Verified Document

Computer Hacker Nefarious Notions III Term Paper

During the first acknowledged major computer bank hack, First National Citybank of Chicago loses 70 million U.S.$

Kevin Lee Poulsen, Hacker Dark Dante, is arrested after a 17-month search. He had obtained numerous military secrets.

Mitnick and Shimomura lock horns. (Hackers Chronology, 2006).

1993

The first Def Con hacking, was supposed to be a one-off-knees-up to bid good-bye to BBS's (outdated by the web), conference occurs in Las Vegas. This event became so popular it turned into an annual event.

Hackers hit U.S. federal web sites, including the CIA, Department of Justice, NASA and the Air Force. This isn't popular with U.S. officials. (Hackers Chronology, 2006).

1994

(3)

Vladimir Levin

Vladimir Levin, head of a Russian hacking ring, reportedly masterminded a $10 million virtual holdup of Citybank. He is arrested in London a year later and extradited to the U.S.A. (Hackers Chronology, 2006).

1995

US Defense Department experiences a quarter of a million hacks in one year.

Kevin Mitnick

Mitnick, arrested and suspected to have stolen approximately 20,000 credit card numbers, pleads guilty a year later. (Hackers Chronology, 2006).

(3)

Hackers, a movie, sparks more misconceptions about hackers' activities.

1998

Network Associates runs an anti-hacker advert during the Superbowl in the U.S. In it, two Soviet missile technicians blow up the world, unsure whether the orders came from Moscow or hackers.

Hackers claim to have cracked a military satellite system and threaten to sell secrets to terrorists

NIPC (National Infrastructure Protection Center) launched with multi-million dollar funding.

LOpht, hacking group tells Congress it could shut down the Internet in half an hour. Group calls for more intense security. (Hackers Chronology, 2006).

1999

1999 proves to be a massive year for Microsoft patches, due two hackers exploiting Windows 1998 vulnerabilities. Hence, mainstream anti-hacking software is born.

2000

During 2000, Denial of Service attacks cripple the net's biggest names.

(4)

Jon Johansen

Jon Johansen (Norway) co-authored DeCSS with two other programmers who remained anonymous, and published it on the Internet. This program decrypted DVD's so they could be run on a computer too. Johansen was arrested January 23 and charged with hacking onto other's computers. He created a program that enables people to watch (legally bought) DVD's on their own computers, rather than instead of a stand alone DVD player. The Motion Picture Association did not win this case as the E.U. law they banked on had not yet been implemented. Several years later in 2005, the justice department releases Johanson and he is acquitted because "European law explicitly allows reverse engineering when needed for interoperatibility." (Hackers Chronology, 2006).

II. Methods

Definitions:

Firewall breaches:

Malware:

Phishing Schemes: soliciting sensitive information, frequently for identity theft, by posing as a legitimate company or charity. (Paulson, 2006)

Ping sweeps:

"If you're able to think like a hacker, you're able to prevent some of the attacks that are happening," Aaron Cohen, argues. Cohen, founder of a new academy in a viable field of security companies dedicated to helping the government and corporations keep data safe from increasingly sophisticated attacks by cunning computer hackers. Paulson, 2006) Ralph Echemendia, Cohen's lead instructor, began initially hacking when a teenager. He first hacked ham radios and instigated "phone freaking," and then began hacking computers. Along with his current work with/for the military and Fortune 500 companies, Echemendia also heads an underground hacker meeting in Florida. In this setting, people do not reveal their names. Here, Echemendia obtains real-world information from hacker associates. At times, and he has tried to convince some of those he "works" with to try the legal side of hacking. They are amazed that some companies will actually pay people to hack them. (Paulson, 2006)

At one time in history, however, the thought of a hacker being paid by companies was not so foreign. In fact, "a 'good hack' is a clever solution to a programming problem and 'hacking' is the act of doing it," according to Eric Raymond, compiler of the New Hacker's Dictionary. Raymond, who also recognizes a hacker as a clever programmer. (SearchSecurity, 2007)

"Key-logging software often is installed on systems when an individual simply views e-mails or clicks links that look and seem like reputable sites," the March 23, 2007 article, "DOD INVESTIGATES HACKING of TROOPS' personal information." Customers have a responsibility to implement measures guard their personal information from thieves and scammers, all on and off line. (INDSTRY GROUP 91, 2007)
According to the Federal intelligence report, Defense Department officials recently "launched an investigation into recent computer hackings of service members' home computers that compromised personal information and led the redirection of funds from their military pay accounts." (INDSTRY GROUP 91, 2007)

Officials report that during an eight months period, accounts of approximately two dozen Defense Finance and Accounting Service "myPay" participants were accessed by unauthorized personnel. The compromise for the myPay program, which allows DFAS users to manage pay information, along with leave and earnings statements, as well as W-2s online, most likely ensued from personal information "stolen from home computers via spyware and keystroke-logging viruses," DFAS officials stated.

Computer security

Computer security involves the prevention and detection of unauthorized users or "intruders" from accessing any part of a computer system. Detection helps a computer owner determine whether an intruder attempted to break into his/her system, and if so whether or not they succeeded, as well as what they may have accomplished. Even though information or communications on a computer may not be "top secret," most people do not want strangers to read their e-mail, use their computer to attack other systems send forged email from their computer, or examine personal and/or business information stored on computer (particularly financial statements). (Home Network . . ., 2007)

Home internet users are less likely to be attacked in 2007 than in 2006, Lisa Lerer (2006) reports in Hackers Headed for Home. Contemporary hackers however are more likely targeting users to search for money, according to Symantec, a computer security firm. Symantec estimates computer hackers target home users 86% of the time versus 93% in 2006 because of poor security features.

"The home user is just a great deal less prepared to deal with attackers than enterprise, who's had to deal with them for quite some time," (Lerer, 2006) notes that Alfred Huger, senior director of engineering at the Symantec's security response division, stresses.

Hackers target personal home computers for personal information to use in financial crimes (e.g. identity theft) Huger points out: "We've seen some [attacks] that are sensitive to 1,200 or 1,300 different banks and credit card companies' Web sites." (Lerer, 2006). Another target lucrative target for committing fraud by hackers consists of the financial services industry.

Web browsers, such as Microsoft's Internet Explorer, constitute a popular route of attack since information comes from different sources. Hackers attack web-based applications approximately 69% of the time according to Symantec. Popular security alternatives, in 2006, contained flaws documented by Symantec as: Mozilla Firefox (17), Microsoft's Explorer (38), and Apple Safari (12). Microsoft addresses flaws and distributes repairs within 9 days of the infection; while Mozilla and Apple Safari take 1 day or less. (Lerer, 2006)

Computer hackers or intruders are also known as attackers, or crackers sometimes do not care about a person's identity but want to gain control another computer to launch attacks on other computer systems. When a person gains control of another computer this provides them with the ability to hide their actual location while they launch attacks, frequently against government or financial systems' computers. Any computer connected to the Internet may be targeted. Hackers may obtain the ability to actions on the computer and/or inflict damage to a computer by reformatting the hard drive or changing personal or business data. (Home Network . . ., 2007)

Computer hackers routinely discover new vulnerabilities or "holes" in computer software to exploit. As software becomes more and more complex, it becomes increasingly difficult to meticulously test computer systems' security. As holes are discovered, however computer vendors generally create patches to counter problem(s). It is up to the computer owner, nevertheless to secure and install needed patches, or properly configure software to perform more securely. The majority of computer break-in incident reports might have been avoided if system administrators and users had insured their computers' patches and security fixes were up-to-date. (Home Network . . ., 2007)

Additionally, a number of software applications possess default settings which allow other users to access an individual's computer unless he/she changes his/her settings to make them more secure. These applications may include chat programs which permit outsiders to execute commands on an individual's computer or web browsers that could allow someone to position harmful programs on their computer that run when they click on them. (Home Network . . ., 2007)

Unlike the majority of home computer systems, corporate and government networks are routinely protected by a number of security layers which range from network firewalls to encryption. Generally, they also usually employ support individuals who maintain the accessibility, as well as the network connections' security. (Home Network . . ., 2007)

"The Firewalls FAQ (http://www.faqs.org/faqs/firewalls-faq/) defines a firewall as 'a system or group of systems that enforces an access…

Sources used in this document:
REFERENCES

Bazzinotti, Jay. "Protect your computer from a hacking virus. (tutorial)," Telephony, May 21,

1990.

Brookins, Nick. "7 ways to prevent computer hacking." Detroiter, December 1, 2003.

