ISSC456_PPT_Ocasio_Miguel

pptx

School

American Military University *

*We aren’t endorsed by this school

Course

456

Subject

Computer Science

Date

Feb 20, 2024

Type

pptx

Pages

10

Uploaded by ocasio703

Report
COMPUTER HACKING BY MIGUEL OCASIO AMERICAN MILITARY UNIVERSITY ISSC456 B001 WINTER 2024 DR. LO'AI TAWALBEH
SUMMARY OF COMPUTER HACKING The term computer hacking refers to unauthorized access, manipulation, or exploitation of computer systems, networks, and data. It includes everything from stealing sensitive information to disrupting operations to breaching security measures. Malware, phishing, social engineering, and exploiting software vulnerabilities are some ways hackers infiltrate systems. Computer hackers can have a variety of motives, from financial gain to espionage, activism, or just a challenge to circumvent security measures. Hackers can target individuals, businesses, government agencies, and critical infrastructure, posing significant risks to privacy, security, and integrity. Organizations and individuals need to implement robust cybersecurity measures, like firewalls, encryption, access controls, regular software updates, and employee training. Furthermore, law enforcement, cybersecurity experts, and the private sector should work together to identify and prosecute hackers and prevent cyberattacks.
TECHNOLOGY IN COMPUTER HACKING Getting unauthorized access to computers and networks involves a variety of technologies and methodologies. To exploit vulnerabilities in target systems, hackers use sophisticated software tools like malware, exploit kits, and remote access tools. Additionally, they use network scanners to find potential entry points and password cracking techniques to bypass authentication. Often, social engineering tactics are used to trick people into divulging sensitive information or compromising security. Cryptography and encryption serve two purposes: protecting communications and data, and obfuscating malicious activity. In order to defend against hacking attacks, cybersecurity professionals need to understand these technologies, so they can develop robust security strategies and countermeasures.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
TECHNOLOGY IN COMPUTER HACKING CONT. Phishing emails, which mimic legitimate emails, can deceive users into revealing confidential information or downloading malicious attachments. By exploiting misconfigurations or weak security controls, hackers can escalate privileges. To evade detection by antivirus software, they might also use rootkits or backdoors. Artificial intelligence and machine learning are being used by both hackers and defenders to boost their capabilities and automate some things. Staying up to date on new threats and defensive techniques is crucial to effectively mitigating cyber risks and protecting digital assets.
FUTURE TRENDS IN COMPUTER HACKING As technology advances, computer hacking trends will evolve, presenting cybersecurity professionals with both challenges and opportunities. With artificial intelligence (AI) maturing, hackers will likely use AI-driven tools to automate and enhance their attacks, enabling more sophisticated and targeted attacks. Furthermore, the proliferation of Internet of Things (IoT) devices creates new attack surfaces, since interconnected devices usually lack robust security measures, making them vulnerable. Hackers could also use quantum computing to break encryption standards, making current security protocols obsolete. Additionally, decentralized technologies like blockchain introduce new paradigms for hacking and cybersecurity, with potential vulnerabilities and innovative defense mechanisms emerging at the same time. Keeping abreast of emerging threats and adopting proactive strategies to guard against evolving hacking techniques is important as the digital landscape evolves.
KNOWN COMPUTER HACKING GROUPS Various computer hacking groups operate around the world, each with their own motivations, techniques, and targets. Fancy Bear, also known as APT28, is believed to be linked to Russian military intelligence. Known for its sophisticated cyber espionage campaigns, this group targets government agencies, political organizations, and critical infrastructure worldwide. There's also Lazarus Group, attributed to North Korea, responsible for high-profile cyber attacks such as Sony Pictures' 2014 hack and WannaCry's 2017. There's also Anonymous, a loosely organized collective known for its hacktivist activities. As a result of its high-profile attacks on Sony, FBI-affiliated websites, and gaming companies, LulzSec gained notoriety. Cybersecurity professionals and organizations around the world face significant challenges from these hacking groups because of their diverse motivations and capabilities.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ISSUES SURROUNDING COMPUTER HACKING The laws and regulations surrounding computer hacking are complex, but they're all trying to deter and punish unauthorized access to computers and networks. The Computer Fraud and Abuse Act (CFAA) criminalizes computer hacking, including unauthorized access to protected computers, data theft, and malware distribution. International agreements like the Budapest Convention on Cybercrime provide a framework for cooperation among nations in fighting cybercrime, including hacking. The General Data Protection Regulation (GDPR) in Europe imposes strict requirements on organizations to protect personal data and report data breaches to regulators as soon as possible. In the digital age, cybersecurity is more important than ever, which is why we need robust legal frameworks to deal with hacking threats. Organizations need to comply with these regulations to mitigate legal risks and protect sensitive information.
RECENT GLOBAL IMPLICATIONS ON COMPUTER HACKING There's been a lot of talk about cyber threats recently, and how they're pervasive. As society becomes increasingly digital and reliant on interconnected systems, hacking affects businesses, governments, and critical infrastructure worldwide. High-profile cyberattacks, like ransomware incidents targeting healthcare institutions and supply chain disruptions affecting multinational corporations, have highlighted the need for enhanced cybersecurity measures and international collaboration to deal with cyber threats effectively. In addition, state-sponsored hacking activities, such as espionage and cyber warfare, pose significant geopolitical challenges. Advanced hacking techniques, like zero-day exploits and supply chain attacks, complicate cybersecurity efforts and necessitate continuous innovation in defensive strategies. For safeguarding digital infrastructure and preserving trust in the digital economy, we need global cooperation, proactive cybersecurity measures, and robust incident response capabilities.
INFORMATIVE PODCAST REGARDING COMPUTER HACKING BASICS Ryan Montgomery a world renowned Ethical Hacker delves deep into the realm of Computer Hacking and the Dark web, In this Podcast hosted by Shawn Ryan, you'll see how Ryan goes into depth about the Dark Web and what information is at the hands of Hackers, He also goes onto explain how easy it is to obtain your PII and sell it on the Black Market.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
REFERENCES (PDF) towards the impact of hacking on Cyber Security. (n.d.-b). https://www.researchgate.net/publication/326812925_TOWARDS_THE_IMPACT_OF_HACKING_ON_CYBER_SECU RITY Christopher Reinhart, C. A. (n.d.). Penalties for computer hacking. https://www.cga.ct.gov/2012/rpt/2012-r- 0254.htm The dangers of hacking and what a Hacker . Webroot. (n.d.). https://www.webroot.com/us/en/resources/tips- articles/computer-security-threats-hackers Hacker: Who are hackers? what is hacking? . Malwarebytes. (2023, November 22). https://www.malwarebytes.com/hacker Hacking and cracking, done respectfully. (n.d.-a). https://www.reddit.com/r/ethicalhacking/ YouTube. (2023, May 8). Ryan Montgomery - #1 ethical hacker who hunts child predators catches one live on podcast | SRS #56 . YouTube. https://www.youtube.com/watch?v=qjz_07-DvE0