SlideShare a Scribd company logo
COMPUTER CRIME
   - HACKING
  A Gift of Fire
          Third edition
  Sara Baase - P.282 to P.306
HACKING

•   Hacking – currently defined as to gain illegal or unauthorized access to a file,
    computer, or network

•   The term has changed over time

•   Phase 1: early 1960s to 1970s

    •   It was a positive term

    •   A "hacker" was a creative programmer who wrote elegant or clever code

    •   A "hack" was an especially clever piece of code
HACKING (CONT.)
• Phase     2: 1970s to mid 1990s
  • Hacking     took on negative connotations
  • Breaking into computers for which the hacker does not
    have authorized access
  • Still   primarily individuals
  • Includesthe spreading of computer worms and viruses
    and ‘phone phreaking’
  • Companies       began using hackers to analyze and improve
    security
HACKING (CONT.)
• Phase   3: beginning with the mid 1990s

  • The
      growth of the Web changed hacking; viruses and
   worms could be spread rapidly

  • Political   hacking (Hacktivism) surfaced

  • Denial-of-service    (DoS) attacks used to shut down Web
   sites

  • Large   scale theft of personal and financial information
HACKING (CONT.)
Hacktivism, or Political Hacking:
• Use   of hacking to promote a political cause
• Disagreement about whether it is a form of civil
 disobedience and how (whether) it should be punished
• Some use the appearance of hacktivism to hide other
 criminal activities
• How  do you determine whether something is hacktivism
 or simple vandalism?
HACKING (CONT.)

The Law: Catching and Punishing Hackers:

•   1986 Congress passed the Computer Fraud and Abuse Act (CFAA)

    •   Covers government computers, financial and medical systems, and
        activities that involve computers in more than one state, including
        computers connected to the Internet

    •   The USA Patriot Act expanded the definition of loss to include the
        cost of responding to an attack, assessing damage and restoring
        systems
HACKING (CONT.)

The Law: Catching and Punishing Hackers (cont.):

•   A variety of methods for catching hackers

    •   Law enforcement agents read hacker newsletters and participate in chat rooms
        undercover

    •   They can often track a handle by looking through newsgroup archives

    •   Security professionals set up ‘honey pots’ which are Web sites that attract hackers, to
        record and study

    •   Computer forensics is used to retrieve evidence from computers
HACKING (CONT.)

The Law: Catching and Punishing Hackers (cont.):

•   Penalties for young hackers

    •   Many young hackers have matured and gone on to productive and responsible careers

    •   Temptation to over or under punish

    •   Sentencing depends on intent and damage done

    •   Most young hackers receive probation, community service, and/or fines

    •   Not until 2000 did a young hacker receive time in juvenile detention
HACKING (CONT.)
The Law: Catching and Punishing Hackers (cont.):

•   Security
    •   Internet started with open access as a means of sharing
        information for research

    •   Attitudes about security were slow to catch up with the risks
    •   Firewalls are used to monitor and filter out communication from
        untrusted sites or that fit a profile of suspicious activity
    •   Security is often playing catch-up to hackers as new vulnerabilities
        are discovered and exploited
HACKING (CONT.)

The Law: Catching and Punishing Hackers (cont.):

•   Responsibility for Security

    •   Developers have a responsibility to develop with security as a goal

    •   Businesses have a responsibility to use security tools and monitor
        their systems to prevent attacks from succeeding

    •   Home users have a responsibility to ask questions and educate
        themselves on the tools to maintain security (personal firewalls,
        anti-virus and anti-spyware)
HACKING
          DISCUSSION QUESTIONS



• Ishacking that does no direct damage or theft a victimless
  crime?

• Do you think hiring former hackers to enhance security is a
  good idea or a bad idea? Why?

More Related Content

What's hot (18)

Hacking
HackingHacking
Hacking
Sharique Masood
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
dineshgarhwal77
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Akshay Kale
 
Hacking
HackingHacking
Hacking
pranav patade
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
Lakkireddy Bali Reddy Collage of Engineering
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
Jayaseelan Vejayon
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2
Mian Khayyam
 
HACKING
HACKINGHACKING
HACKING
D's Surti
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Zahid Rajeel
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Sanu Subham
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
Arjun Tomar
 
Hacking
HackingHacking
Hacking
Ranjan Som
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
sumit dimri
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
SHERALI445
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Qazi Anwar
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Damisetty Bala Naga Rama Sesha Sai
 
Introduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinIntroduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam hussein
Eslam Hussein
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Akshay Kale
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
Jayaseelan Vejayon
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2
Mian Khayyam
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Zahid Rajeel
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
Arjun Tomar
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
sumit dimri
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
SHERALI445
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Qazi Anwar
 
Introduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinIntroduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam hussein
Eslam Hussein
 

Viewers also liked (20)

Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji
 
Virus and hacker (2)mmm
Virus and hacker (2)mmmVirus and hacker (2)mmm
Virus and hacker (2)mmm
andynova
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1
Jinalkakadiya
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Aryan Saxena
 
Web defacement
Web defacementWeb defacement
Web defacement
student
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
Farwa Ansari
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
Mayur Sutariya
 
Advantages & disadvantages of system life cycles
Advantages & disadvantages of system life cyclesAdvantages & disadvantages of system life cycles
Advantages & disadvantages of system life cycles
hout300
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hacker
yanizaki
 
The effects of social networks on personal relationships
The effects of social networks on personal relationshipsThe effects of social networks on personal relationships
The effects of social networks on personal relationships
robindedmondthompson
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
Shishupal Nagar
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
poonam.rwalia
 
role of media in society
role of media in societyrole of media in society
role of media in society
Anamika Pandey
 
Types of databases
Types of databasesTypes of databases
Types of databases
PAQUIAAIZEL
 
Effects of social media on Youth
Effects of social media on YouthEffects of social media on Youth
Effects of social media on Youth
Subham Dwivedi
 
The impact of social media
The impact of social mediaThe impact of social media
The impact of social media
ememdesign
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Neel Kamal
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
jeshin jose
 
Effects of social media on youth
Effects of social media on youthEffects of social media on youth
Effects of social media on youth
Akshay Mistri
 
Influence of media on society ppt
Influence  of media  on  society pptInfluence  of media  on  society ppt
Influence of media on society ppt
sharmi88
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji
 
Virus and hacker (2)mmm
Virus and hacker (2)mmmVirus and hacker (2)mmm
Virus and hacker (2)mmm
andynova
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1
Jinalkakadiya
 
Web defacement
Web defacementWeb defacement
Web defacement
student
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
Farwa Ansari
 
Advantages & disadvantages of system life cycles
Advantages & disadvantages of system life cyclesAdvantages & disadvantages of system life cycles
Advantages & disadvantages of system life cycles
hout300
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hacker
yanizaki
 
The effects of social networks on personal relationships
The effects of social networks on personal relationshipsThe effects of social networks on personal relationships
The effects of social networks on personal relationships
robindedmondthompson
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
Shishupal Nagar
 
role of media in society
role of media in societyrole of media in society
role of media in society
Anamika Pandey
 
Types of databases
Types of databasesTypes of databases
Types of databases
PAQUIAAIZEL
 
Effects of social media on Youth
Effects of social media on YouthEffects of social media on Youth
Effects of social media on Youth
Subham Dwivedi
 
The impact of social media
The impact of social mediaThe impact of social media
The impact of social media
ememdesign
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Neel Kamal
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
jeshin jose
 
Effects of social media on youth
Effects of social media on youthEffects of social media on youth
Effects of social media on youth
Akshay Mistri
 
Influence of media on society ppt
Influence  of media  on  society pptInfluence  of media  on  society ppt
Influence of media on society ppt
sharmi88
 

Similar to Computer crime hacking (20)

Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
Irvin Costa
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
RAKESH SHARMA
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Suryansh Srivastava
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Rishab garg
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
rishirvk1995
 
Hacking
HackingHacking
Hacking
Farkhanda Kiran
 
Hacking
Hacking Hacking
Hacking
Farkhanda Kiran
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Tharindu Kalubowila
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
Deepu Näñí
 
Cybercrime
CybercrimeCybercrime
Cybercrime
SERCOD
 
Module 1 Introduction to cryptography...
Module 1 Introduction to cryptography...Module 1 Introduction to cryptography...
Module 1 Introduction to cryptography...
22ss02it069
 
Hacking
HackingHacking
Hacking
VipinYadav257
 
Hacking
HackingHacking
Hacking
Purohit Rock
 
Cyber Security PPT and how to be aware from hackers
Cyber Security PPT and how to be aware from hackersCyber Security PPT and how to be aware from hackers
Cyber Security PPT and how to be aware from hackers
3aitestdata
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
ankit sarode
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Muhammad Zeeshan Muzaffar
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Goutham Shetty
 
