登陆注册
27082000000077

第77章 Computer Security(7)

Who wants to harm computer systems and computer users’? As you’ll see, a surprising variety of people can cause security problems, ranging from people with too much time on their hands to hardened criminals, such as the Russian intruders who recently made off with $ 10 million from Citibank. Motives vary, too. Some attackers are out for ego gratification and don’t intend any harm. Others ate out for money; others are on a misguided crusade, and still others are just plain malicious.

Tile variety of attackers is a problem in itself. When intruders try to break into a system, administrators can’t be sure initially where the problems coming from. In 1998, U.S. Defense Department computers were besieged during a Gulf military action, and newspapers jumped to the conclusion that the attacks originated in Iraq and were intended to stymie tile military’ s activities. The culprits turned out to be two California boys under the direction of a teenage computer intruder in Israel!

The most celebrated intruders are computer hobbyists and computer experts, for whom unauthorized access is something of an irresistible intellectual game. The press tends to call all these hobbyists hackers, but this term is actually too broad. In this passage, you’ll learn better-focused terms to refer to computer users who try to break into computer systems.

Hackers are computer hobbyists who enjoy pushing computer systems (and themselves) to their limits. They experiment with programs to by to discover undocumented features, capabilities that aren’t mentioned in the systems’ manuals. They modify systems to obtain the maximum possible performance. And sometimes, they try to track down all the weaknesses and loopholes in a system’s security. When hackers attempt unauthorized access, they rarely damage data or steal assets. Hackers generally subscribe to an unwritten code of conduct, called the hacker ethic, which forbids the destruction of data. For hackers, unauthorized access is an intellectual diversion or game. (The people who have to secure systems against hacker attacks don’t think it’s a game.) Hacker motives include ego gratification:hackers form communities, with a pecking order defined in terms of an individual’s reputation for hacking prowess.

Crackers (also called black hats) are hackers who, like Darth Vader in George Lucas’s Star Wars trilogy, have turned to the “dark side.” They become obsessed (often uncontrollably) with gaining entry to highly secure computer systems. Like hackers, they generally do not intend to harm or steal data, but the frequency and sophistication of their attacks cause major headaches for system administrators. A Pentagon official has recently disclosed that the U.S. Department of Defense computer systems experience more than 1 000 detected unauthorized access attempts per day, and that as many as 96 percent of such attempts evade detection. Cracking appears to be one form of computer addiction: many crackers confess that they feel compelled to return to cracking even if they have made an effort to stop.

Like hackers, crackers are obsessed with their reputation in the hacking and cracking communities. To document their feats, they’ often leave calling cards, such as a prank message, on the systems they penetrate. Sometimes these traces enable law enforcement personnel to track down crackers.

Cyber gangs bring crackers together by means of the Internet and physical meetings. The group dynamics reinforce their immature and often destructive aims. Hackers and crackers can cause major headaches, but both should be distinguished from criminals who seek to steal money or valuable data by gaining unauthorized access to computer systems. However, anyone who tries to gain unauthorized access to a computer system is probably breaking one or more laws.

Computer virus authors, typically, are teenage males whose programming ability is much more developed than their ethical conscience. They want to see how far they can push the boundaries of virus software. Often, they see no harm in

what they are doing. They claim flint all technological progress is inevitable, and that somebody else would eventually create the programs they write. Most eventually stop writing viruses after they’re matured a bit and found something more worthwhile to do with their time.

Some virus authors appear to be motivated by a twisted moral crusade, specifically, a campaign to rid the world of Microsoft Corporation, which has long been detested by the hacker community. In the twisted logic of some virus authors, Microsoft deserves to be attacked because, they believe, its products fail to protect users adequately from computer security risks. However, their attacks have yet to harm Microsoft Corporation. Instead, they have penalized millions of innocent computer users, many of whom have suffered devastating losses of data.

More than a few hackers and crackers have turned pro, offering their services to companies hoping to use hacker expertise to shore up their computer systems’ defenses. (This practice is called ethical hacking, and those who undertake this type of hacking are called white hats.) And without doubt, some of them have crossed the line from hacking and cracking to intentional computer crime. This prospect sounds scary, but a far greater threat exists inside the organizations that house computer systems.

【New Words】

ego

自我,利己主义

malicious

怀恶意的,恶毒的

crusade

宗教战争,宗教改革

penetrate

穿透,渗透,洞察

twist

扭弯,扭曲,缠绕

pentagon

五角形,五边形

9.4 Security Breaches Types

同类推荐
  • 大学英语自学教程(上册)疑难详释与题解

    大学英语自学教程(上册)疑难详释与题解

    《大学英语自学教程》(高远主编,高等教育出版社出版)是受全国高等教育自学考试指导委员会的委托,根据自学考试指导委员会制定的《英语自学考试大纲》编写的,供参加全国高等教育自学考试各个专业公共类英语考试的专科段(上册)和本科段(上、下册)考生使用的全国统一教材。为了帮助广大考生更好地学习这套教材,顺利通过公共英语自学考试,我们针对自学考试的特点,紧扣教材,精心编写了《大学英语自学教程疑难详释与题解》这本指导书。
  • 舌尖上的英语

    舌尖上的英语

    本书由我们的资深专业外教团队,秉承只做经典英语口语理念,倾力打造最纯正、最精美、最有味道的美食英语口语。每一个对话片段,都是真实的美食英语场景,每一句话,都是经典口语句。
  • 英语PARTY——爱的港湾

    英语PARTY——爱的港湾

    本套书籍带你领略英语世界风景,感悟英语学习氛围,有助于英语学习。
  • 有一种爱叫放手

    有一种爱叫放手

    按部就班做好阅读计划,才能有效地学习。每天花10分钟诵读一篇文章,学4个单词、3个句型、2个词组,30天就能提升英语能力。记住,别忘了大声诵读哦!
  • 英语口语900句袋着走

    英语口语900句袋着走

    全书分为五大主题,120个话题,涉及校园、生活、工作、娱乐、旅行等老外从早到晚都在说的各方面内容。每一部分所包含的版块如下:经典句子 收集了跟生活场景相关的最经典实用的英语单句,掌握这些句子,为说出流畅的口语做好准备,夯实基础。实用对话 把每一个话题以现场交流对话的方式直观表达出来,让你觉得学英语不再枯燥、无聊!地道的表达,鲜活的语言,再现老外真实的生活场景。文化加油站  该部分包含英美文化、心灵鸡汤、名人演讲、名人访谈录等。浓缩经典,汇聚百态,在学习英语的同时增长见识,开阔眼界,提升自我。
热门推荐
  • 裸地

    裸地

    《裸地》是女作家葛水平的第一部长篇小说,讲述从清末民初到“土改”这一动荡的历史时期山西省暴店镇的移民史和盖氏家族的兴衰史。作品以一个家族的兴衰和一个女人的命运变迁展示了解放前几十年太行山区的沧桑巨变。小说关注人的生存的艰难、农民与土地,细腻展示了人在生命之茧中煎熬的沉痛历程和绽放的人性美,从一个侧面表达了对生命内涵的理解。同时对人性进行了多层次、多角度的刻画和挖掘。《裸地》时间跨度较大,讲述从清末民初到土改这一动荡的历史时期山西省暴店镇的移民史和盖氏家族的兴衰史。山东人聂广庆因天灾,家破人亡逃荒到山西,半路捡了个老婆女女在河蛙谷安家。暴店镇富户盖运昌娶了四房老婆只得了一个傻儿子,诺大的家业无人继承,香火无以延续,生平的愿望就是有女人给自己生一个带锤锤的。他看上了女女,和聂广庆签了典妻合约,女女就带了儿子到盖家做针娘。盖运昌和女人的相遇成就了一段姻缘,他看到生命的孕育,劳作的意义,然而,土地给了人养分、人却对它万般的蹂躏:到最后,也只能是土地裸露着,日子过去了。
  • 向您宣誓

    向您宣誓

    故事起源于一个梦,梦中群山环绕,巨龙飞舞,白金的旗帜在纯白的塔林上空升扬。英雄立于荆棘的王座,万民为之欢呼沸腾,而我仰望您的身姿,向您宣誓!执吾之剑,为汝开疆辟土!瓦锡兰第四纪元,一个小女孩从死人堆中苏醒.......————————————————————唯一书友群571930264
  • 水墨丹青凤凰城

