer services is prison, a fine of up
over $500 to $2,000, or both

5th degree Damage to or the value of the up to six months in


property or computer services, prison, a fine of up
if any, is $500 or less to $1,000, or both
Mirai

Statistics
❏ There is an attack every 39 seconds

❏ It will cost 2 trillion by 2019

❏ 4 million stolen records since


2013

❏ $1 trillion is expected to be
used globally on cybersecurity
by 2021
Amir

Impacts of hackers
Bad Hackers
Good Hackers

● Breaks into computer


Helps companies systems
by finding to steal, change
vulnerabilities
or destroy information
● Reports and fixes harmful bugs
● Can steal or spy on very sensitive information
Improvesof
● Victims the security
these of can
hackers companies
get their
and organizations
identities stolen or have their credit
ruined
Amir

Opinion
Hackers should be allowed to:

❖ Help companies with security


❖ Help investigate security breaches

Hackers shouldn’t be allowed to:

❖ Hack anything without permission


❖ Steal or destroy information from unknowing victims
❖ Hack companies and organizations for their own personal gain
Mirai
Bibliography
Cloudbric. (2018, March 23). The Top 10 Hackers Arrested in 2017 | Cloudbric Blog. Retrieved December 14, 2018, from

https://www.cloudbric.com/blog/2017/07/top-10-hackers-arrested-2017/

Milkovich, D. (2018, December 03). 13 Alarming Cyber Security Facts and Stats | Cybint. Retrieved December 14, 2018, from

https://www.cybintsolutions.com/cyber-security-facts-stats/

Security hacker. (2018, October 26). Retrieved December 14, 2018, from https://en.wikipedia.org/wiki/Security_hacker

The Dangers of Hacking and What a Hacker. (n.d.). Retrieved December 14, 2018, from

https://www.webroot.com/us/en/resources/tips-articles/computer-security-threats-hackers

Tor (anonymity network). (2018, December 13). Retrieved December 14, 2018, from

https://en.wikipedia.org/wiki/Tor_(anonymity_network)

What is hacker? - Definition from WhatIs.com. (n.d.). Retrieved December 14, 2018, from

https://searchsecurity.techtarget.com/definition/hacker
Bibliography slide2

https://www.complex.com/life/2018/11/how-to-avoid-getting-hacked/encryption-software

https://www.cga.ct.gov/2012/rpt/2012-R-0254.htm

Das könnte Ihnen auch gefallen