Wednesday, February 13, 2019
Essay --
Kevin MitnickKevin Mitnick was born in 1963 in Los Angeles California. His parents divorced when he was young so he had a l adeptly life composition his mother worked as a waitress to support them. He was unpopular until he discovered his aptitude for reckoner programming. His career began as a teenager when he learned to get free bus tickets, thence progressed to a tele resound phreaker, and ultimately to a notorious and elusive computer hacker.In his teens, he joined a local phone phreak crowd who met regularly and planned pranks. As a telephone phreak he was fitted to overtake a phone a company switch to bushel personal calls and to eavesdrop on phone calls. In 1981, Mitnick was among a conference of telephone phreakers who physically broke into Pacific Bells phone center and they stole operating manuals for the phone companys processor system, lists of computer passwords, and door lock combinations. Luckily for Mitnick, he was just 17 when he was arrested and only ar ticle of faithd to three months in juvenile detention and one year of probation.In 1983, Mitnick used a computer at the University of Confederate California to access ARPanet. ARPanet was the one of the first networks that used packet geological fault networks, the first network to implement TCP/IP and was the predecessor for what we promptly know as the Internet. Through his ARPanet access he was able to secernate into the Pentagon. Though he was legally an adult, for this offense, Mitnick received another light sentence of just six months at another juvenile prison. In 1987, Mitnick is over again arrested and convicted for stealing software from the Santa Cruz Operation. He was sentenced to three years of probation without any put aside time. Perhaps because Mitnicks punishments were never severe, hi... ...how the combination of complaisant engineering and social networking have made hacking, or in these cases, cracking, easier, I can go into LinkedIn and search for network engineers and come up with a list of immense spear-phishing targets because they usually have administrator rights over the network. Then I go onto Twitter or Facebook and trick them into doing something, and I have privileged access. If I know you love Angry Birds, maybe I would send you an e-mail purporting to be from Angry Birds with a new pro version. Once you transfer it, I could have complete access to everything on your phone. (1)Mitnicks wickednesss may have seemed exceptional at the time, but the growth of technology and social media since his 1999 conviction has increased the opportunities for more less competent crackers with malicious intent to cause far more scathe than Kevin Mitnick ever did.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment