hacking and hacktivism

29
HACKING & HACKTIVISM Muhammad Rashidi Bin Razali (2010391069) Muhamad Fadzile Bin Abd Malek (2010158019) Muhammad Haziq Bin Mazlan

Upload: rashidirazali

Post on 08-May-2015

3.034 views

Category:

Technology


1 download

DESCRIPTION

This slide will discuss about history of hacking, the purpose and effect of hacking, the steps that can be used to help prevent hacking from occurring. Also being discussed are hacktivism, or political hacking in Malaysia and solution taken and the law implemented in Malaysia.Malaysia and Solution implemented

TRANSCRIPT

Page 1: Hacking and Hacktivism

HACKING & HACKTIVISM

• Muhammad Rashidi Bin Razali (2010391069) • Muhamad Fadzile Bin Abd Malek (2010158019)• Muhammad Haziq Bin Mazlan (2010715319)

Page 2: Hacking and Hacktivism

TOPICS COVERED IN THIS PRESENTATION

• HISTORY OF HACKING

• PURPOSE OF HACKING

• EFFECT OF HACKING

• HACKTIVISM OR POLITICAL HACKING IN MALAYSIA

• SOLUTION TAKEN & THE LAW IMPLEMENTED IN MALAYSIA

• INTRODUCTION

• CONCLUSION

Page 3: Hacking and Hacktivism

HISTORY OF HACKING1960sMIT’s artificial labKen Thompson invented UNIX

1970sDennis Ritchie invented C

1980sCyber Space coined414s arrestedTwo hacker group formed

1990sNational Crackdown on hackersKevin Mitnick arrested Microsoft’s NT operating system

Page 4: Hacking and Hacktivism

World Most Famous Hacker

Stephen wozniak

Tsutomu Shimomura

Kevin Mitnick

At the time of his arrest, he was the most-wanted computer criminal in the United States.

Page 5: Hacking and Hacktivism

INTRODUCTION

• Hacker is a person who access computer system and network without authorization

• There are 3 types of hacker which is white hat, black hat and grey hat

• Hacker hierarchy is divided into there which is script kiddies, intermediate hackers and elite hackers

Page 6: Hacking and Hacktivism

PURPOSE OF HACKING

• To steal Money Important data / information

• To test their knowledge in understanding network and computer system

• To harm someone’s privacy

• To become a cyber warrior

• To espionage other people

Page 7: Hacking and Hacktivism

EFFECT OF HACKING

• Data loss

• Increasing maintenance cost

• Negative reputation

Page 8: Hacking and Hacktivism

HACKTIVISM OR POLITICAL HACKING IN MALAYSIA

• HactivismThe act of hacking, or breaking into computer system, for a political or socially motivated purpose. The

individual who performs an act of hacktivism is said to be a hacktivist.

They uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring

attention to a political or social cause.

Page 9: Hacking and Hacktivism
Page 10: Hacking and Hacktivism

Greetings, Malaysia, We have seen the censorship taken by the Malaysian government, blocking sites like The Pirate Bay, and WikiLeaks. Malaysia is one of the world’s strictest governments, even blocking out movies, and television shows. These acts of censorship are inexcusable. You are taking away a basic human right. The internet is here for freedom, without fear of government interference. Do not think that no one else notices. Your structured government has done the talking, and we hear loud and clear. Let this be an announcement to all your people. This is a sign, a warning, and an opportunity to listen to ideas above your own. In a way you are being stubborn. But how will this help anyone or your country. We fear that if you make further decisions to take away human freedom. We are obligated to act fast and have no mercy. For rules were meant to be broken. And corruption was meant to be washed away and forgiven. Now we will wash your corruption away so be prepared. Take this as a favor.

We are Anonymous.

THEIR MESSAGE

Page 11: Hacking and Hacktivism

• This happen when Harimau Malaya won against Garuda Indonesia in AFF Suzuki Cup 2010.

• Attacked launched by angry Indonesian Hackers because they could not accept their team defeated.

Indonesia attacked Malaysia

Page 12: Hacking and Hacktivism

UiTM Website Hacked!

Page 13: Hacking and Hacktivism

• This is a message the hacker leave at the website.

“You never learn…You never learn…You never learn…I email you remember? And I notice you have changed, most of the password after that. (And thanks to unknown Wifi owner, borrow your line for a while ya!)”

