Please enable JavaScript.
Coggle requires JavaScript to display documents.
Topic 6
(Crime) - Coggle Diagram
Topic 6
(Crime)
5.2 Hacking
5.2.2 Hacktivism, or Political Hacking
- The political motive is irrelevant, or at the other extreme, that political hacking is a form of cyberterrorism.
- In free countries where almost anyone can tweet or post their words and video on the Web for free, it is hard to justify hacking someone else’s site to promote a political cause
- Hacktivism is the use of hacking to promote a political cause
- Activists use the Internet to organize opposition to oil exploration in Alaska that they fear will harm a caribou herd.
- Activists use free social media to organize mass demonstrations against international meetings of government leaders
- Another factor to consider when evaluating hacktivism is the political system under which the hacktivists live
-
5.2.1 What is 'Hacking'?
- The term “hacker,” to many people, means an irresponsible, destructive criminal
- Phase 1: The joy of programming
- Hackers were “computer virtuosos.”
- “Hacking” still sometimes has the early meaning of clever programming that reflects a high level of skill and that circumvents limits.
- Phase 2: From the 1970s to the mid-1990s
- The meaning, and especially the connotations, of the word “hacker” changed as more people began using computers and more people began abusing them
- By the 1980s, hacking also included spreading computer viruses, then mostly in software traded on floppy disks.
- Hacking behavior included pranks, thefts (of information, software, and sometimes money), and phone phreaking (manipulating the telephone system)
- A program known as the Internet Worm demonstrated the vulnerability of the Internet as a whole in 1988
- Business espionage and significant thefts and frauds joined the list of hacking activities in the 1980s and 1990s.
- Phase 3: The growth of the Web and mobile devices
- The purposes and techniques of hacking have shifted as the Web and the amount of stored data of all kinds have grown.
- The Melissa virus of 1999 infected approximately a million computers worldwide
- Beginning roughly in the mid-1990s, the intricate interconnectedness of the Web and the increased use of the Internet for email and other communications, for sensitive information, and for economic transactions made hacking more dangerous and damaging—and more attractive to criminal gangs.
- In 2000, the “Love Bug,” or “ILOVEYOU” virus, spread around the world in a few hours. It destroyed image and music files, modified a computer’s operating system and Internet browser, and collected passwords.
- As social networks grew, they became targets of hackers
-
5.2.5 Security
- It might not be surprising that, initially, computer security at universities and businesses was weak
- Security on the early Web was extremely weak
- Hacking is a problem, same goes to poor security
- Security in other government agencies is weaker than in the Defense Department
The Government Accountability Office (GAO) reported that computer security at NASA was so weak that hackers could easily disrupt such functions as the tracking of spacecraft
- Encryption is a particularly valuable security tool. It is often not used sufficiently and appropriately, by both governments and businesses, because it can be inconvenient and expensive
-
- In several major thefts of consumers’ personal data from retailers, the databases included unencrypted credit card numbers and other security numbers read from the magnetic strips on the cards
- In addition to technical security tools such as encryption, there are numerous market phenomena that can help improve security
- Another factor leading to weak security for systems that affect the general public is the speed of innovation and people’s desire for new things fast
- Many incidents of stolen sensitive data involve stolen portable devices such as laptops and phones
-
5.1 Introduction
- Computing technology and the Internet provide new environments for fraud, stock manipulation, theft, forgery, industrial espionage, and many old and new scams
- Crimes committed with computing technology are more devastating and harder to detect than similar crimes committed without it.
-
-
2) A hacker who breaks into a retailer’s or bank’s computer might steal not one or a dozen but thousands or millions of credit card numbers
5) Global business networks and the Web extend the criminal’s reach and make arrests and prosecutions more difficult
1) A thief who steals a credit card (or a credit card number) gains access to a much larger amount of money than the thief of the past who stole a wallet containing only cash.
-
-