1 computer crime web warriors – cbc documentary link to video

35
1 Computer Crime Web Warriors – CBC Documentary Link to video http://www.youtube.com/watch?v=34cwMz3HZ8Q

Upload: oliver-moody

Post on 02-Jan-2016

215 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: 1 Computer Crime Web Warriors – CBC Documentary Link to video

1

Computer Crime

Web Warriors – CBC Documentary

Link to videohttp://www.youtube.com/watch?v=34cwMz3HZ8Q

Page 2: 1 Computer Crime Web Warriors – CBC Documentary Link to video

Computer Crime Lesson Plan

1. Web Warriors Video (First 10 minutes)

2. Discuss Video or write Summary (Slides 3-5)

3. Continue Web Warriors Video (Skip to 15:40 mark about Mafia Boy)

4. Discuss and take notes about Mafia Boy (Slides 6-9)

5. Skip to other sections of video. Time is listed on slides (Slides 10-15)

6. Discuss or take notes about Cyber Warfare

7. Students Complete the Articles and Questions (Slides 25-28)

8. Students search for the Computer Crime Definitions (Slide 29)

9. Top Hacker Shows Us How Its Done video. Discuss with students. (Slide 16-17)

Note: There are many other ways you may wish to deliver the material in this presentation.

2

Page 3: 1 Computer Crime Web Warriors – CBC Documentary Link to video

Blaster Worm

3

1-10 minutes into film

No specific target

In the past, you had to open an attachment file to receive a virus

Our most critical systems are connected to the internet through Microsoft software

Self Activating

Blaster Worm can infect your computer simply by being on-line

Page 4: 1 Computer Crime Web Warriors – CBC Documentary Link to video

3 Types of Hackers

4

The internet was not set-up to be secureIt was meant to share information between computers

White HatsThe Good GuysThe IT people

Black HatsBad Guys

Crooks that try to steal your credit card

number etc. Grey HatsWork both sides of

the streetCan be bought for

hire

White Hats

BlackHats

GreyHats

Types ofHackers

Page 5: 1 Computer Crime Web Warriors – CBC Documentary Link to video

5

Donnie – The Hacker

•Donnie hacked into India’s critical infrastructure•Within 5 minutes, he hacked into a major airline•DEFCON, the largest internet convention•The FBI go to DEFCON to learn about the newest hacking strategies

Page 6: 1 Computer Crime Web Warriors – CBC Documentary Link to video

6

MafiaBoyThis segment of the video starts at 15:40

Page 7: 1 Computer Crime Web Warriors – CBC Documentary Link to video

7

Mafiaboy•Mafiaboy’s real name is Michael Calce•He was just 15 years old when he committed computer crime•Michael took down big companies like CNN, Yahoo and eBay•He sent a Denial of Service attack against the companies

Page 8: 1 Computer Crime Web Warriors – CBC Documentary Link to video

8

• The newest type of computer virus is called Storm Worm• It is always changing. Every time you disconnect you get

a different copy• China and Russia are particularly bad for creating viruses• Warfare between countries involves sending viruses to

attack banks and government offices

Page 9: 1 Computer Crime Web Warriors – CBC Documentary Link to video

9

Denial of Service Attack1.Describe what happens during a denial of service attack•The hacker gains access to many large university computers•Harness that power by sending many requests to a company such as yahoo.com•The website can not handle all of those requests and it crashes

Page 10: 1 Computer Crime Web Warriors – CBC Documentary Link to video

10

Russia 32-35 minutes into film•Russia - the country of hacking•The internet allowed the Russian mob to go global•At the beginning of 2007, since the start of the internet, there were 250,000 viruses•In 1 year, during 2007, it went from 250,000 viruses to 500,000 viruses

Page 11: 1 Computer Crime Web Warriors – CBC Documentary Link to video

11

WoodPeckers and Storm Worm 36 minutes into film•Woodpeckers – hammer keyboards very fast, trying to eliminate viruses

•Storm Worm, newest type of virus appears •No one knows its purpose•Doesn’t destroy anything – yet•It’s always changing•Every time you download it, you get a different copy

Page 12: 1 Computer Crime Web Warriors – CBC Documentary Link to video

12

Storm Worm – continued…•Turns a computer into a Zombie•The author of the virus can control your computer remotely•They harness they power of all the zombie computers together creating a Botnet

Page 13: 1 Computer Crime Web Warriors – CBC Documentary Link to video

13

Cyber Warfare Between Nations

•Estonia is one of the most wired countries on earth•78% of the people bank on-line•Within minutes hackers shut down their banks•Many believe the attacks were politically motivated from Russia

Page 14: 1 Computer Crime Web Warriors – CBC Documentary Link to video

China

14

Warfare Hacking

Recruiting Conclusion

‣The Chinese military is recruiting Hackers

‣Why?

Internet

‣They are using the internet rather than tanks

‣How can the internet be used to attack a country?

‣China is the country “we are most worried about.”

Page 15: 1 Computer Crime Web Warriors – CBC Documentary Link to video

15

Cyber Warfare Between NationsInformation warfareThe use of information technologies to corrupt or destroy an enemy’s information and industrial infrastructure Network WarfareHacker-like attacks on the nation’s network infrastructure, including the electronic banking system Structural SabatogeAttacks on information systems that support transportation, finance, energy and telecommunications 

Page 16: 1 Computer Crime Web Warriors – CBC Documentary Link to video

Hacker Video

Top Hacker Shows Us How Its Done

Pablos Holman at TEDxMidwest

http://www.youtube.com/watch?v=hqKafI7Amd8

This is a really interesting video…

Note: Depending on the age range of your students – this may or may not be appropriate. Please watch before showing this video

16

Page 17: 1 Computer Crime Web Warriors – CBC Documentary Link to video

Hacker Video

‣ Hotel Television – Control your TV or other people’s hotel room TV’s

‣ Hacker Bot – Drives around and finds Wifi user information

‣ MySpace – added javascript to add 1 million friends in 24 hours

‣ Vehicles are now PC’s

‣ Now using technology to fight Malaria by zapping mosquitos

Summary Points

17

Page 18: 1 Computer Crime Web Warriors – CBC Documentary Link to video

Code Wars Video

America’s Cyber Threat

Link to videohttp://www.cnbc.com/id/42210831

Page 19: 1 Computer Crime Web Warriors – CBC Documentary Link to video

Cyber Wars

• Cyber Security’s definition is constantly evolving/changing.

• It always relates to the protection of computers and the information stored on them.

• Since networks are constantly expanding, it’s hard to combat cyber crime.

Page 20: 1 Computer Crime Web Warriors – CBC Documentary Link to video

Cyber Wars

•McAfee is a provider of security products and services that help secure systems and networks. •Current customers of internet security include: the National Security Agency, the Department of Defence and other federal defence and law enforcement agencies.

Page 21: 1 Computer Crime Web Warriors – CBC Documentary Link to video

Cyber Wars

• The global security company, Lockheed Martin, is principally engaged in the research, design and development of advanced technology systems.

• They also provide a broad range of management, engineering, technical, scientific and information services.

Page 22: 1 Computer Crime Web Warriors – CBC Documentary Link to video

The Country of Estonia

• Estonia, a country known for its Internet connectivity, was assaulted by the first ever cyber attack against a nation in 2007.

• 99% of their Financial Transactions are done on-line.

• Government and financial services were shut down during the cyber attack.

Page 23: 1 Computer Crime Web Warriors – CBC Documentary Link to video

Questions

1. Where is Estonia? (do an internet search)2. Find some statistics about Estonia. How many

people live there? Main industry? Geographic size? Etc. (6 points)

3. Search the key words estonia cyber war in order to discover more details of what happened during the cyber attack we just discussed. (find 10 points)

Page 24: 1 Computer Crime Web Warriors – CBC Documentary Link to video

Go to www.mylookout.comClick on Features• Security and Privacy. Read and summarize with 3

bullet points.• Backup. Read and summarize with 3 bullet points.• Missing Device. Read and summarize with 3 bullet

points.• Management. Read and summarize with 3 bullet

points.

Page 25: 1 Computer Crime Web Warriors – CBC Documentary Link to video

25

How Hackers Stole $45 Million in 2 Days

1. Describe Phase 12. Describe Phase 23. Describe Phase 34. How could this have been prevented? (Outline the 3 ways)Link to articlehttp://mashable.com/2013/05/25/45-million-stolen/

Page 26: 1 Computer Crime Web Warriors – CBC Documentary Link to video

5 Biggest Computer Viruses of All Time

• What are the names of the 5 viruses?• Click on each virus and describe…

1.What was it2.How it worked3.How it spread

Link to interactive infographichttp://mashable.com/2013/11/20/5-biggest-computer-viruses-all-time/

Page 27: 1 Computer Crime Web Warriors – CBC Documentary Link to video

27

Microsoft and FBI Take Down Global Cyber Crime Ring

1. How much damage did the Botnet cause?2. Where do they think the hackers reside?3. Do they know who is responsible for creating this Botnet?4. How has the Citadel malware spread?5. Where are botnets mainly located?

