Sunday, March 24, 2019
Essay --
Kevin MitnickKevin Mitnick was born in 1963 in Los Angeles California. His parents split when he was young so he had a lonely behavior while his mother worked as a waitress to support them. He was unpopular until he discovered his aptitude for computer programming. His career began as a teenager when he learned to get free motorcoach tickets, then progressed to a tele name phreaker, and ultimately to a notorious and knobbed computer hacker.In his teens, he joined a local phone phreak gang who met regularly and planned pranks. As a telephone phreak he was fitted to overtake a phone a comp any(prenominal) commutation to make personal calls and to eavesdrop on phone calls. In 1981, Mitnick was among a group of telephone phreakers who physically broke into Pacific Bells phone center and they stole operating manuals for the phone companys mainframe system, names of computer passwords, and door lock combinations. Luckily for Mitnick, he was fitting 17 when he was arrested and only sentenced to three months in juvenile storage area and one year of probation.In 1983, Mitnick used a computer at the University of Southern California to access ARPanet. ARPanet was the one of the first networks that used piece of ground switching networks, the first network to implement TCP/IP and was the trumpeter for what we now know as the Internet. Through his ARPanet access he was able to break into the Pentagon. Though he was legally an adult, for this offense, Mitnick received another unprovoked sentence of just six months at another juvenile prison. In 1987, Mitnick is again arrested and convicted for stealing software from the Santa Cruz Operation. He was sentenced to three years of probation without any jail time. Perhaps because Mitnicks punishments were never severe, hi... ...how the combination of social engine room and social networking have made hacking, or in these cases, cracking, easier, I arsehole go into LinkedIn and search for network enginee rs and come up with a list of great spear-phishing targets because they usually have administrator rights over the network. Then I go onto Twitter or Facebook and trick them into doing something, and I have favour access. If I know you love Angry Birds, maybe I would charge up you an e-mail purporting to be from Angry Birds with a new pro version. formerly you download it, I could have complete access to everything on your phone. (1)Mitnicks crimes may have seemed exceptional at the time, tho the evolution of technology and social media since his 1999 conviction has increased the opportunities for more little skilled crackers with malicious intent to cause far more harm than Kevin Mitnick ever did.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment