登陆注册
27082000000077

第77章 Computer Security(7)

Who wants to harm computer systems and computer users’? As you’ll see, a surprising variety of people can cause security problems, ranging from people with too much time on their hands to hardened criminals, such as the Russian intruders who recently made off with $ 10 million from Citibank. Motives vary, too. Some attackers are out for ego gratification and don’t intend any harm. Others ate out for money; others are on a misguided crusade, and still others are just plain malicious.

Tile variety of attackers is a problem in itself. When intruders try to break into a system, administrators can’t be sure initially where the problems coming from. In 1998, U.S. Defense Department computers were besieged during a Gulf military action, and newspapers jumped to the conclusion that the attacks originated in Iraq and were intended to stymie tile military’ s activities. The culprits turned out to be two California boys under the direction of a teenage computer intruder in Israel!

The most celebrated intruders are computer hobbyists and computer experts, for whom unauthorized access is something of an irresistible intellectual game. The press tends to call all these hobbyists hackers, but this term is actually too broad. In this passage, you’ll learn better-focused terms to refer to computer users who try to break into computer systems.

Hackers are computer hobbyists who enjoy pushing computer systems (and themselves) to their limits. They experiment with programs to by to discover undocumented features, capabilities that aren’t mentioned in the systems’ manuals. They modify systems to obtain the maximum possible performance. And sometimes, they try to track down all the weaknesses and loopholes in a system’s security. When hackers attempt unauthorized access, they rarely damage data or steal assets. Hackers generally subscribe to an unwritten code of conduct, called the hacker ethic, which forbids the destruction of data. For hackers, unauthorized access is an intellectual diversion or game. (The people who have to secure systems against hacker attacks don’t think it’s a game.) Hacker motives include ego gratification:hackers form communities, with a pecking order defined in terms of an individual’s reputation for hacking prowess.

Crackers (also called black hats) are hackers who, like Darth Vader in George Lucas’s Star Wars trilogy, have turned to the “dark side.” They become obsessed (often uncontrollably) with gaining entry to highly secure computer systems. Like hackers, they generally do not intend to harm or steal data, but the frequency and sophistication of their attacks cause major headaches for system administrators. A Pentagon official has recently disclosed that the U.S. Department of Defense computer systems experience more than 1 000 detected unauthorized access attempts per day, and that as many as 96 percent of such attempts evade detection. Cracking appears to be one form of computer addiction: many crackers confess that they feel compelled to return to cracking even if they have made an effort to stop.

Like hackers, crackers are obsessed with their reputation in the hacking and cracking communities. To document their feats, they’ often leave calling cards, such as a prank message, on the systems they penetrate. Sometimes these traces enable law enforcement personnel to track down crackers.

Cyber gangs bring crackers together by means of the Internet and physical meetings. The group dynamics reinforce their immature and often destructive aims. Hackers and crackers can cause major headaches, but both should be distinguished from criminals who seek to steal money or valuable data by gaining unauthorized access to computer systems. However, anyone who tries to gain unauthorized access to a computer system is probably breaking one or more laws.

Computer virus authors, typically, are teenage males whose programming ability is much more developed than their ethical conscience. They want to see how far they can push the boundaries of virus software. Often, they see no harm in

what they are doing. They claim flint all technological progress is inevitable, and that somebody else would eventually create the programs they write. Most eventually stop writing viruses after they’re matured a bit and found something more worthwhile to do with their time.

Some virus authors appear to be motivated by a twisted moral crusade, specifically, a campaign to rid the world of Microsoft Corporation, which has long been detested by the hacker community. In the twisted logic of some virus authors, Microsoft deserves to be attacked because, they believe, its products fail to protect users adequately from computer security risks. However, their attacks have yet to harm Microsoft Corporation. Instead, they have penalized millions of innocent computer users, many of whom have suffered devastating losses of data.

More than a few hackers and crackers have turned pro, offering their services to companies hoping to use hacker expertise to shore up their computer systems’ defenses. (This practice is called ethical hacking, and those who undertake this type of hacking are called white hats.) And without doubt, some of them have crossed the line from hacking and cracking to intentional computer crime. This prospect sounds scary, but a far greater threat exists inside the organizations that house computer systems.

【New Words】

ego

自我,利己主义

malicious

怀恶意的,恶毒的

crusade

宗教战争,宗教改革

penetrate

穿透,渗透,洞察

twist

扭弯,扭曲,缠绕

pentagon

五角形,五边形

9.4 Security Breaches Types

同类推荐
  • 美丽英文:快乐是自找的

    美丽英文:快乐是自找的

    《美丽英文:快乐是自找的》精选了与快乐有关的美文故事,有的幽默风趣,有的充满哲思,从不同的视角告诉人们快乐并不难,只要用心发现并勇敢创造,就能找到最快乐的自己,塑造出值得拥有的充满快乐的人生!
  • 科学读本(英文原版)(第1册)

    科学读本(英文原版)(第1册)

    以一位名为威尔逊的教授与3位学生为主角,通过对各种事物与科学知识和原理的讨论,系统讲述了孩子们身边随时可见的事物与现象原理。以激发孩子们对科学的兴趣与爱好。这比死记知识,大量解题要实用得多。《科学读本(英文原版)(套装共6册)》对中国学生而言,这又是另一习得英语的良好途径,尤其对那些准备出国学习的孩子们,《科学读本》的阅读学习,对他们继续国外课程的学业定有很大帮助。比起文学与文史题材的英语读本,科学英语更容易让孩子们理解与学习。一是其讲述内容均为我们身边熟悉的万事万物,容易联想记忆;二是科技英语的语法、句子结构相对简单,比文学语言更简洁清晰,易于理解。相信会得到孩子们的喜欢。
  • 火合牛供养仪轨