Hacking
Hacking Hacking
Hacking
thajmohammed
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
srinivasgosula
 
Cyber security.pptxelectronic systems, networks, and data from malicious
Cyber security.pptxelectronic systems, networks, and data from maliciousCyber security.pptxelectronic systems, networks, and data from malicious
Cyber security.pptxelectronic systems, networks, and data from malicious
BhimNathTiwari1
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
RAKESH SHARMA
 
Cybercrime
CybercrimeCybercrime
Cybercrime
SERCOD
 
Module 1 Introduction to cryptography...
Module 1 Introduction to cryptography...Module 1 Introduction to cryptography...
Module 1 Introduction to cryptography...
22ss02it069
 
Cyber Security PPT and how to be aware from hackers
Cyber Security PPT and how to be aware from hackersCyber Security PPT and how to be aware from hackers
Cyber Security PPT and how to be aware from hackers
3aitestdata
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
ankit sarode
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
srinivasgosula
 
Cyber security.pptxelectronic systems, networks, and data from malicious
Cyber security.pptxelectronic systems, networks, and data from maliciousCyber security.pptxelectronic systems, networks, and data from malicious
Cyber security.pptxelectronic systems, networks, and data from malicious
BhimNathTiwari1
 

More from tangytangling (7)

Power point presentations
Power point presentationsPower point presentations
Power point presentations
tangytangling
 
Impact of broadcast media
Impact of broadcast mediaImpact of broadcast media
Impact of broadcast media
tangytangling
 
E voting and lobbying with the aid of technology
E voting and lobbying with the aid of technologyE voting and lobbying with the aid of technology
E voting and lobbying with the aid of technology
tangytangling
 
Ecological pyramids
Ecological pyramidsEcological pyramids
Ecological pyramids
tangytangling
 
Computer modelling and simulations
Computer modelling and simulationsComputer modelling and simulations
Computer modelling and simulations
tangytangling
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
tangytangling
 
Netiquette
NetiquetteNetiquette
Netiquette
tangytangling
 
Power point presentations
Power point presentationsPower point presentations
Power point presentations
tangytangling
 
Impact of broadcast media
Impact of broadcast mediaImpact of broadcast media
Impact of broadcast media
tangytangling
 
E voting and lobbying with the aid of technology
E voting and lobbying with the aid of technologyE voting and lobbying with the aid of technology
E voting and lobbying with the aid of technology
tangytangling
 
Computer modelling and simulations
Computer modelling and simulationsComputer modelling and simulations
Computer modelling and simulations
tangytangling
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
tangytangling
 

Computer crime hacking

  • 1. COMPUTER CRIME - HACKING A Gift of Fire Third edition Sara Baase - P.282 to P.306
  • 2. HACKING • Hacking – currently defined as to gain illegal or unauthorized access to a file, computer, or network • The term has changed over time • Phase 1: early 1960s to 1970s • It was a positive term • A "hacker" was a creative programmer who wrote elegant or clever code • A "hack" was an especially clever piece of code
  • 3. HACKING (CONT.) • Phase 2: 1970s to mid 1990s • Hacking took on negative connotations • Breaking into computers for which the hacker does not have authorized access • Still primarily individuals • Includesthe spreading of computer worms and viruses and ‘phone phreaking’ • Companies began using hackers to analyze and improve security
  • 4. HACKING (CONT.) • Phase 3: beginning with the mid 1990s • The growth of the Web changed hacking; viruses and worms could be spread rapidly • Political hacking (Hacktivism) surfaced • Denial-of-service (DoS) attacks used to shut down Web sites • Large scale theft of personal and financial information
  • 5. HACKING (CONT.) Hacktivism, or Political Hacking: • Use of hacking to promote a political cause • Disagreement about whether it is a form of civil disobedience and how (whether) it should be punished • Some use the appearance of hacktivism to hide other criminal activities • How do you determine whether something is hacktivism or simple vandalism?
  • 6. HACKING (CONT.) The Law: Catching and Punishing Hackers: • 1986 Congress passed the Computer Fraud and Abuse Act (CFAA) • Covers government computers, financial and medical systems, and activities that involve computers in more than one state, including computers connected to the Internet • The USA Patriot Act expanded the definition of loss to include the cost of responding to an attack, assessing damage and restoring systems
  • 7. HACKING (CONT.) The Law: Catching and Punishing Hackers (cont.): • A variety of methods for catching hackers • Law enforcement agents read hacker newsletters and participate in chat rooms undercover • They can often track a handle by looking through newsgroup archives • Security professionals set up ‘honey pots’ which are Web sites that attract hackers, to record and study • Computer forensics is used to retrieve evidence from computers
  • 8. HACKING (CONT.) The Law: Catching and Punishing Hackers (cont.): • Penalties for young hackers • Many young hackers have matured and gone on to productive and responsible careers • Temptation to over or under punish • Sentencing depends on intent and damage done • Most young hackers receive probation, community service, and/or fines • Not until 2000 did a young hacker receive time in juvenile detention
  • 9. HACKING (CONT.) The Law: Catching and Punishing Hackers (cont.): • Security • Internet started with open access as a means of sharing information for research • Attitudes about security were slow to catch up with the risks • Firewalls are used to monitor and filter out communication from untrusted sites or that fit a profile of suspicious activity • Security is often playing catch-up to hackers as new vulnerabilities are discovered and exploited
  • 10. HACKING (CONT.) The Law: Catching and Punishing Hackers (cont.): • Responsibility for Security • Developers have a responsibility to develop with security as a goal • Businesses have a responsibility to use security tools and monitor their systems to prevent attacks from succeeding • Home users have a responsibility to ask questions and educate themselves on the tools to maintain security (personal firewalls, anti-virus and anti-spyware)
  • 11. HACKING DISCUSSION QUESTIONS • Ishacking that does no direct damage or theft a victimless crime? • Do you think hiring former hackers to enhance security is a good idea or a bad idea? Why?

