This document discusses the topic of hacking. It begins with an introduction and overview of general hacking methods and reasons hackers engage in hacking activities. Some key points made include that hackers hack for reasons such as stealing credit card information, identity theft, business information, or for ego. The document then discusses some negative effects of hacking such as financial losses suffered by companies like Sony, Citigroup, and AT&T due to hacks. A brief history of hacking is provided starting from the 1980s. The top 10 countries with the most hackers are listed, with the US ranked first. Finally, the document outlines degrees of computer crimes and corresponding penalties.
1. Introduction
2. GeneralHacking Methods
3. Why do Hackers Hack
4. Negative Effects of Hackers
5. Losses Due to Hackers
6. History of Hackers
7. Top 10 Countries with most Hackers
8. Missuse of Hacking Technology
3.
What is Hacking?
1.Hacking refers to
the activities which
are done to intrude
some one else’s
personal information
so as to use it for
malicious, unwanted
purposes.
2. Hacking is a term which refers to the activities aimed
at exploiting security flaws to obtain personal information
for gaining access to secured networks.
4.
A typical attackerworks in the following manner:
Identify the target system.
Gathering Information on the target system.
Finding a possible loophole in the target system.
Exploiting this loophole using exploit code.
Removing all traces from the log files and escaping without a trace.
5.
When someone hacksa computer or
network system, it's typically for one of
the following reasons:
1. Credit Card Information(for money)
In recent years it has become increasingly possible for
hackers to steal credit card information. With online
shopping and online banking becoming more prevalent, the
opportunity for a skilled hacker to acquire credit card
information continues to grow.
6.
2. Identity Theft
Hackerscan potentially steal
identity by simply hacking into a
computer. With a stolen identity,
a hacker can do almost everything.
3. Business Information
In the modern world it is not at all uncommon for incredibly
important business information to be stored on computers.
Hackers can steal financial information, account numbers,
and even client information.
4. Egotism
Some hackers hack computers solely to prove that they can.
These individuals may do anything from small-scale hacking
all the way up to full-on identity.
7.
1. FINANCIAL LOSSES
In2011, Sony lost $170 million due to a
hack of their PlayStation system. Also
in 2011, CitiGroup lost $2.7 million and
AT&T lost $2 million as a result of
hackers.
2. LOSS OF INFORMATION
Hacking often results in a loss of data
due to files being deleted or changed.
leak of top secret information could
cause real-world security issues.
Servers at the Pentagon, FBI, Interpol
and NASA have all been compromised at
various points. various points in the past ten
years.
8.
1. $171 million– Sony
2. $2.7 million – Citigroup
3. $2 million – Stratfor
4. $2 million – AT&T
9.
1980s
- Cyberspacecoined
-414arrested
-Two hackergroups formed
-2600published
1990s
-NationalCrackdownonhackers
-KevinMitnick arrested
-Microsoft’sNToperating system pierced
10.
Late 1990s
Hackers breakinto and defacefederal Web
sites, including the U.S. Department of Justice,
U.S. Air Force, CIA, NASA and others.
2013,India : Rs 2.4 crore heist by cyber
criminals who hacked into the Mumbai-based
current account of the RPG Group of
companies.
2011 ,Japan: Sony PlayStation Network Hack To
Cost $170 Million.
Missuse of HackingTechnology
Degree of
Computer
Crime
Amount of Damage or Harm
Required
Penalty
1st
degree Damage to or the value of the property or
computer services is over $10,000
B felony (up to 20 years in
prison, a fine of up to $15,000,
or both)
2nd
degree Damage to or the value of the property or
computer services is over $5,000
C felony (up to 10 years in
prison, a fine of up to $10,000,
or both)
3rd
degree ● Damage to or the value of the property or
computer services is over $1,000
● Reckless conduct that creates a risk of
serious physical injury to another person
D felony (up to five years in
prison, a fine of up to $5,000, or
both)
4th
degree Damage to or the value of the property or
computer services is over $500
A misdemeanor (up to one year
in prison, a fine of up to $2,000,
or both)
5th
degree Damage to or the value of the property or
computer services, if any, is $500 or less
B misdemeanor (up to six
months in prison, a fine of up to
$1,000, or both)