Thursday, May 24, 2018

Introduction to Cybersecurity


History of Hacking
------------------

Timeline:

<1970 -="" computers="" early="" p="" radios="">
1970  - mainframes of campuses became targets
1980  - PCs were invented
1990  - internet
2000  - bluetooth, tablets, smartphones ..
>2000 - international law for computer crimes was established

"Making things easier for hackers is the fact that early network
technologies such as the Internet were never designed with security
as a goal. The goal was the sharing of information."

Famous hacks through the years:

1988 - 1st internet worm was created by Robert T. Morris, Jr.
1994 - Kevin Lee Pulsen took over telephone lines of Kiss-FM to win a Porsche
1999 - David L. Smith created "Melissa" virus w/c email itself to entries
       in user's address book
2001 - Jan de Wit created "Anna Kournikova" virus w/c reads all entries of
       a user's outlook address book
2002 - Gary McKinnon connected to deleted critical US military files
2004 - Adam Botbyl (together w/ 2 other friends) stole credit card information
       from Lowe's hardware chain
2005 - Cameron Lacroix hacked into Paris Hilton's phone
2009 - Kristina Vladimirovna (good looking russian hacker) skimmed around
       3 billion US $ on US banks
mid 2000s - "Stuxnet" virus attacked uranium production
          - "anonymous" group attacked local government networks

Generic examples of Cyber crimes
--------------------------------

1.  stealing usernames and passwords
2.  network intrusions
3.  social engineering (involves human interaction)
4.  posting/transmitting of illegal material
5.  fraud
6.  software piracy
7.  dumpster diving (reconstruction of broken data)
8.  malicious code (viruses)
9.  unauthorized destruction of data
10. embezzlement (form of financial fraud)
11. data-diddling (modification of information to cover up activities)
12. Denial-of-service (overloads a system resource)
13. ransomware (encrypts files on target system to get money)

Devices and Systems that adds security
--------------------------------------

Software:

- VPNs (Virtual Private Networks)
- IPs (Intrusion Prevention Systems)
- firewalls
- ACLs (Access Control Lists)
- biometrics
- smartcards

Physical security:

- cable locks
- device locks
- alarm systems

Malicious Attacks
-----------------

- Denial-of-service (DoS)
- manipulation of stock prices
- identity theft
- vandalism
- credit card theft
- piracy
- theft of service

Known hacker groups
-------------------

Anonymous


























LulzSec

























No comments:

Post a Comment