Why did I Choose This Experiment?I chose this experiment because there are many people that don't understand how the internet works. Therefore, they get viruses and get hacked, the purpose of this project is to educate people on internet safety. |
What is The Science Experiment?My science experiment was about getting data of of an air-gapped computer, and how even a computer that isn't connected to the internet isn't completely safe. |
What Have I Learned During This Project?Personally, doing this experiment taught me what malware even is. Before any of this I had no idea that malware was a thing. This experiment also taught me about all the different types of viruses and scams. |
How Does This project Benefit the Community?This project can inform people about the dangers of viruses and hackers on the internet, while educating them on how to stay safe for an enjoyable time on the internet. |
What is Malware?Malware, short for malicious software, is any program or code intentionally created to damage, disrupt, or exploit computers, networks, or devices. Cybercriminals use malware to steal senistive informations, spy on users, hijack system functions, or extort money from victims. It can affect personal computers, mobile devices, servers, and enterprise networks, posing risks to both individuals and organizations. |
How do computers work?Computers send information using binary code, a series of ones and zeros. Normally, whenever you download a song, view a website, or send an email, these ones and zeros are sent as electronic signals through a wire like an ethernet cable, or as electromagnetic waves through a connection like Wi-Fi or bluetooth. An air-gapped computer physically lacks the means to send signals over a wired or wireless connection. However, even without an internet connection, computers still transmit signals into the world around them. They makes noise, they blink, they vibrate, and they get hot. Light, sound, vibration, and heat are all physical quantities that we can use to send information. For example, imagine clicking a flashlight on and off to send binary code "on" for one, and "off" for zero. We can observe these physical quantities with our own senses like sight, sound, and touch; and we can also measure them with electronic sensors. Examples include:
|
Air-GappedSometimes companies and governments have extremely sensitive information or computers that control very important equipment. They do not want to risk those computers being hacked, so the computers are air-gapped, they are not physically connected to the rest of the internet through a router or modem via either a hardwired or wireless connection. These routers/modems are connected to servers, which are connected to other servers indirectly connecting millions of computers all around the world. An air-gapped computer is physically separated with no hardwired or wireless connection to the rest of the internet. It may still be part of an air-gapped network, and connected to other computers on a private network, but not the rest of the internet. |
Social EngineeringTricks people into inserting removable media into the computer. This is a way to physically transport data to the computer without an internet connection, and was used to spread the Stuxnet virus in Iran. That might be a good way on to a computer, but how do you get data off the computer? |
HackingPeople get hacked primarily due to human error, weak security practices, and hackers exploiting vulnerabilities for financial, political, or personal gain.
|
Hacker MotivationsHackers are motivated by various factors:
|
Common Methods of Hacking
|
ReferencesHere is a link to one of the websites I used to get information for this website. This is another link to a website I used. This is the final website I used for information. |
Video |