Childress., Sarah. (2006). 'Hacktivists' Log on ['Hacktivists' Log on]. . (Original work published 2006) Retrieved April 17, 2007, from http://www.msnbc.msn.com Web site: http://www.msnbc.msn.com/?id/?5783835/?site/?newsweek/?
(Original work published 2007) Retrieved April 17, 2007, from http://www.internetnews.com Web site:
http://www.internetnews.com/?security/?article.php/?3665076.
http://www.theinquirer.net Web site:
http://www.theinquirer.net/?default.aspx?article=39032.
https://mypay.dfas.mil/PersonalData.htm.
Lerer, Lisa. Hackers Headed for Home. . (Original work published 2006) Retrieved April 17, 2007, from: http://www.forbes.com/technology Web site: http://www.forbes.com/?technology/?2006/?09/?25/?internet-security-virus-tech-cx_ll_0925symantec.html.
http://www.bartleby.com/66/84/35884.html.
2006.http://www.thocp.net/reference/hacking/hacking.htm.
from:http://www.cert.org/tech_tips/home_networks.html.
May 2007 from: http://www.usatoday.com/money/industries/technology/2003-02-09" target="_blank" REL="NOFOLLOW" style="text-decoration: underline !important;">http://www.usatoday.com/money/industries/technology/2003-02-09hacker_x.htm.
SearchSecurity. (2007). Hacker [definition]. Available from SearchSecurity, http://SearchSecurity. (2007).
http://searchsecurity.techtarget.com/?sDefinition/?0,,sid14_gci212220,00.html
Users.telent. (2007). How to Become a Hacker [Hacker website]. Available from Users.telnet, http://users.telenet.be/?mydotcom/?library/?index.htm
The Work "Hacker" [the Work "Hacker"]. (2004). Retrieved April 22, 2007, from http://www.paulgraham.com Web site: http://www.paulgraham.com/?gba.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Viruses: A Quantitative Analysis
Words: 2542 Length: 10 Document Type: Term Paper

This report will hopefully pull together the research available with regard to this issue, and also identify what users are most at risk for virus attacks. The research currently available also confirms that modern viruses are becoming more insidious and complex, with the potential to incur more damage to computers and data than in the past. Studies suggest that newer versions of viruses may escape detection using standard anti-viral software.

Computer Virus Is Among the Greatest Enemy
Words: 2494 Length: 9 Document Type: Term Paper

computer virus is among the greatest enemy of computer technology's globalization. In just a few split of seconds, it can turn our endeavor of automating our diverse activities into a nightmare. This is especially a catastrophe to businesses whose operation at a large percentage depends on computerized data access and retrieval. Globally, computerization is the trend among businesses. Thus, the damage that computer viruses can cause is a global

Computers and Work -- and
Words: 457 Length: 1 Document Type: Term Paper

" (Wahlgren, 2004) Telecommuting, conversely, can cause the opposite problem -- isolating employees from the input of other individuals, and also the system of rewards that comes from having a manager praise -- or critique one's performance in a personal basis, rather than through emails or online correspondence. The Internet seems to act to decrease social connections on the whole. "13% of heavy Internet users reported spending less time attending

Computer Crime Can Be Classified
Words: 1216 Length: 4 Document Type: Term Paper

Phishing is another criminal technique used to cull bank account or credit card information. Lovet (2007) describes how simple and potentially lucrative phishing can be: "the total costs for sending out 100,000 phishing emails can be as little as $60. This kind of 'phishing trip' will uncover at least 20 bank accounts of varying cash balances, giving a 'market value' of $200 - $2,000 in e-gold." Most incidents of

Computer Terrorism According to Weimann,
Words: 562 Length: 2 Document Type: Term Paper

Hacking, the apolitical counterpart of hacktivism, is also not necessarily a form of terrorism. However, cyberterrorists often use hacking as a tool of terrorism. Terrorists may be tempted to use computer attacks for several reasons including the following. First, cyberterrorism can be relatively inexpensive. Second, terrorists can easily remain anonymous when they use computer terrorism. Third, the scope of the attack can potentially be larger than physically combative ones. Fourth,

Computer Crime As It Differs
Words: 630 Length: 2 Document Type: Term Paper

These attacks result in billions of dollars in damage to the United States and other global economies. Although technology is becoming more secure, cybercrime has increased as Internet use has risen. In fact, according to the Computer Emergency Response Team (CERT) Coordination Center at Carnegie Mellon University, the number of cybersecurity incidents more than doubled to nearly 53,000 last year. In the first three months of 2002 alone, CERT counted

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now