Link to articlehttp://mashable.com/2013/06/06/microsoft-fbi-botnets/

Page 28: 1 Computer Crime Web Warriors – CBC Documentary Link to video

Snapsave vs. Snapsaved

‣ You own Snapsave.com. Snapsaved.com appears to have been maliciously saving the users’ login details and storing the photos and videos that were posted. How do you save the image of your company –Snapsave.com?

Link to article

http://www.theguardian.com/technology/2014/oct/12/teenagers-snapchat-images-leaked-internet

Page 29: 1 Computer Crime Web Warriors – CBC Documentary Link to video

29

Computer Crime DefinitionsLook up these definitions using the website below and/or a Google searchhttp://www.pcmag.com/encyclopedia/term/48464/open-port

1.Virus 2.Trojan Horse3.Spyware4.Logic Bomb5.Worm6.Trap Doors7.Pumping and Dumping8.Phishing9.Packet Sniffer10.Dumpster Diving11.Salami Shaving12.Data Diddling13.Encryption14.Firewall

Page 30: 1 Computer Crime Web Warriors – CBC Documentary Link to video

30

Computer Crime Definitions (14)Virus - A virus is a nasty program that resides and infects the computer. The program may be triggered at any time, where it may take over the computer, re-direct internet traffic, use your computer to flood out spam messages. The virus attaches itself to other programs and soon infects much or all of the software on a computer.

Trojan Horse - A Trojan horse looks like something helpful and then when opened it turns out it gives you instructions for a destructive task instead.It can erase data or cause irreparable damage.

Spyware - Spyware refers to a program or technique that monitors what you do on the internet. The reasoning is advertising. By knowing what you do on the internet, information obtained about you can be sold to advertisers who then target ads your way.

Page 31: 1 Computer Crime Web Warriors – CBC Documentary Link to video

31

Logic Bomb - Designed to sit harmlessly on a system until a certain event or set of circumstances cause the program to become active.

Worm - A worm is simply a virus that replicates itself, by sending out copies to other people.

Trap Doors - Security holesEmployees might destroy data or even trade company secrets to competitors using these security holes.

Pumping and DumpingCrooks use Internet stock trading sites or chat rooms to praise useless companies in which they hold stock. Once the share prices go up they take their profits and dump the stocks.

Phishing - A web page that is designed to fool you into thinking it’s something else, such as your bank’s web page. The idea is to fish for information, such as account numbers and passwords. The web page tricks you into providing that information because it looks legitimate.

Page 32: 1 Computer Crime Web Warriors – CBC Documentary Link to video

32

Packet Sniffer - A program that examines all the traffic on a section of network.

Dumpster Diving - Intruders go through an organizations trash in the hope of finding documents.

Salami Shaving – a programmer alters a program so that it subtracts a very small amount of money from each account.

Data Diddling – insiders modify data so that it’s difficult or impossible to tell that they’ve stolen funds or equipment.

Encryption – Takes the original data and scrambles it through the use of a key.

Firewall – a properly configured firewall permits an organization’s internal computer users to access the external internet, while placing severe limits on the ability of outsiders to access internal data.

Page 33: 1 Computer Crime Web Warriors – CBC Documentary Link to video

Bibliography

1. CBC documentary. Web Warriors. Youtube video. Feb 18, 2012.

2. Lee, Melissa. Code Wars. CNBC.com video.3. Larson, Eric. How Hackers Stole 45 Million. Mashable.com.

May 26, 2013. 4. Pfaffenberger, Bryan and Bill Daley. Computers in your

future. Prentice Hall. 2004.5. Franc Eschi-Bicchierai, Lorenzo. Microsoft and FBI Take

Down Global Cyber Crime Ring. Mashable.com. June 6, 2013.

Page 34: 1 Computer Crime Web Warriors – CBC Documentary Link to video

Link to storehttp://www.teacherspayteachers.com/Store/Gavin-Middleton

Page 35: 1 Computer Crime Web Warriors – CBC Documentary Link to video

Thank you for purchasing this PowerPoint• I hope that you and your students enjoyed it!• If you provide Positive Feedback and Follow Me, I will send you a Free

Lesson of your choice ($4 or less value).• E-mail me at [email protected] to receive your free

PowerPoint.

• Could you please let me know how you discovered my store in your email…

Teachers Pay Teachers Search Google Search Flyer Mailed To My School TPT Newsletter (December 2012) Other (please specify)

To view or purchase more materials here is a link to my storewww.teacherspayteachers.com/store/gavin-middleton