Running head: ENG105 HACKING AND COMPUTER SECURITY
ENG105 Hackers and Computer Security
Dr. Lynn Moore
By Leslie Johnson
ENG105-1002B-20, IP-2
Hacking and Computer Security
2. Evaluate sources
Hacking in to the mind of a hacker – Material to use
* Hackers in general, and computer criminals in particular, love the power of control
* Hackers compromise databases, and products to find holes in the security
* They do these things to find ways to better the security
* Hackers are normally the ones working for a company to find these flaws
* Many companies let hackers get away with it
* 50% are not reported
* Companies fear bad publicity
* Any business with a W
* Web site is a target
* They cause the most damage with theft and fraud
* Break ins and virus attacks ballooned in 2003 to 138000 from 82000 prev. year
* Total annual loss of $70.1 million due to theft, $65.6 million due to denial of service, compared to $27.3 from viruses – says a survey form the FBI(503 respondents)
How to become a better hacker – Material to use
* You will need a basic thrill form solving problems, sharpening your skills, and exercising your intelligence (pg4)
* No problem should be solved twice
* Boredom and drudgery is evil – you should love what you do and solve new problems (pg5)
* Freedom is good
* Don’t like to get ordered around
* Anti-authoritarian
* Attitude is no substitute for competence
* Especially for competencyat hacking
* Competene at demanding skills that few can master is especially good (pg6)
* Hackers are the good guys and “crackers” are the ones who give hackers the bad name
* They are the ones who steal and break in to systems “UNWANTED”
ID thieves targeting universities
* In 2006 hackers (crackers) breached a database of some major universities
* Stole 173,000 records alone at Ohio University
* Obtain personal information...
No comments