登陆注册
23770800000077

第77章 Computer Security(7)

Who wants to harm computer systems and computer users’? As you’ll see, a surprising variety of people can cause security problems, ranging from people with too much time on their hands to hardened criminals, such as the Russian intruders who recently made off with $ 10 million from Citibank. Motives vary, too. Some attackers are out for ego gratification and don’t intend any harm. Others ate out for money; others are on a misguided crusade, and still others are just plain malicious.

Tile variety of attackers is a problem in itself. When intruders try to break into a system, administrators can’t be sure initially where the problems coming from. In 1998, U.S. Defense Department computers were besieged during a Gulf military action, and newspapers jumped to the conclusion that the attacks originated in Iraq and were intended to stymie tile military’ s activities. The culprits turned out to be two California boys under the direction of a teenage computer intruder in Israel!

The most celebrated intruders are computer hobbyists and computer experts, for whom unauthorized access is something of an irresistible intellectual game. The press tends to call all these hobbyists hackers, but this term is actually too broad. In this passage, you’ll learn better-focused terms to refer to computer users who try to break into computer systems.

Hackers are computer hobbyists who enjoy pushing computer systems (and themselves) to their limits. They experiment with programs to by to discover undocumented features, capabilities that aren’t mentioned in the systems’ manuals. They modify systems to obtain the maximum possible performance. And sometimes, they try to track down all the weaknesses and loopholes in a system’s security. When hackers attempt unauthorized access, they rarely damage data or steal assets. Hackers generally subscribe to an unwritten code of conduct, called the hacker ethic, which forbids the destruction of data. For hackers, unauthorized access is an intellectual diversion or game. (The people who have to secure systems against hacker attacks don’t think it’s a game.) Hacker motives include ego gratification:hackers form communities, with a pecking order defined in terms of an individual’s reputation for hacking prowess.

Crackers (also called black hats) are hackers who, like Darth Vader in George Lucas’s Star Wars trilogy, have turned to the “dark side.” They become obsessed (often uncontrollably) with gaining entry to highly secure computer systems. Like hackers, they generally do not intend to harm or steal data, but the frequency and sophistication of their attacks cause major headaches for system administrators. A Pentagon official has recently disclosed that the U.S. Department of Defense computer systems experience more than 1 000 detected unauthorized access attempts per day, and that as many as 96 percent of such attempts evade detection. Cracking appears to be one form of computer addiction: many crackers confess that they feel compelled to return to cracking even if they have made an effort to stop.

Like hackers, crackers are obsessed with their reputation in the hacking and cracking communities. To document their feats, they’ often leave calling cards, such as a prank message, on the systems they penetrate. Sometimes these traces enable law enforcement personnel to track down crackers.

Cyber gangs bring crackers together by means of the Internet and physical meetings. The group dynamics reinforce their immature and often destructive aims. Hackers and crackers can cause major headaches, but both should be distinguished from criminals who seek to steal money or valuable data by gaining unauthorized access to computer systems. However, anyone who tries to gain unauthorized access to a computer system is probably breaking one or more laws.

Computer virus authors, typically, are teenage males whose programming ability is much more developed than their ethical conscience. They want to see how far they can push the boundaries of virus software. Often, they see no harm in

what they are doing. They claim flint all technological progress is inevitable, and that somebody else would eventually create the programs they write. Most eventually stop writing viruses after they’re matured a bit and found something more worthwhile to do with their time.

Some virus authors appear to be motivated by a twisted moral crusade, specifically, a campaign to rid the world of Microsoft Corporation, which has long been detested by the hacker community. In the twisted logic of some virus authors, Microsoft deserves to be attacked because, they believe, its products fail to protect users adequately from computer security risks. However, their attacks have yet to harm Microsoft Corporation. Instead, they have penalized millions of innocent computer users, many of whom have suffered devastating losses of data.

More than a few hackers and crackers have turned pro, offering their services to companies hoping to use hacker expertise to shore up their computer systems’ defenses. (This practice is called ethical hacking, and those who undertake this type of hacking are called white hats.) And without doubt, some of them have crossed the line from hacking and cracking to intentional computer crime. This prospect sounds scary, but a far greater threat exists inside the organizations that house computer systems.

【New Words】

ego

自我,利己主义

malicious

怀恶意的,恶毒的

crusade

宗教战争,宗教改革

penetrate

穿透,渗透,洞察

twist

扭弯,扭曲,缠绕

pentagon

五角形,五边形

9.4 Security Breaches Types

同类推荐
  • 把沉睡的时光摇醒

    把沉睡的时光摇醒

    《把沉睡的时光摇醒》精选了梭罗、海明威、罗斯金、莫里斯、里尔克、笛福、兰姆、马克·吐温、托尔斯泰、毛姆、戴克、怀特、艾默生等50多位全球公认的文学巨匠,近百篇最美的散文,100多幅精美插画。全书精致雅美,传承名家之灵气,有如万般激流在心中翻涌,又似气吞山河的力量,抑或万物如谜般沉默静美,给人无限的想象和心灵滋养。
  • 青春阅读——新鲜阅读空气(上)(英语版)

    青春阅读——新鲜阅读空气(上)(英语版)

    阅读理解是英语学习和英语测试的重要手段,阅读能力的测试分为理解能力和阅读速度。对于高中学生来说,阅读能力测试的主要要求如下.正确理解作者的思想、观点和意图。正确理解文章的主题。正确理解文章细节,包括文章段落大意。
  • 我的第一本英语百科全书

