1 computer crime web warriors – cbc documentary link to video
TRANSCRIPT
1
Computer Crime
Web Warriors – CBC Documentary
Link to videohttp://www.youtube.com/watch?v=34cwMz3HZ8Q
Computer Crime Lesson Plan
1. Web Warriors Video (First 10 minutes)
2. Discuss Video or write Summary (Slides 3-5)
3. Continue Web Warriors Video (Skip to 15:40 mark about Mafia Boy)
4. Discuss and take notes about Mafia Boy (Slides 6-9)
5. Skip to other sections of video. Time is listed on slides (Slides 10-15)
6. Discuss or take notes about Cyber Warfare
7. Students Complete the Articles and Questions (Slides 25-28)
8. Students search for the Computer Crime Definitions (Slide 29)
9. Top Hacker Shows Us How Its Done video. Discuss with students. (Slide 16-17)
Note: There are many other ways you may wish to deliver the material in this presentation.
2
Blaster Worm
3
1-10 minutes into film
No specific target
In the past, you had to open an attachment file to receive a virus
Our most critical systems are connected to the internet through Microsoft software
Self Activating
Blaster Worm can infect your computer simply by being on-line
3 Types of Hackers
4
The internet was not set-up to be secureIt was meant to share information between computers
White HatsThe Good GuysThe IT people
Black HatsBad Guys
Crooks that try to steal your credit card
number etc. Grey HatsWork both sides of
the streetCan be bought for
hire
White Hats
BlackHats
GreyHats
Types ofHackers
5
Donnie – The Hacker
•Donnie hacked into India’s critical infrastructure•Within 5 minutes, he hacked into a major airline•DEFCON, the largest internet convention•The FBI go to DEFCON to learn about the newest hacking strategies
6
MafiaBoyThis segment of the video starts at 15:40
7
Mafiaboy•Mafiaboy’s real name is Michael Calce•He was just 15 years old when he committed computer crime•Michael took down big companies like CNN, Yahoo and eBay•He sent a Denial of Service attack against the companies
8
• The newest type of computer virus is called Storm Worm• It is always changing. Every time you disconnect you get
a different copy• China and Russia are particularly bad for creating viruses• Warfare between countries involves sending viruses to
attack banks and government offices
9
Denial of Service Attack1.Describe what happens during a denial of service attack•The hacker gains access to many large university computers•Harness that power by sending many requests to a company such as yahoo.com•The website can not handle all of those requests and it crashes
10
Russia 32-35 minutes into film•Russia - the country of hacking•The internet allowed the Russian mob to go global•At the beginning of 2007, since the start of the internet, there were 250,000 viruses•In 1 year, during 2007, it went from 250,000 viruses to 500,000 viruses
11
WoodPeckers and Storm Worm 36 minutes into film•Woodpeckers – hammer keyboards very fast, trying to eliminate viruses
•Storm Worm, newest type of virus appears •No one knows its purpose•Doesn’t destroy anything – yet•It’s always changing•Every time you download it, you get a different copy
12
Storm Worm – continued…•Turns a computer into a Zombie•The author of the virus can control your computer remotely•They harness they power of all the zombie computers together creating a Botnet
13
Cyber Warfare Between Nations
•Estonia is one of the most wired countries on earth•78% of the people bank on-line•Within minutes hackers shut down their banks•Many believe the attacks were politically motivated from Russia
China
14
Warfare Hacking
Recruiting Conclusion
‣The Chinese military is recruiting Hackers
‣Why?
Internet
‣They are using the internet rather than tanks
‣How can the internet be used to attack a country?
‣China is the country “we are most worried about.”
15
Cyber Warfare Between NationsInformation warfareThe use of information technologies to corrupt or destroy an enemy’s information and industrial infrastructure Network WarfareHacker-like attacks on the nation’s network infrastructure, including the electronic banking system Structural SabatogeAttacks on information systems that support transportation, finance, energy and telecommunications
Hacker Video
Top Hacker Shows Us How Its Done
Pablos Holman at TEDxMidwest
http://www.youtube.com/watch?v=hqKafI7Amd8
This is a really interesting video…
Note: Depending on the age range of your students – this may or may not be appropriate. Please watch before showing this video
16
Hacker Video
‣ Hotel Television – Control your TV or other people’s hotel room TV’s
‣ Hacker Bot – Drives around and finds Wifi user information
‣ MySpace – added javascript to add 1 million friends in 24 hours
‣ Vehicles are now PC’s
‣ Now using technology to fight Malaria by zapping mosquitos
Summary Points
17
Code Wars Video
America’s Cyber Threat
Link to videohttp://www.cnbc.com/id/42210831
Cyber Wars
• Cyber Security’s definition is constantly evolving/changing.
• It always relates to the protection of computers and the information stored on them.
• Since networks are constantly expanding, it’s hard to combat cyber crime.
Cyber Wars
•McAfee is a provider of security products and services that help secure systems and networks. •Current customers of internet security include: the National Security Agency, the Department of Defence and other federal defence and law enforcement agencies.
Cyber Wars
• The global security company, Lockheed Martin, is principally engaged in the research, design and development of advanced technology systems.
• They also provide a broad range of management, engineering, technical, scientific and information services.
The Country of Estonia
• Estonia, a country known for its Internet connectivity, was assaulted by the first ever cyber attack against a nation in 2007.