THEIR MESSAGE

Page 14: Hacking and Hacktivism

• SabahTourism.com – Hacked + leaked• Tour Malaysia (Not Tourism Malaysia) – Hacked• Tourism Malaysia – Unaffected• UiTM Penang – Hacked• JBiotech – Hacked• Social Welfare Department (Ezi2Care) – Hacked• CIDB – Hacked but back up 12:20am• Land Public Transport Commision – Hacked but back up 12:15am• 1Malaysia – DoS / Switched off 3:45am• Malaysian Communications and Multimedia Commission –Unaffected• ASEANConnect – DoS / Switched off

Malaysian Meteorological Service – DoS / Switched off

List of website hacked by Indonesia hackers

Page 15: Hacking and Hacktivism

• Ministry of Education – DoS / Switched off• Suruhanjaya Pilihanraya Malaysia – DoS / Switched off• Bomba - DoS / Switched off• TMNet – Unaffected• Perbendaharaan Malaysia - DoS / Switched off• Kementerian Kerja Raya Malaysia - DoS / Switched off• Parlimen Malaysia – DoS / Switched off• Malaysian Treasury – DoS / Switched off• University Kebangsaan Malaysia – DoS / Switched off• Jobs Malaysia – DoS / Switched off• Information, Communications and Culture – DoS / Switched off• Human Resouce Ministry – DoS / Switched off 3:59am• National Sports Council – DoS / Switched off• Polis Diraja Malaysia (PDRM) – DoS / Switched off

List of website hacked by Indonesia hackers (cont)

Page 16: Hacking and Hacktivism

Myanmar attacked Malaysia

Page 17: Hacking and Hacktivism

This issues was find at blog. The url is http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/

Why Myanmar attacked Malaysia :• 17 Ogos 2012, based on sermons, the people of Myanmar now in serious

condition.• They were brutally murdered. Actually, this was already old things. • However, its not be noted from "world".• We as a neighbor of the Myanmar do not give attention to them but still

focus on Palestin, Afghanistan and Arab.

Maybe their intention is to alert us to give attention to them but, the way they do is not Halal.

Myanmar attacked Malaysia (cont)

Page 18: Hacking and Hacktivism

Political Hacking in Malaysia

Page 19: Hacking and Hacktivism

KUALA LUMPUR, Aug 18 —Datuk Seri Anwar Ibrahim’s blog was hacked late last night and defaced with a fake post that portrayed him as an apologist for the Zionist regime in Israel.

It also included an apology to Prime Minister Datuk Seri Najib Razak as part of the opposition leader’s message ahead of the Aidilfitri celebration tomorrow.

“We understand a screen capture of the posting had been successfully recorded and is now being spread by Umno cybertroopers with the intention to discredit and defame Dato’ Seri Anwar Ibrahim,” the blog administrator said.Malay daily Sinar Harian reported that the hackers had uploaded a message from Anwar, claiming he felt ashamed for his party’s “sinful extremist position chasing after the prime minister’s office to the extent of defaming Najib and the latter’s family”.

Political Hacking in Malaysia (cont)

Page 20: Hacking and Hacktivism

Cyber law in Malaysia

Some of the cyber law in Malaysia:• Digital Signature Act 1997• Computer Crimes Act 1997• Copyright (Amendment) Act 1997• Communication and Multimedia Act 1998

Page 21: Hacking and Hacktivism

Digital Signature Act 1997

• Enforced on October 1998• Secures electronic communications especially

on the Internet• Digital Signature is an identity verification

standard using encryption techniques to protect against e-mail forgery.

• The encrypted code consists of the user’s name and a hash of all the parts of the message.

Page 22: Hacking and Hacktivism

• By attaching the digital signature, one can ensure that nobody can eavesdrop, intercept or temper with the transmitted data.

• By doing so, a more secure and safe electronic communication could be done.

Page 23: Hacking and Hacktivism

Computer Crimes Act 1997

• Protection against the misuses of computers and computer criminal activities are ensured by the Act.

• Example of crimes:– Unauthorized use of programs– Illegal transmission of data or messages over computers– Hacking or cracking of computer systems and networks.

• Computer crimes are banned by this law. Those who disobey this law can be charged.

Page 24: Hacking and Hacktivism

• By implementing the Computer Crimes Act 1997, computer users can now protect their rights to privacy and build trust in the computer system.

• This Act also enable the government to track the illegal activities, thus reducing the cyber crimes cases.

Page 25: Hacking and Hacktivism

Copyright (Amendment) Act 1997

• Brought into force on April 1999.• The Copyright (Amendment) Act amends the

Copyright Act 1987 to extend copyright law to the new and converged multimedia environment.

• It serves to protect the expression of thought and creative ideas from unauthorized copying or alteration.

Page 26: Hacking and Hacktivism

Communication and Multimedia Act 1998

• Endorsed in April 1999.• The Communication and Multimedia Act 1998

creates a new system of licenses and defines the roles and responsibilities of those providing communication and multimedia services.

• The implementation of Communication and Multimedia Act 1998 ensures that information is secure, the network is safe, reliable and the service is affordable all over Malaysia.

Page 27: Hacking and Hacktivism

• In Malaysia, you can use this Act for any cases regarding your internet service provider and see whether they got accuses of part of this law.

• This Act also ensures high level of user’s confidence in the information and communication technology industry.

Page 28: Hacking and Hacktivism

CONCLUSION

• Hacking is a good computing skill that can be used for good or bad intention.

• There is reason to do the hack, and there are ways to prevent it.

Page 29: Hacking and Hacktivism

Q/A

Thank you