Editor's Notes

  • #2: \n
  • #3: Hacking was more of an exploratory activity, pioneering computer science through learning to do new things. \n\n“exploring the details of programmable systems and how to stretch their capabilities.” New Hackers Disctionary\n\nHelped with the development of computer systems in learning to do new things with computers. “The only limits are those that we set ourselves”\n
  • #4: The definition took a new twist owing to hackers beginning to test authority, manipulate systems and spread viruses.\n\nAlong with this came pranks and thefts of information, software or even money.\n\nThe challenge of hacking became more about taking on research centres, government agencies or corporations. Bigger they are, harder they fall mentality. Led to rise of ‘Trophy Hacking’ 1986 one hacker broke into 30-60 computers at Stanford University, 15 Silicon Valley companies, three government laboratories and numerous other sites.\n\nHacking became a serious threat with the development of sniffer programs (programs designed to extract passwords). 1994 estimates suggest one million passwords might have been compromised over the Internet.\n\nMore people realised possibilities with hacking. \n\nRussian man steals US $400,000 from Citcorp, transfers US $11 million to bank ac’s in other countries.\nKevin Mitnick - hacked and stole files and software from companies such as Nokia and Motorola.\nRobert Morris - Cornell Univerity graduate sent a worm over the Internet causing huge impact to the running of UNIX systems.\n\n\n
  • #5: Even before Windows 98 had shipped a hacker had already written a virus for it.\n\nHackers modified an online gambling site in 1998 so that everyone won. The site lost US $1.9 million\n\nDefacing on web-sites such as US Army web-site. Tried to make it look like the work of the Chinese. CIA web site defaced to Central Stupidity Agency. The Department of Justice became the Department of Injustice. Even Web pages of the White House altered.\n\nHackers stealing information to threaten people, particularly hacks coming out of Eastern Europe. Rise of hacking groups or syndicates. Leads to systematic and planned attacks.\n\nSafety systems compromised including airport towers.\n\nILOVEYOU virus spread through Windows and via Microsoft Outlook, damaging media files, modified the OS and Internet browser settings. Furthermore it collected passwords. Major Corporations affected Form and Siemens plus government agencies e.g. NASA and British Parliament. Approx US $10 billion in damages.\n\nIncreased availability of hacking programs on the Net. Rise of script kiddies.\n\nDDoS attacks, overloading a target site with with hundreds of thousands of requests for webpages and other information. The attacks are planted in many different computer systems to carry out the attack, hence the term distributed.\n\nWhere could this all go: - as technology use grows and spreads, then hacking will increase and potentially become more destructive. Now that we have computer technology that controls devices and not just information, the potential for hackers to wreak havoc is huge.\n\nIs hacking harmless? Difficult for systems administrators to distinguish a hacker with no malicious intent from a thief, terrorist or spy. Cost to business and inconvenience to clients / customers. For example, young Danish hackers broke into the National Weather Service. Cost the weather service resources, plus the associated police work. Hackers with no intent to cause harm can make mistakes. It is the uncertainty that is the biggest fear.\n
  • #6: Hactivism - legitimate form of civil disobediance? Dependence on perspective and stakeholders. Difference between freedom of speech and compelling people to listen. In countries where there is free speech it is less easy to justify hactivism. There is also the embarrassment to consider for those who are affected.\n\nHactivism was also used as a decoy for groups intent on doing greater damage.\n