• 99% of their Financial Transactions are done on-line.
• Government and financial services were shut down during the cyber attack.
Questions
1. Where is Estonia? (do an internet search)2. Find some statistics about Estonia. How many
people live there? Main industry? Geographic size? Etc. (6 points)
3. Search the key words estonia cyber war in order to discover more details of what happened during the cyber attack we just discussed. (find 10 points)
Go to www.mylookout.comClick on Features• Security and Privacy. Read and summarize with 3
bullet points.• Backup. Read and summarize with 3 bullet points.• Missing Device. Read and summarize with 3 bullet
points.• Management. Read and summarize with 3 bullet
points.
25
How Hackers Stole $45 Million in 2 Days
1. Describe Phase 12. Describe Phase 23. Describe Phase 34. How could this have been prevented? (Outline the 3 ways)Link to articlehttp://mashable.com/2013/05/25/45-million-stolen/
5 Biggest Computer Viruses of All Time
• What are the names of the 5 viruses?• Click on each virus and describe…
1.What was it2.How it worked3.How it spread
Link to interactive infographichttp://mashable.com/2013/11/20/5-biggest-computer-viruses-all-time/
27
Microsoft and FBI Take Down Global Cyber Crime Ring
1. How much damage did the Botnet cause?2. Where do they think the hackers reside?3. Do they know who is responsible for creating this Botnet?4. How has the Citadel malware spread?5. Where are botnets mainly located?
Link to articlehttp://mashable.com/2013/06/06/microsoft-fbi-botnets/
Snapsave vs. Snapsaved
‣ You own Snapsave.com. Snapsaved.com appears to have been maliciously saving the users’ login details and storing the photos and videos that were posted. How do you save the image of your company –Snapsave.com?
Link to article
http://www.theguardian.com/technology/2014/oct/12/teenagers-snapchat-images-leaked-internet
29
Computer Crime DefinitionsLook up these definitions using the website below and/or a Google searchhttp://www.pcmag.com/encyclopedia/term/48464/open-port
1.Virus 2.Trojan Horse3.Spyware4.Logic Bomb5.Worm6.Trap Doors7.Pumping and Dumping8.Phishing9.Packet Sniffer10.Dumpster Diving11.Salami Shaving12.Data Diddling13.Encryption14.Firewall
30
Computer Crime Definitions (14)Virus - A virus is a nasty program that resides and infects the computer. The program may be triggered at any time, where it may take over the computer, re-direct internet traffic, use your computer to flood out spam messages. The virus attaches itself to other programs and soon infects much or all of the software on a computer.
Trojan Horse - A Trojan horse looks like something helpful and then when opened it turns out it gives you instructions for a destructive task instead.It can erase data or cause irreparable damage.
Spyware - Spyware refers to a program or technique that monitors what you do on the internet. The reasoning is advertising. By knowing what you do on the internet, information obtained about you can be sold to advertisers who then target ads your way.
31
Logic Bomb - Designed to sit harmlessly on a system until a certain event or set of circumstances cause the program to become active.
Worm - A worm is simply a virus that replicates itself, by sending out copies to other people.
Trap Doors - Security holesEmployees might destroy data or even trade company secrets to competitors using these security holes.
Pumping and DumpingCrooks use Internet stock trading sites or chat rooms to praise useless companies in which they hold stock. Once the share prices go up they take their profits and dump the stocks.
Phishing - A web page that is designed to fool you into thinking it’s something else, such as your bank’s web page. The idea is to fish for information, such as account numbers and passwords. The web page tricks you into providing that information because it looks legitimate.
32
Packet Sniffer - A program that examines all the traffic on a section of network.
Dumpster Diving - Intruders go through an organizations trash in the hope of finding documents.
Salami Shaving – a programmer alters a program so that it subtracts a very small amount of money from each account.
Data Diddling – insiders modify data so that it’s difficult or impossible to tell that they’ve stolen funds or equipment.
Encryption – Takes the original data and scrambles it through the use of a key.
Firewall – a properly configured firewall permits an organization’s internal computer users to access the external internet, while placing severe limits on the ability of outsiders to access internal data.
Bibliography
1. CBC documentary. Web Warriors. Youtube video. Feb 18, 2012.
2. Lee, Melissa. Code Wars. CNBC.com video.3. Larson, Eric. How Hackers Stole 45 Million. Mashable.com.
May 26, 2013. 4. Pfaffenberger, Bryan and Bill Daley. Computers in your
future. Prentice Hall. 2004.5. Franc Eschi-Bicchierai, Lorenzo. Microsoft and FBI Take
Down Global Cyber Crime Ring. Mashable.com. June 6, 2013.
Link to storehttp://www.teacherspayteachers.com/Store/Gavin-Middleton
Thank you for purchasing this PowerPoint• I hope that you and your students enjoyed it!• If you provide Positive Feedback and Follow Me, I will send you a Free
Lesson of your choice ($4 or less value).• E-mail me at [email protected] to receive your free
PowerPoint.
• Could you please let me know how you discovered my store in your email…
Teachers Pay Teachers Search Google Search Flyer Mailed To My School TPT Newsletter (December 2012) Other (please specify)
To view or purchase more materials here is a link to my storewww.teacherspayteachers.com/store/gavin-middleton