Студопедия — Computer hacking - high-tech crime
Студопедия Главная Случайная страница Обратная связь

Разделы: Автомобили Астрономия Биология География Дом и сад Другие языки Другое Информатика История Культура Литература Логика Математика Медицина Металлургия Механика Образование Охрана труда Педагогика Политика Право Психология Религия Риторика Социология Спорт Строительство Технология Туризм Физика Философия Финансы Химия Черчение Экология Экономика Электроника

Computer hacking - high-tech crime






You can rob a bank without leaving the house these days. Who needs stocking masks, guns and getaway cars? If you're a computer whizz-kid, you could grab your first million armed with nothing more dangerous than a personal computer (PC), a telephone and a modem to connect them.

All you have to do is dial into the networks that link the computers in large organisations together, type in a couple of passwords and you can rummage about in the information that's stored there to your heart's content.

Fortunately it isn't always quite as easy as it sounds. But, as more and more information is processed and stored on computer, whether it's details of your bank account or the number of tins of baked beans in the stockroom at the supermarket, computer crime seems set to grow.

A couple of months ago a newspaper reported that five British banks were being held to ransom by a gang of hackers who had managed to break into their computer. Thehackers were demanding money in return for revealing exactly how they did it. In cases like this, banks may consider paying just so they can protect themselves better in thefuture.

No one knows exactly how much money is stolen by keyboard criminals – banks and other companies tend to be very secretiveif it happens to them. It doesn't exactly fill customers with confidence if they think their bank account can be accessed by anyone with a PC! Some experts believe thatonly around a tenth of all computer crimes are actually reported. Insurance company Hogg Robinson estimate that computer frauds cost British companies an incredible £400million a year.

Most computer crimes are 'inside jobs', where staff with access to the company's computers fiddle with the records. A comparatively smallamount are committed by the more glamorous – and headline-grabbing – hackers.

The true hacker, it seems, doesn't do it for financial gain. The thrillappears to be, not in getting rich, but in beating the system. Two of Britain's most notorious hackers are Nicholas 'Mad Hacker' Whiteley and Edward Singh. The renegade pairhave been the scourge of organisations with insecure computers for years, seemingly competing for the title of Britain's best hacker.

Whiteley's hacking days came to an abrupt halt in June, when the 21-year-old was sent to prison for four months for damaging computer discs. Edward Singh first came topublic attention after claiming that he had hacked into American and British government and military computers.

'It has never been my intention to so steal anything,' said Singh. 'I really see myself as a highly skilled software engineer.' His mission seems to be to prove just how insecure their systems are.

As with everything else, hackers start young in the States. A 12-year-old boy in Detroit was accused of entering a company's credit rating computer and distributing the numbers he found there. His mother told reporters that he spent up to 14 hours on his computer during the weekend. 'He didn't bother me,' she said. 'I figured, computers, that's the thing of the day.'

Last month, two New York teenagers, one aged 14 and one aged 17, were charged with breaking into a computer system owned by a company that publishes computer magazines. They are alleged to have changed polite recorded greetings to rude messages, added bomb threats and wiped advertisers' orders. Customers linked into the system only to be told that 'Daffy Duck is not available'! The company estimates that the tampering has cost $2.4 million.

Prevention is probably easier than detection, and many companies now spend lots of time and money devising programmes using passwords and codes. Of course, allthis is no use at all if computer users tell each other their password, stick it on their screen so they don't forget it or use passwords like 'password'. It all happens.

There are plenty of software companies who specialise in writing software that make computers hacker-proof. One company in the States set out to prove that itssystem can defeat hackers by asking over 2,000 of them to try to hack in. The hackers were given two weeks to discover the secret message stored on two PCs in offices in New Yorkand San Francisco. The message reads: 'The persistent hunter who wins his prize sooner or later becomes the hunted.' You'll be relieved – or perhaps disappointed –to learn that not one hacker managed it.







Дата добавления: 2015-10-15; просмотров: 2304. Нарушение авторских прав; Мы поможем в написании вашей работы!



Расчетные и графические задания Равновесный объем - это объем, определяемый равенством спроса и предложения...

Кардиналистский и ординалистский подходы Кардиналистский (количественный подход) к анализу полезности основан на представлении о возможности измерения различных благ в условных единицах полезности...

Обзор компонентов Multisim Компоненты – это основа любой схемы, это все элементы, из которых она состоит. Multisim оперирует с двумя категориями...

Композиция из абстрактных геометрических фигур Данная композиция состоит из линий, штриховки, абстрактных геометрических форм...

Расчет концентрации титрованных растворов с помощью поправочного коэффициента При выполнении серийных анализов ГОСТ или ведомственная инструкция обычно предусматривают применение раствора заданной концентрации или заданного титра...

Психолого-педагогическая характеристика студенческой группы   Характеристика группы составляется по 407 группе очного отделения зооинженерного факультета, бакалавриата по направлению «Биология» РГАУ-МСХА имени К...

Общая и профессиональная культура педагога: сущность, специфика, взаимосвязь Педагогическая культура- часть общечеловеческих культуры, в которой запечатлил духовные и материальные ценности образования и воспитания, осуществляя образовательно-воспитательный процесс...

Понятие массовых мероприятий, их виды Под массовыми мероприятиями следует понимать совокупность действий или явлений социальной жизни с участием большого количества граждан...

Тактика действий нарядов полиции по предупреждению и пресечению правонарушений при проведении массовых мероприятий К особенностям проведения массовых мероприятий и факторам, влияющим на охрану общественного порядка и обеспечение общественной безопасности, можно отнести значительное количество субъектов, принимающих участие в их подготовке и проведении...

Тактические действия нарядов полиции по предупреждению и пресечению групповых нарушений общественного порядка и массовых беспорядков В целях предупреждения разрастания групповых нарушений общественного порядка (далееГНОП) в массовые беспорядки подразделения (наряды) полиции осуществляют следующие мероприятия...

Studopedia.info - Студопедия - 2014-2024 год . (0.009 сек.) русская версия | украинская версия