HUM 142
|
Welcome to my Internet Communications Web Page, Please take the time and view my research paper.Michelle
DiTerlizzi Hackers and the InternetInternet CommunicationsProfessor
Booth Due: June 30, 2003
Computer criminals can range from petty theft to state-sponsored terrorism. Crimes involve credit card fraud, where some
credit card numbers have been sold in a
Frontline asked Mr. Power about different cases that have taken place around the
world and at different times. He came up
with The Aum Shinri Kyo incident, which involved hacking into Japanese corporations and
other units around The Citibank case concerned Russians cracking
codes and stealing money from Citibank. They
got away with stealing over 10 million dollars before getting caught and convicted. This is a good warning to many people who are
involved with online banking, because even though some have an ID and password, your
account is extremely vulnerable. This is a
key reason why this case is discrete, because banks do not want to discourage online use. Richard gives the audience advice in making
cyberspace a safer place. He state, I
think it will have to do with tort law, civil liability, and exposure (Frontline 4).
Count Zero, member of the Cult of the Dead Crow (a hacker organization), shares his
thoughts on the Internet. Count says that the
Internet is not a library
its a mirror of society. This is the reason Y2K was such a big deal, some
thought it was hype but it would have been a real tragedy if something serious were to
happen (Frontline 11).
Jeremy Quittner, author of Hacker Psych 101, writes a short discovery page on
hackers. He spoke with Marc Rogers,
researcher and former cyber detective also Jerold M. Post, a psychiatrist at George
Washington University. Both Rogers and Post
agree that hackers seem to think that their behavior is rational in a service to society. Some even blame the victims they attack, evolving
an ethical flexibility. Also because hacking
is performed over the Internet it may be treated as a game and serious consequences could
be ignore (Quittner 1).
Rogers defines different sorts of hackers and says that not all hackers are
criminals. He puts them into four categories: old school hackers, script kiddies or cyber-
Post admits that these people gain a sense of power.
He states, Its a population that takes refuge in computers because of
their problems sustaining real world relationships. Causing
millions of dollars of damage is a real power trip (Quittner 1).
On a CNN special David Mandeville write his story on Hackers, Crackers, and
Trojan Horses: A Primer. Mr. Mandeville writes, The term
hacker usually brings to mind three of these people who break the security of
networks, people who break into application software, and people who create malicious
programs like viruses. These are not
mutually exclusive, but its a simple way to divide the activities that fall under
hacking (Mandeville 1).
Network hackers engage in many activities that involve attacks on a Web server and
mail bombs. A mail bomb targets a
victims mail server and floods it with junk requests.
Another form of Network hacking involves penetrating a secure area by
subverting its security measures. Mandeville
says that a way of doing this is repeatedly entering passwords until the right one fits. Once they get in, the information is either
encrypted or unencrypted and no matter what, the hackers will find a way into the system
and change information. However for these
network hackers its more a test of skill than an attempt to steal or alter
data (Mandeville 2).
Software crackers are classified as software crackers who develop their own
software that can circumnavigate or falsify the security measures that keep the
application from being replicated on a PC. Crackers
are hackers who break into security software and also they have something in common with
network hackers, in that they try to guess codes until one is correct and they are in. Finding and altering security measures are things
that these software hackers can perform easily (Mandeville 2).
Virus builders are types of hackers that can be malicious, however some are not. Viruses, worms, Trojan horses, and logic
bombs are all forms of programs that can invade a system.
Viruses are tricky and sneaky at the same time.
Some are simple and easy to receive and some can even destroy an entire system. Mandeville explains the other types of builders
extremely well, Worms invade computer and steal its resources to replicate
themselves. They use networks to spread
themselves. A Trojan horse appears to do one
thing but does something else. The system
may accept it as one thing, but upon execution it may release a virus, worm or logic bomb. A logic bomb is an attack triggered by an event,
like the computer clock
The next topic of discussion that CNN focuses on is No Defense. Anyone
connected to the Internet is really not safe from hackers.
However no one has ever been seriously hurt in these actions and our only defense
seems to be security matters. However
hackers see securities systems as a challenge not an obstacle. In other words hackers like a challenge and if
security measures are being taken place they are going to accept that challenge with great
pleasure (Mandeville 3).
In Internet Security News (ISN) Kim Zetter writes, Sleeping with the
Enemy. Many major companies see hackers
as a serious threat. Which is the main
reason these companies go out and search for an honest experienced hacker who they can pay
to break into their systems. That way the
hackers can tell the company how it happened, where the holes are in the information and
how to fix it so that malicious hackers do not steal or alter data. Fourteen percent of organizations in the United
States said that they were going to hire hackers for their defense, while 43 percent will
be doing so in Australia. Perhaps,
Zetter writes, it all depends on who you are calling a hacker.
In conclusion, hackers are classified as many types of people. White hackers and black hackers or good vs. bad is
a way to think of them also. The Internet is
not a safe place and it is not secure, you are vulnerable to anyone and these are facts
individuals using the Internet need to be aware of. Hackers
will always be a part of the Internet its whether or not government will take action
against these matters seriously or not. Some
advice for future Internet users whether in a business or for individual use, be prepared
and ready for anything because one may never know who is watching. Works Cited The
dangers confronting computer users, corporations and government. Frontline. 2001 <www.pbs.org/wgbh/pages/frontline/shows/hackers/risks/dangers>. Mandeville, David. Hackers,
Crackers, and Trojan Horses: A Primer. CNN-In Depth
Special. 29 March 1999. <http://www.cnn.com/TECH/specials/hackers/primer/>. Quittner,
Jeremy. Hacker Psych 101. TLC Life Unscripted. 2003. <http://tlc.discovery.com/convergence/hackers/articles/psych_print.html>. Zetter,
Kim. [ISN] Sleeping with the Enemy. 13 Aug 2002. <http://www.landfield.com/isn/mail-archive/2002/Aug0038.html>.
|