    我的第一本英语百科全书

    本书的特色:全!全到不能再全的英语百科,内容涵盖口语、俚语、句型、短语、希腊神话一应俱全细!每个常识讲解非常的详尽,深入浅出,很好地解决了读者学习时的“输出”问题!酷!课堂上很少能接触到的美式英语。英语最实用常识一网打尽!值!超长美语录音MP3免费下载,标准美音,地道表达,犹如外教在身边,给读者以超值的学习体验!练口语,会俚语,学句型,知短语,晓故事,这些基础知识是学习好英语的基础,而《我的第一本英语百科全书》已完整收录了所有功能,相信读者在使用本书后,英文能力肯定能够得到全面提升!
  • 课外英语-温情留言簿(双语版)

    课外英语-温情留言簿(双语版)

    本册介绍母爱、亲情、爱情人生驿站,心灵物语,温馨的爱时刻萦绕在我们周围,他们是人世间最令人感动、最令人难忘的乐章。
  • 生活英语会话王

    生活英语会话王

    本书共分为四类话题,内容涵盖了日常生活交际场合的50多个场景。全书共分49个单元,每单元下分:巧问巧答、会话工具、会话模板、鲜活词语和趣味阅读五大部分。收录了日常生活中最常用到的食、住、穿、行四个方面的内容,共十四节49个单元,非常实用、易练,循序渐进就可以学会。
热门推荐
  • 公主殿下们的绝美恋情

    公主殿下们的绝美恋情

    一群性格差异很大的众男女们的相识,相知,相恋,分离。【第一次写,觉得不好的,请见谅】
  • 绝色元素

    绝色元素

    她,21世纪顶级杀手、他,幻影、天幻大陆杀人不眨眼的圣王大人一天,某人猛撕开白袍,露出胸膛上紫色的吻痕,委屈地说:“小静儿,你都要了人家了,你这个负心女......呜呜呜......"某女:爷什么时候说的!某男:小静儿!你不承认,我就让你长眠不复醒!
  • 凤求凰:红颜祸水乱江山

    凤求凰:红颜祸水乱江山

    叶沫羽是二十一世纪的第一神偷,一朝醒来却身在异朝,独处异朝的她,遇上了阴险狡诈的他(宫祈晨),又会擦出怎样的火花………期待他们的故事嘛???
  • 洪荒征战史

    洪荒征战史

    一次动乱,将生活在大山里的少年带入了修练潮流,一件异宝的出现,掀起了一轮腥风血雨..........
  • 妖神宝宝腹黑娘:逆天魔尊

    妖神宝宝腹黑娘:逆天魔尊

    她小小的心愿,不过是想像前世那样,做为一个人好好活着。可是,冥冥之中上天却好像与她作对般。她不管你是修魂补魂养魂也罢,她只是她。他护她,纵使她是能毁灭天地的妖神。她毁,他护。众人欺她,害她,伤她。他便让他们全部都得到应有的惩罚。小小白:娘,谁欺负你,小小白便灭了她。”果然是娘的小小白”小白满意的把他抱入了怀里一脸宠溺的说道。‘娘要不,你就从了仙尊吧,他好可怜啊。“小小白转着骨碌碌黑白分明的眸子看向了她说道。”小屁孩,大人的事情小孩子不要插手。对了,你要叫他魔爹。“小白说着,轻拍了他的屁股,假装惩罚的说道。
  • 什么鬼的言情

    什么鬼的言情

    这里言情低手——表示单身狗。拒虐。我单身我骄傲ヾ(???)?
  • TFBOYS之樱花恋情

    TFBOYS之樱花恋情

    生活里,有很多转瞬即逝,像在机场的告别,刚刚还相互拥抱,转眼已各自天涯。很多时候,你不懂,我也不懂,就这样,说着说着就变了,听着听着就倦了,看着看着就厌了,跟着跟着就慢了,走着走着就散了,爱着爱着就淡了,想着想着就算了。-YL
  • 重生之九天仙魔

    重生之九天仙魔

    因遭忌而被同门害死的修仙小菜鸟萧潇重生回被带走的前五年,原本纯良的软妹纸立时变得冷血无情,依靠九天仙魔诀遇神杀神,遇鬼杀鬼。什么?天道?姐才不怕。左手空间,右手异能,且看女主如何从一个小白一步步走上巅峰。
  • 杀手大人就这么拽

    杀手大人就这么拽

    一个奇特的容器,身体之中有着无数的毒药,生生将她一个女孩变成了一个男孩。当沐雪狐这个暗夜王牌杀手接管这个身体时,竟然体内封印着魔王,两个唯恐天下不乱的祸害凑在一堆,必然将这世间搅得天翻地覆!“我。。。可是魔,你要想清楚。跟魔做交易可是一件搭上性命的事情。”“那么,意思是说。我成为魔王不就好了?”【这并不是什么一飞冲天的爽文,开始男主都不是金刚侠什么的,人都是锻炼出来的,并不是一开始就是异常坚强√】ps:hhh已经变成(耽美了...)【冷漠】好感谢支持我的人啊~求推荐求收藏求留言
  • 幻世浮海

    幻世浮海

    她是玄冰宫宫主的女儿,她的父亲不在,她被卖了。他买了她,但他不喜欢她,他喜欢男人,但他的父王逼他买了她。她也不是什么好货,处子是处子,美丽是美丽,但她中了毒。她中毒,但是感觉没什么事,一个戴着草帽长得酷像路飞的少年将她禁在密室。草帽像草帽,少长像路飞,也有海,北冥海,但少年不在北冥海,他在玄冰宫,当厨子。一个少年将一个少女禁在密室,你们说会发生什么事?什么事也没发生,他给她解毒。她不觉得自己中毒,但她的确中了剧毒。另一个她没中毒,但她中了毒,快要死。一个长发少年背着她。少年是风度翩翩,但他却拿着把烂剑。终有一天,长发少年与草帽小子会相遇。