Articles liés à Hacking for Kids: An Ethical Approach to Cyber Attacks...

Hacking for Kids: An Ethical Approach to Cyber Attacks and Defense - Couverture souple

 
9781718500006: Hacking for Kids: An Ethical Approach to Cyber Attacks and Defense

L'édition de cet ISBN n'est malheureusement plus disponible.

Synopsis

Hacking for Kids is a practical, hands-on guide to the art of ethical hacking and cyber defense.

As soon as you touch a screen or keyboard, you become a target for cybercrime. This book will explain how these attacks happen, how to protect yourself from them - and how to think like a hacker. By performing common hacks safely in a virtual lab that you'll create, and using the tools and techniques attackers use, you'll better understand the online threats you need to defend against.

Hacking for Kids is a practical, hands-on introduction to every major cyber attack method, from viruses, phishing and mobile hacking, to (web)camfecting, malware and password cracking. Once you know how easy most of these hacks are to execute, you'll know exactly how to spot them and stop them. Each chapter walks you through a different type of attack, explains how to simulate it in the lab, and gives you simple but effective tips for strengthening your cyber defenses.

You'll learn:
    How to responsibly use attack tools to find security weaknesses before the bad guys do
    How to hack into Android phones, Google accounts, IoT devices - even your family car
    How social-engineering scams (the art of human hacking) work, and self-defense on social media
    How criminals gain access to PCs and computer files without a username or password

Hacking for Kids will transform you from a potential cyber-victim into cyber-hero. It will give you the tools and know-how to stay safe online - and keep you a step ahead of cybercriminals.

Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.

À propos de l?auteur

Dr. Bryson Payne is an award-winning cyber coach, author, TEDx speaker, and the founding Director of the Center for Cyber Operations Education at the University of North Georgia. A tenured professor of computer science at UNG, he coached the cyber ops team that won first place at the 2019 NSA Codebreaker Challenge. Dr. Payne is a Certified Ethical Hacker (CEH), and holds elite cybersecurity certifications in CISSP, GIAC, GPEN, GRID, and GREM. He also enjoys working with K-12 schools worldwide to promote CS education, and lives in Atlanta with his wife Bev and their two sons.

Extrait. © Reproduit sur autorisation. Tous droits réservés.

INTRODUCTION

Hacking
is doing something new or unexpected with a tool that already exists. Think of “life hacks” like using dental floss to cleanly cut a slice of cake or reusing an empty breath mint container to store paper clips. For as long as humans have been on this planet, we’ve been coming up with new tools and new uses for the things we find around us. 

Computer hacking is similar. We do new and unexpected things with computer technology all the time. We can hack two programs that weren’t meant to work together by writing a simple app that translates files from one program’s format to the other’s. We can hack a web browser or spreadsheet program to play a game. Or, if you’re not careful, someone can hack your computer by emailing you a virus that gives them access to your files, your passwords, or even your webcam. 

Computer Hacking Basics 

In this book, you’ll learn how to defend yourself and others from cyberattacks by performing hacks safely in a virtual lab that you’ll create. By using the same tools and techniques that hackers use, you’ll understand the kinds of online threats you need to defend against. Computer hacking is like a martial art—you’ll learn not only how to punch and kick but also how to block punches and kicks. 

Hackers come in many forms, but because the word hacker has been misused so much, we’ll refer to ourselves as ethical hackers in this book—to make it clear that we’ll be using our hacking skills only for ethical, legal purposes. I’ll use the term attacker when referring to someone who uses hacking techniques illegally or unethically. 

What Is Ethical Hacking? 

Ethics are the morals that guide our behavior. They determine whether our actions are right or wrong. 

Ethical hacking is using an attacker’s tools and techniques to test a computer system for weaknesses, with the full permission of the system’s owner. The goal of an ethical hacker is to find opportunities to improve the system’s security. Removing and addressing weaknesses to make a system less vulnerable to attack is known as hardening the system. 

An ethical hacker is also called a white hat hacker, named after the good guys in old American TV westerns, who usually wore white hats (like the Lone Ranger). A black hat hacker is someone who uses cyberattacks unethically, whether for financial gain, vandalism, or other self-serving reasons. 

To make this clearer, let’s look at an example.
 
Examples of Ethical and Unethical Hacking 

Let’s say you find a key on the sidewalk. Simply finding the key isn’t unethical. In fact, if you walked up to the nearest home, knocked, and asked the homeowner if the key was theirs, that would be completely ethical. A white hat would ask if the homeowner had accidentally dropped the key. 

On the other hand, if you pick up the key and start trying it in doors up and down the street, you’re acting like a black hat, because you don’t have the owner’s permission to use the key or enter their home. 

As you go through this book, you’ll discover lots of “keys” out in the open, like the username and password to a security camera at a local grocery store. Simply finding the default username and password in an online manual isn’t unethical. Telling the store manager that the security camera is accessible online isn’t unethical. But if you use the username and password to view video from the camera, that’s unethical, because you don’t have authorization (or permission) from the store manager. Accessing someone else’s computer or device without their permission is unethical and usually illegal, just as going into someone’s house without permission is trespassing, even if they leave the door open or drop the key on the sidewalk. 

Keep in mind that people will use your actions to judge whether your behavior is ethical. Hack like a white hat hacker and use the skills you learn in this book for good, not evil. 

How This Book Is Organized 

Every chapter in this book shows you both how to attack and how to defend against attacks. And every chapter builds your skill level as an ethical hacker. 

The first two chapters contain hacks you can perform hands-on, right away, without any tools other than a computer and web browser. In Chapter 1, you’ll begin by hacking a saved web browser password. Attackers are after your passwords because if they can steal your login information, they can steal personal data or money from your accounts. In Chapter 2, you’ll learn how hackers use simple tools like search engines to gather information about a person or company they’re protecting or attacking. You’ll also learn how to protect yourself from internet predators who use social media to spy on potential victims. 

In Chapter 3, you’ll find out how to safely hack into an old Windows laptop or computer to recover files you thought were lost. 

In Chapters 4 and 5, you’ll build a safe, virtual hacking lab environment on your own computer. This will let you practice the advanced hacks you’ll learn in later chapters without putting your computer—or yourself—in harm’s way. 

In Chapter 6, you’ll learn firsthand how attackers trick you into giving up your username and password as you build your own phishing email and spoofed website. 
In Chapter 7, you’ll find out how hackers access internet-enabled devices in your home and even hack a (simulated) car! 

In Chapters 8 and 9, you’ll see how attackers use virus-infected files to take over computers remotely across the internet. You’ll create an actual virus and hack a Windows computer in your safe, virtual hacking lab. 

In Chapters 10 and 11, you’ll see how black hat hackers can steal dozens of passwords from every user on a Windows computer, and you’ll learn how to make your own passwords safer. 

In Chapter 12, you’ll discover how to attack and defend web applications, which can reveal information about thousands or millions of users if maliciously hacked. 

In Chapters 13 and 14, you’ll see how a black hat hacker can take control of your smartphone by creating a mobile app to steal your private information, including text messages and photos. 

Finally, in Chapter 15, we’ll wrap up with 10 things you can do right now to protect yourself online, summarizing the most important tricks and tips from throughout the book. A few simple self-defense steps can prevent most online attacks from succeeding. 

Basics of Cyber Self-Defense 

As you explore the hacks in the chapters ahead, you’ll learn more about the core behaviors white hat hackers use to protect computer systems. Good cyber self-defense starts with understanding the dangers from cyberpredators and online attackers. The next step is learning how to avoid being an easy target. With more practice, you’ll be able to protect yourself and others from even highly sophisticated real-world attacks. 

You can go from potential cybervictim to cyberhero just by making a few key changes in the way you use your computer and other devices. Let’s get started!

Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.

(Aucun exemplaire disponible)

Chercher:



Créez une demande

Vous ne trouvez pas le livre que vous recherchez ? Nous allons poursuivre vos recherches. Si l'un de nos libraires l'ajoute aux offres sur AbeBooks, nous vous le ferons savoir !

Créez une demande