登陆注册
3765300000077

第77章 Computer Security(7)

Who wants to harm computer systems and computer users’? As you’ll see, a surprising variety of people can cause security problems, ranging from people with too much time on their hands to hardened criminals, such as the Russian intruders who recently made off with $ 10 million from Citibank. Motives vary, too. Some attackers are out for ego gratification and don’t intend any harm. Others ate out for money; others are on a misguided crusade, and still others are just plain malicious.

Tile variety of attackers is a problem in itself. When intruders try to break into a system, administrators can’t be sure initially where the problems coming from. In 1998, U.S. Defense Department computers were besieged during a Gulf military action, and newspapers jumped to the conclusion that the attacks originated in Iraq and were intended to stymie tile military’ s activities. The culprits turned out to be two California boys under the direction of a teenage computer intruder in Israel!

The most celebrated intruders are computer hobbyists and computer experts, for whom unauthorized access is something of an irresistible intellectual game. The press tends to call all these hobbyists hackers, but this term is actually too broad. In this passage, you’ll learn better-focused terms to refer to computer users who try to break into computer systems.

Hackers are computer hobbyists who enjoy pushing computer systems (and themselves) to their limits. They experiment with programs to by to discover undocumented features, capabilities that aren’t mentioned in the systems’ manuals. They modify systems to obtain the maximum possible performance. And sometimes, they try to track down all the weaknesses and loopholes in a system’s security. When hackers attempt unauthorized access, they rarely damage data or steal assets. Hackers generally subscribe to an unwritten code of conduct, called the hacker ethic, which forbids the destruction of data. For hackers, unauthorized access is an intellectual diversion or game. (The people who have to secure systems against hacker attacks don’t think it’s a game.) Hacker motives include ego gratification:hackers form communities, with a pecking order defined in terms of an individual’s reputation for hacking prowess.

Crackers (also called black hats) are hackers who, like Darth Vader in George Lucas’s Star Wars trilogy, have turned to the “dark side.” They become obsessed (often uncontrollably) with gaining entry to highly secure computer systems. Like hackers, they generally do not intend to harm or steal data, but the frequency and sophistication of their attacks cause major headaches for system administrators. A Pentagon official has recently disclosed that the U.S. Department of Defense computer systems experience more than 1 000 detected unauthorized access attempts per day, and that as many as 96 percent of such attempts evade detection. Cracking appears to be one form of computer addiction: many crackers confess that they feel compelled to return to cracking even if they have made an effort to stop.

Like hackers, crackers are obsessed with their reputation in the hacking and cracking communities. To document their feats, they’ often leave calling cards, such as a prank message, on the systems they penetrate. Sometimes these traces enable law enforcement personnel to track down crackers.

Cyber gangs bring crackers together by means of the Internet and physical meetings. The group dynamics reinforce their immature and often destructive aims. Hackers and crackers can cause major headaches, but both should be distinguished from criminals who seek to steal money or valuable data by gaining unauthorized access to computer systems. However, anyone who tries to gain unauthorized access to a computer system is probably breaking one or more laws.

Computer virus authors, typically, are teenage males whose programming ability is much more developed than their ethical conscience. They want to see how far they can push the boundaries of virus software. Often, they see no harm in

what they are doing. They claim flint all technological progress is inevitable, and that somebody else would eventually create the programs they write. Most eventually stop writing viruses after they’re matured a bit and found something more worthwhile to do with their time.

Some virus authors appear to be motivated by a twisted moral crusade, specifically, a campaign to rid the world of Microsoft Corporation, which has long been detested by the hacker community. In the twisted logic of some virus authors, Microsoft deserves to be attacked because, they believe, its products fail to protect users adequately from computer security risks. However, their attacks have yet to harm Microsoft Corporation. Instead, they have penalized millions of innocent computer users, many of whom have suffered devastating losses of data.

More than a few hackers and crackers have turned pro, offering their services to companies hoping to use hacker expertise to shore up their computer systems’ defenses. (This practice is called ethical hacking, and those who undertake this type of hacking are called white hats.) And without doubt, some of them have crossed the line from hacking and cracking to intentional computer crime. This prospect sounds scary, but a far greater threat exists inside the organizations that house computer systems.

