preview

Ethical Hacking

Better Essays

[pic] A Paper Presentation on [pic] THE ART OF EXPLOITATION [pic] ABSTRACT: The explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: criminal hackers. Governments, companies, and private citizens around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break …show more content…

■ First Def Con hacking conference in Las Vegas ZERO TOLERANCE (1994-1998) ■ 1995: The Mitnick Takedown: Arrested again; charged with stealing 20,000 credit card numbers. ■ 1995: Russian Hackers Siphon $10 million from Citibank; Vladimir Levin, leader. ■ Oct 1998 teenager hacks into Bell Atlantic phone system; disabled communication at airport disables runway lights. ■ 1999 hackers attack Pentagon, MIT, FBI web sites. ■ 1999: E-commerce company attacked; blackmail threats followed by 8 million credit card numbers stolen. And now the present condition is: “HACK YOUR ORGANIZATION BEFORE THE BAD GUYS DO IT” HACKER AND HACKING: [pic] The term "hacker" has a dual usage in the computer industry today. Originally, the term was defined as 1. A person who enjoys learning the details of computer systems and how to stretch their capabilities—as opposed to most users of computers, who prefer to learn only the minimum amount necessary. 2. One who programs enthusiastically or who enjoys programming rather than just theorizing about programming. This complimentary description was often extended to the verb form "hacking" which was used to describe the rapid crafting of a new program or the making of - changes to existing, usually complicated software. As computers became increasingly available at universities, user communities began to extend beyond researchers in engineering or

Get Access