KEMBAR78
Cybercrime (Computer Hacking) | PPTX
CybercrimeComputer HackingBy Esteban Valencia & Michael AsresApril 7th, 2010(1)
Table of ContentsWhat is Computer Hacking?Types of Computer Hackers
OriginsMotivationConsequencesMajor CrimesEthical StandsWhat is Computer Hacking?	(2)
Computer Hacking - History1960 MIT (Massachusetts Institute of Technology)Tools & HackersTools (nerdy student)Hackers (lazy student)Personal Computer Telephone Systems – Phreak Software – Crackers
Computer Hacking - MotivationImaginative pursue – Hobbyists (modifications of electronic hardware)Financial means – Job & CrimeHackers vs. Crackers
Computer Hacking - ConsequencesUnauthorized use of a computer or networkKevin Mitnick (Sentencing depending on the seriousness of the offence) Little to no-time served(3)
Computer Hacking – Major CrimesAdrian Lamo (New York 2003)Unauthorized access to a computer and possession of illegal stolen access devicesKevin MitnickMost wanted computer criminal (U.S)1979 Unauthorized access (age 16)Valuable info/ (Cellular telephone and computer companies, computer passwords)
Computer Hacking – Ethical StandsHacker ethics (Whether they can do it or not?)When they can do it would they go further?Hackers and Crackers(4)
Types of Computer HackersAttitudesMethods(5)
Types of Computer Hackers - AttitudesWhite Hat
Non-malicious reasons, enjoy learning (ex. testing their own security system)
Grey Hat
Beyond the point of a malicious intend
Black Hat/Cracker

Cybercrime (Computer Hacking)