Computer Hacking

2133 Words5 Pages

Computer Hacking

Precis of 'Who's reading your E-mail"

The article exposes the vulnerability of computer data and of

corporations with the popularity of the Internet. The Internet can

allow hackers access to any computer in the world, with understated

ease. Break-ins can go virtually undetected.

Major corporations and government security departments have

acknowledged that hacker break-ins are out of control. Some companies

are too fearful to join networks because of this. Software programs

brought out to deal with the growing problem, such as firewalls, are no

longer totally effective. New technology has been developed such as

''Pilot Network Services' (offering supervised Internet access);

'Netranger' (a monitor device used by Pentagon) and 'Encrypton'

(software that jumbles messages).

The basics of computer security (using difficult passwords, and

guarding of data) are not being met in a disturbingly large number of

American companies surveyed. A new bill demands that system operators

become responsible for security. Hackers can be prosecuted (with

subsequent heavy penalties) only if the exposed company has actively

shown that it was security conscious. Further more, exposed companies

are liable to other companies if their lack of security precautions

allowed their computer network to become an opening for other company

break-ins.

Companies are dis-inclined to report breaches in security as it denotes

a poor image and highlights their vulnerability. Clients demand

security, and lack of it will send them elsewhere.

Billions of dollars annually is spent on protection devices. Others are

utilizing the expertise of former convicted hackers to fine tune and

update their security features. It is a case of befriending the enemy

in order to learn more. These hackers come out of goal with a ready

market for their expertise, and great financial rewards.

The explosion of the Internet use, and networks around the world have

brought with it a need for greater security consciousness amongst its

users and systems operation managers. Technology needs to be

constantly updated in the war against the ever-growing insidious and

malicious hacker.

Precis of 'Hackers: Taking a byte out of computer crime' by W. Roush.

Roush discusses the changing face of computer crime with the advent of

the modem and stricter laws. The article touches on the effect these

changes are having on hackers themselves, and the measures that are put

in place to deal with the problem. It also explores the common ground

which hackers and computer security experts agree on.

In the 1960's the dictionary definition of a hacker was that of a

"computer virtuoso". Hackers comprised of young, computer literate and

rebellious gangs vying for the status symbol image and thrill of

breaking into a computer network.

This all changed with the popularity of the modem and an increasing

More about Computer Hacking

Open Document