Team Name: Amir Syazwan B. Ibrahim
Team Name: Amir Syazwan B. Ibrahim
IBRAHIM
In reference to a systems security,hacking is usually defined as the act of illegally entering ausually defined as the act of illegally entering computer system, and making unauthorized changes to the files and data contain within(Winegarden, November 2003). Hacker is a programming specialist who has the expertise to enter a computer or network without expertise to enter a computer or network without proper authorization (CyberAngels, November proper authorization,2003)
The History Hacking has been around for more than a century.In the 1870s, several teenagers were flung off the countrys brand new phone system by enraged authorities. Early 1960s - University facilities with huge mainframe computers, like MIT's artificial intelligence lab, become staging grounds for hackers. At first, "hacker" was a positive intelligence lab, become staging grounds for hackers. Early 1970s - John Draper makes a long-distance call for free into a telephone that tells the phone system to open a line. Draper discovered the whistle as a give-away in tells the phone system to open a line. Draper, who later earns the handle "Captain Crunch," is arrested repeatedly for phone tampering throughout the 1970s.
Early 1980s - Author William Gibson coins the term "cyberspace" in ascience fiction novel called Neuromancer. In one of the first arrests of hackers, the FBI busts the Milwaukee-based 414s (named after the local hackers members are accused of 60 computer break-ins ranging from Memorial Sloan-Kettering Cancer Center to Los Alamos). Comprehensive Crime Control Act gives Secret Service jurisdiction over credit card and computer fraud.Two hacker groups the Legion of Doom in the United States and the Chaos Computer Club in Germany.2600: The Hacker Quarterly is founded to share tips on phone and computer hacking. Late 1980s - At 25, veteran hacker Kevin Mitnick secretly monitors the e-mail of MCI and Digital Equipment security officials. He is convicted of damaging computers and stealing software and is sentenced to one year in prison.First National Bank of Chicago is the victim of a $70-million computer heist. An Indiana hacker known as "Fry Guy" -- so named for hacking McDonald's.
Late 1990s - Hackers break into and deface federal Web sites, including the U.S.Department of Justice, U.S. Air Force, CIA, NASA and others.Report by the GeneralAccounting Office finds Defense Department computers sustained 250,000 attacks by hackers in 1995.A Canadian hacker group called the Brotherhood, angry athackers being falsely accused of electronically stalking a Canadian family,accused break into the Canadian Broadcasting Corp. Family's own 15-year-old son eventually is identified as stalking culprit.Popular Internet search engine Yahoo! is hit by hackers claiming a "logic bomb" will go off in the PCs of Yahoo!'s users on Christmas Day 1997 unless Kevin Mitnick is released from prison.
The most important step to consider if you suspect your systems security has been compromised is to shut off all connections to the Internet. Although this temporarily detains us from the ability to trace the PC responsible for the attack, it does enable us to first protect our information,which is probably your primary concern. Many firewalls, Zonealarm for one, possess the ability of maintaining a detailed description of attempted intrusions. If your firewall does alert you to possible invasions, it probably has the capability of providing the IP address as well.
(b)Install Firewall
(c)Contact ISP
Once you have obtained the name of the Internet Service Provider(ISP), the next step is to initiate contact with them. Most ISP s have some type of acceptable use policy,and typically illegal intrusion is not contained in it s guidelines.After you have reported the incident to the specific ISP, the punishment/penalty proceedings are in their hands (Hart, November 2003).
Wikipediahttp://en.wikipedia.org/wiki/Hacker_computer _security
Blogwww.whatishacking.org TechCenterhttp://www.ehow.com/how_4503871_preventcomputer-being-hacked.html