    火合牛供养仪轨

    本书为公版书,为不受著作权法限制的作家、艺术家及其它人士发布的作品,供广大读者阅读交流。
  • 大师论管人

    大师论管人

    本书是对世界上最具影响力的众多思想家有关管人方面的贡献的巧妙总结,每一位管人大师的思想背景、主要的管人观点和大师间的交叉影响,都能在本书中找到答案。
  • 中小学生必读丛书:鲁滨逊漂流记

    中小学生必读丛书:鲁滨逊漂流记

    本书是被称为“现代小说之父”的英国著名作家丹尼尔·笛福的代表作。在西方文学史上,鲁滨孙的形象众所周之,他航海遇险,一个人漂流到南美洲某荒岛,靠着双手和工具,造房子,修田地、种粮食,养牲畜,还从土著的刀下救了一个人,取名礼拜五,收为自己的奴隶……鲁滨孙用28年的时间把荒岛建设成为一个世外桃源,最后又奇迹般地回到欧洲,成为巨富。
热门推荐
  • 天行

    天行

    号称“北辰骑神”的天才玩家以自创的“牧马冲锋流”战术击败了国服第一弓手北冥雪,被誉为天纵战榜第一骑士的他,却受到小人排挤,最终离开了效力已久的银狐俱乐部。是沉沦,还是再次崛起?恰逢其时,月恒集团第四款游戏“天行”正式上线,虚拟世界再起风云!
  • 绝版的乡愁

    绝版的乡愁

    本书是作者的散文文集,收录了作者关于乡愁的主题作品。何为绝版的乡愁?只因在作者心中故乡是独一无二的,思乡的心情也是无可替代的。作者将自己浓郁的乡愁,幻化为优美的文字,安抚尘世喧嚣中迷茫的心,触摸游子无处安放的灵魂。作者文笔清新质朴,感情真挚,字里行间流露出对故乡农村的眷恋与回忆,叫人读来感同身受。随着经济发展,乡村也在飞速发展着,记忆中的故乡离我们越来越远,由此而衍生出了浓浓的、绝版的乡愁。
  • 我是蛇,不是妖

    我是蛇,不是妖

    它,长白山灵烟洞出生的一条饭匙倩蛇从出生之日就没见过自己的爹娘,更不知道自己的毒是天下医者喜欢的镇痛良药。它生性乖巧,因缘巧合师从仙人为徒,点化一二,净心修炼,可好景不长,师傅被召回天宫,为了早日成仙,它来到人间历练……要经历过怎样的曲折才能成仙呢?小蛇为了心爱的人又会不会放弃成仙呢?
  • 青春笑园剧

    青春笑园剧

    童话版:小白兔遇见一只小白羊,想和他交朋友,却发现小白羊是披着羊皮的狼。在另一只羊皮狼的操纵下,小白兔被迫在狼牙下求生存。不想成为腹中餐的小白兔拼命扮乖巧、装无辜。可是小白兔怎么是大灰狼的对手呢?她又不是兔八哥……正常版:他,实力非凡话剧团台柱子;她,朝气蓬勃话剧团新苗;他和她的梁子是在剧团招新时结下的。进团后,她屡番示好,他无动于衷。好吧,她放弃;好嘛,他表白……小打小闹,无虐有水,欢喜收场……
  • 职场风云:我的美女老板

    职场风云:我的美女老板

    老实人被女友出轨,黯然销魂,更遇公司解雇风波,真是天亡老实人,嫁人不嫁老实人。不,老实人一样可以走上人生巅峰,然而这却是从一次莫名其妙的一夜情开始...
  • 极致梦境

    极致梦境

    天哪!能带动我们这里的经济的人居然是个小毛孩?据说他是老三的孩子周鹏涛呢。额呵呵,不要这么看我嘛......我还只是个六年级的小学生啦。冒昧地问下哈,你是怎么做到的呢?我是做梦的!你信不信?
  • 天行

    天行

    号称“北辰骑神”的天才玩家以自创的“牧马冲锋流”战术击败了国服第一弓手北冥雪,被誉为天纵战榜第一骑士的他,却受到小人排挤,最终离开了效力已久的银狐俱乐部。是沉沦,还是再次崛起?恰逢其时,月恒集团第四款游戏“天行”正式上线,虚拟世界再起风云!
  • 魔法师的日常鸭

    魔法师的日常鸭

    这里是一个使用魔法的世界,这里的都会魔法但是魔法也是分阶级的,紫阶(上中下),蓝阶(上中下),青阶(上中下),绿阶(上中下)黄阶(上中下),橙阶(上中下),红阶(上中下),红阶上是最强的。目前这个世界上最强的也不过是橙阶下罢了。,毕丫,夏沫沫这些刚刚上启蒙魔法学院的小可爱会发生什么可爱事件呢??(这本书又名魔法师)
  • 狐妖小红娘之红白续缘录

    狐妖小红娘之红白续缘录

    若与白月初同行的是涂山红红,那么记载在纯爱天篇这本天书上的种种故事,又是否能让他们再续前缘呢?
  • 你所不知道的历史之四国志

    你所不知道的历史之四国志

    本书根据真实历史,加上民间野史和合理想象,向读者全新讲述我国最为脍炙人口的三国时期。旷世奇才诸葛亮到底是文臣还是武将?原著中被罗贯中老先生一笔带过的太平要术究竟是怎样一部奇书?