【New Words】

ego

自我,利己主义

malicious

怀恶意的,恶毒的

crusade

宗教战争,宗教改革

penetrate

穿透,渗透,洞察

twist

扭弯,扭曲,缠绕

pentagon

五角形,五边形

9.4 Security Breaches Types

同类推荐
  • 2016新题型大学英语四级听力突破

    2016新题型大学英语四级听力突破

    全国大学英语四六级考试委员会于2016年1月发布通知,自2016年6月起四六级考试听力部分题型有所调整。为帮助即将参加四级考试的考生备考,使考生了解各个题型所占比例及命题要求,提高应试技巧,我们以考试大纲为依据,按照新的考试题型题量和难度要求,搜集和整理了大量的素材,编写了针对六级听力新题型突破的考试用书。全书包含四个部分:命题要求及趋势分析、新题型样题解析及技巧、听力实战演练和附录。本书适用于大学英语四级考试的考生,也可供辅导教师及其他相关人员参考使用。
  • 诺桑觉寺(纯爱·英文馆)

    诺桑觉寺(纯爱·英文馆)

    《诺桑觉寺》,与其他五部奥斯丁的长篇不同,采用了公开的叙述者和外露的作者型的叙述声音,展现了作者权威。它是奥斯丁打算出版的第一部小说,定稿完成于1797年左右,即奥斯丁大概22岁的时候。在这部小说中,作者初露锋芒,文风初步成形,就是以“一个村镇上的三、四户人家”为生活背景,以极具讽刺的笔法叙述一个婚嫁故事。
  • 英语口语900句袋着走

    英语口语900句袋着走

    全书分为五大主题,120个话题,涉及校园、生活、工作、娱乐、旅行等老外从早到晚都在说的各方面内容。每一部分所包含的版块如下:经典句子 收集了跟生活场景相关的最经典实用的英语单句,掌握这些句子,为说出流畅的口语做好准备,夯实基础。实用对话 把每一个话题以现场交流对话的方式直观表达出来,让你觉得学英语不再枯燥、无聊!地道的表达,鲜活的语言,再现老外真实的生活场景。文化加油站  该部分包含英美文化、心灵鸡汤、名人演讲、名人访谈录等。浓缩经典,汇聚百态,在学习英语的同时增长见识,开阔眼界,提升自我。
  • 那些温暖而美好的名篇

    那些温暖而美好的名篇

    《我爱读好英文:那些温暖而美好的名篇》精选多篇经典名篇故事。经典是一种历久弥新的品味,名篇可以穿越时空,感动并激励不同时代的不同的人。我们需要经典的存在,带给我们的或沉静或激越的感觉,那是精神的寄托之处,也是心灵的滋养之地。《我爱读好英文:那些温暖而美好的名篇》内容丰富,文笔醇厚。不论是语言表达,还是故事内容,都堪称经典。具有极强的市场竞争力。同时,《我爱读好英文:那些温暖而美好的名篇》以双语形式编排推出,是人们学习英语的最佳读本。
  • 世界名牌大全(英汉双语版)

    世界名牌大全(英汉双语版)

    本书《世界名牌圣经》是中英文的对照白金版本,不仅给读者展现原汁原味的世界名牌,而且领略名牌风采的同时大幅度提高了英语水平和人生品质。本书根据中国人的喜好精心挑选了8大品类:尖端品牌、世界名表、品牌服装、化妆品、珠宝首饰、皮具、名酒、豪车系列。这8部分全是作者精挑细选出的世界名牌,每一个部分分为“品牌名片”、“品牌标志”、“品牌阅读”并附核心词汇。“品牌名片”一目了然列明名牌的品类、标志风格、创始人、诞生地、诞生时间;“品牌标志”展示名牌的商标;“品牌阅读”详细叙述名牌传奇、名牌经典之作等等。
热门推荐
  • 木叶之主宰万界

    木叶之主宰万界

    穿越到火影忍者世界,并得到了金手指,从此开始了穿越各个世界,从火影世界开始只为活下去而变强。穿越到了天行九歌、学园默示录、斩·赤红之瞳、二次元、小说、电影、电视剧,等影视位面,开始了自己的变强之旅。
  • 创世末路

    创世末路

    这片大陆,留给人们太多的痛苦。我曾在绝望中呐喊,却没人聆听。诞生于毁灭中的必将是毁灭者。于此刻起,我重归这片大陆,再次以手中之剑寻找真实......
  • 王小波小说全集:早期作品·唐人故事·似水柔情

    王小波小说全集:早期作品·唐人故事·似水柔情

    《王小波小说全集》收录王小波的所有小说,包括早期作品、唐人故事、似水柔情;黄金时代;白银时代、2010、黑铁时代;青铜时代。小说出入于历史、现实、未来,在不同时空中反思了权力和乌托邦带给人的伤害,小说奇特的想象和反讽的使用带有作者独特的印记。
  • 魔法大陆生活手札

    魔法大陆生活手札

    一个剑与魔法的大陆,时间的洪流中,她们,渺小又伟大。
  • 追妻无门:女boss不好惹

    追妻无门:女boss不好惹

    青涩蜕变,如今她是能独当一面的女boss,爱了冷泽聿七年,也同样花了七年时间去忘记他。以为是陌路,他突然向他表白,扬言要娶她,她只当他是脑子抽风,他的殷勤她也全都无视。他帮她查她父母的死因,赶走身边情敌,解释当初拒绝她的告别,和故意对她冷漠都是无奈之举。突然爆出她父母的死居然和冷家有丝毫联系,还莫名跳出个公爵未婚夫,扬言要与她履行婚约。峰回路转,破镜还能重圆吗? PS:我又开新文了,每逢假期必书荒,新文《有你的世界遇到爱》,喜欢我的文的朋友可以来看看,这是重生类现言,对这个题材感兴趣的一定要收藏起来。
  • 繁花盛开不及你

    繁花盛开不及你

    18岁那年的简瑶刚踏入大学校门,背着书包拖着行李,为梦想拼力一博,那年的席文在娱乐圈已经有一席之地,时年30岁。一切的相遇都是命中注定,这是宿命,改变不了的命运,只能背着信仰前行。受伤的心也只有温柔才能慰藉以安宁。如果真能把命交给彼此,那这世间之人之事也将再无所畏惧。爱,终究给了彼此披荆斩棘的力量。五年过后。再次看到热搜上挂着的两个人名后,席文淡定的让人撤了,转头就去找当事人。席文:“你准备什么时候给我个名份,简导,嗯?”简瑶拍了下他放在自己腰间的手:“你想要什么名份?”两人结婚证都领了只是没公开而已。席文:“不给名份也行,我们也是时候要个孩子了,毕竟……”简瑶被他骚扰的没法专心看剧本了,敷衍的应了一句:“毕竟什么?”席文:“毕竟现在还是质量最好的时候,生出来的孩子智商高。”简瑶:“……”两人相处久了有一个好处就是,对方说的话都能秒懂,尽管说的不全。骚不过某人只能被迫将造人计划提前了。
  • 大乘修行菩萨行门诸经要集

    大乘修行菩萨行门诸经要集

    本书为公版书,为不受著作权法限制的作家、艺术家及其它人士发布的作品,供广大读者阅读交流。汇聚授权电子版权。
  • 追妻无门:女boss不好惹

    追妻无门:女boss不好惹

    青涩蜕变,如今她是能独当一面的女boss,爱了冷泽聿七年,也同样花了七年时间去忘记他。以为是陌路,他突然向他表白,扬言要娶她,她只当他是脑子抽风,他的殷勤她也全都无视。他帮她查她父母的死因,赶走身边情敌,解释当初拒绝她的告别,和故意对她冷漠都是无奈之举。突然爆出她父母的死居然和冷家有丝毫联系,还莫名跳出个公爵未婚夫,扬言要与她履行婚约。峰回路转,破镜还能重圆吗? PS:我又开新文了,每逢假期必书荒,新文《有你的世界遇到爱》,喜欢我的文的朋友可以来看看,这是重生类现言,对这个题材感兴趣的一定要收藏起来。
  • 明卫

    明卫

    崇祯死后,清朝皇帝曾提出明亡于万历之说。不论是怎样的政治目的,由古至今,多少学者也都如此认为,提起万历皇帝大家都咬牙切齿,觉得是他昏庸无能毁坏了大明江山。真的是如此么?作者带你从另一个角度来看那万历四十八年。
  • 美人无双

    美人无双

    她是充入官妓的青倌,一朝穿上凤袍站于君王之侧,红颜不逊须眉,她和他并肩天下,生死相约。他是蛰伏在龙位的君王,一场宫廷之变,夙怨纠葛,寸寸斩断她和他薄弱的情分。他是景天的将军,一把贴身的匕首,是她不曾知道的渊源,身份之别,他和她皆是不能心存眷恋之人,无缘执手。。他是敌国最年轻的异性藩王,三年前的一张画,引出旧时孽缘,战戟南指,明目张胆的要她。。。红颜殇,江山固,万骨枯,狼烟尽,一场爱恨嗔痴,冷暖自知。。。。…【沂羽谷原创出品】