    水墨丹青凤凰城

    凤凰城中,凤凰花开;凤凰树下,她手执洞箫,一曲“水墨丹青凤凰城”俘获了凤凰城中无数贵族子弟的心,也俘获了他——凤凰国将军陈照溪的心。可惜情深,最终缘浅,他早已经有了妻室儿女,而那一场婚礼,也是因为一个美丽却无法改变的错误。他奉国王之命,画作凤凰城,他的画作已成,她却知道真相后伤心离去。国主东方璧展开画卷,看到了凤凰树下的她,惊觉这个早已经名动凤凰城的女子,竟然是自己在战乱中跳崖的妻子。
  • 今冬不大寒(年年今日之大寒篇)

    今冬不大寒(年年今日之大寒篇)

    [花雨授权]绑架?做客?既然好吃好住又好玩,她就当是做客吧!只是那个男人怎么会以为她想“永久居住”呢?不、不,他只是找到真爱罢了。只是,当一片真心被她丢弃在脚下的时候,他不但没了情感,连理智都没了——
  • 美人救夫

    美人救夫

    新婚之夜,夫君暴毙。道士称:“七七四十九天,若能追回你家相公的魂魄,便能重续阳缘。”夫魂泣:“娘子!救我!”笑笑怒:“夫君!都跟你说了——不——要——怕!”美男?和尚?妖怪?统统跟在本娘子的屁股后面尽情地奔跑吧!
  • 校园噩梦:你,是我的了

    校园噩梦:你,是我的了

    深长的走廊上传来脚步声,一女生走过来敲门,突然一个清脆的声音:“谁呀!来了!”探出头来,做了个卖萌的样子:“哦!原来是安心仪啊。”“不是我你以为是谁”接着:“我这次是来下挑战的”这时安心仪有种说不出的气场。“什么?挑战?”锦倾疑问的问道(与安心仪对话的叫杨妙),锦倾本来就有一种萌萌的感觉,这时更感到萌翻了>_<“锦倾!你太NO了!”
  • 日本外交与中日关系

    日本外交与中日关系

    《日本外交与中日关系》围绕战后的日本外交、对外政策和主要对外关系进行分析和研究,包括战后20世纪50年代日本所确立的所谓“日美基轴外交”、“联合国中心外交”和“亚洲一员外交”,以及日本对东南亚外交、对朝鲜半岛外交和对苏(俄)外交等内容,从中可以看出战后日本外交的主要脉络及特点。作者对战后各个时期的中日关系和目前中日关系中仍然存在的一些问题作了深入而全面的介绍和分析评价。
  • 老婆你今天穿马甲了吗

    老婆你今天穿马甲了吗

    充满阴谋的商场,甜腻的夫妻生活凶猛的丈夫,娇羞的娇妻一个搞房地产,一个搞电商。一个开保龄球馆,一个开餐馆。一个玩赛车,一个玩直播生活乐趣多马甲让你摸不透
  • 三言二拍-醒世恒言四

    三言二拍-醒世恒言四

    《醒世恒言》,白话短篇小说集。明末冯梦龙纂辑。始刊于1627年(明天启七年)。其题材或来自民间传说,或来自史传和唐、宋小说。除少数宋元旧作外,绝大多数是明人作品,部分是冯氏拟作。编撰者创作成分较多。内容修饰润色较精,形象鲜明,结构充实完整,描写细腻,不同程度反映了当时的社会面貌和市民思想感情。但有些作品带有封建说教、因果报应宣传和色情渲染。
  • 步止朝阳

    步止朝阳

    老师明明白白的告诉我,朝中局势,若让她文治再有所成,会引来杀身之祸。那是我唯一一次不听老师的话,我想和玄阳一起看尽天下名书,游尽天下名山。想和她听老师讲故事,看太阳东升西落。世事无常,白云苍狗,人于天地,虽沧海桑田一瞬间,但我愿意做一只唯被她看透的蜉蝣。在她身边,我有自己永恒的快乐,那是老师说的道。只可惜,我该忍住的,我害了玄阳。我的快乐,我的喜欢,我的爱,害了玄阳。