  • #7: Intentional access to and use of a computer without authorisation are now criminal offences in the US. Federal legislation to cover state differences.\n\nIncludes when done knowingly and exceeding level of authorisation. Includes accessing a computer system, using network services, accessing files, copying data / programs, modifying / destroying data or files.\n\nComputers connected to the Internet are covered, thus can be used for DDoS attacks.\n\nStrong penalties 1- 10 year prison sentence for first offence and fines of up to US $250,000.\n\nStill ambiguity over what constitutes authorisation. Some may say the ability to reasonable do their work is compromised by a lack of authorisation. Also, it is hard to define ‘poor judgement’\n\nAnti-terrorism response to the attacks of September 11, resulting in the USA Patriot Act made amendments to the CFAA and with several amendments made to toughen the stance on hackers.\n\n
  • #8: Track a hacker BBC video.\n\nCan take a reasonably quick time to catch a hacker, many hackers of major crimes are caught within one week.\n\nHoney pots sites. Also estimated that 30% of the subscribers to 2600, a computer hacking magazine, a law enforcement agents, so that they are familiar with the language.\n\nSearch via handles on forums of those hackers bragging about exploits,\n\nComputer / Digital Forensics - collecting evidence from computer files or disks. Traces of ISP logs and logs of routers.\n\nEach time a hacker is ousted, remaining hackers learn what mistakes to avoid. \n\nCriminal charges are usually filed and a trial takes place where the crime was committed. Laws therefore, differ between countries and states. This makes it difficult to carry out investigations in other countries. The person who wrote the ILOVEYOU virus was from the Philippines, which had no law that applied to his actions.\n\n\n
  • #9: One would think that the crime for hacking should fit the crime. For example, terrorists who kill thousands of people through hacking should receive the same penalty as those who carried out September 11. Unauthorised access should be treated the same way as trespassing. Web defacing the same way as vandalism. So, it goes on.\n\nParticular problem with young hackers who are inexperienced, do not intend to damage and through accident and / or immaturity do far more damage than they can pay for.\n\nMost hackers under the age of 18 in the Western World receive light sentences e.g. two / three years probabtion, community service, small fine for damages.\n\nInconsistency for those just over 18.\n\nSome want heavier penalties to send a message because of the costs involved and damage that it can do to people. However, we should not punish because of the future potential to do something.\n\nArgued that we want hackers to mature and use their skills in better ways for the benefit of society. For example, give them a job helping a company improve its security and understand how it is vulnerable. We also need appropriate penalties, education and, most of all, parental responsibiliy about safe behaviour with computers. \n
  • #10: Argument that what hackers were able to access posed no risk. Hence, computer security continued to be weak.\n\nThe Internet was not designed with security in mind, it was a means of communication and sharing of information.\n\nIncreased storage of information through networked systems that security now has to be a bigger issue that needs addressing. With many developments security was largely ignored until something happened. A reactionary approach, therefore, existed. This reaction is very much a human trait - the horse has already bolted. This attitude has now changed as we have become more security conscious.\n\nFirewalls are now very common!\n
  • #11: Change in attitude for systems developers, security is now a goal.\n\nBusiness responsibility not only to themselves but to their clients and customers.\n\nCompanies have begun to provide ‘hacker insurance’ in a similar way that Insurance companies lower the premium for home with burglar alarms and other anti-theft devices. Similarly credit is given for having spyware and anti-virus software.\n\nAs mentioned, some companies also invest in hackers texsting their security systems. The use of hackers for such purposes has been called into question.\n\nWhile many companies invest very heavily in security, it must be recognised that computer systems are complex and that perfection cannot be achieve and unexpected flaws will always surface.\n\nLarge market now exists for computer security products. Very big development in biometric authentication.\n
  • #12: \n