Lezione 2 Cenni Storici Sviluppo Di Software Sicuro (9 CFU), LM Informatica, A

Total Page:16

File Type:pdf, Size:1020Kb

Lezione 2 Cenni Storici Sviluppo Di Software Sicuro (9 CFU), LM Informatica, A Lezione 2 Cenni storici Sviluppo di software sicuro (9 CFU), LM Informatica, ! ! 2"2"#2"2$ Dipartimento di Scienze Fisic&e, Informatiche e Matematiche Universit' di Modena e Re))io *milia http+##we,la,!ing!unimore!it/people#andreolini#didattica#sviluppo-software-sicuro 1 Quote of t&e da/ (Meditate, )ente, meditate!!!) “If history repeats itself, and the unexpected always happens, how incapable must Man be of learning from experience.” 0eor)e Bernard S&aw (1234 – 193") Scrittore, drammatur)o, lin)uista, critico musicale utore de “Il Pigmalione8 2 Sir John mbrose Fleming (12:9-$9:3) (;he electrical en)ineer and ph/sicist) Inventore, in)e)nere, radiotecnico, elettrotecnico! Inventore del diodo e della valvola termoionica! Consulente (fra le altre) della Marconi <ireless ;ele)rap& Compan/! 3 Jo&n Nevil Mas>el/ne ($2?9-$9$@) (;he ma)ician) Mago. Inventore del ,agno pu,,lico 6a )ettone8! Fondatore del 6Comitato Occulto8 (antesi)nano dellBodierno CIC 7)! 1903: Mas>elyne rovina una dimostrazione pu,,lica del tele)rafo 6sicuro8 senza Cli (svolta da Flemin))! (iesce ad inviare insulti in codice Morse!.. 4 Eni)ma (1924) (;&e encr/ption#decr/ption machine) Macc&ina elettro-meccanica usata per cifrare e decifrare messa))i! Usata dalla <e&rmac&t durante la Seconda Guerra Mondiale! Considerata indecifrabile per lun)o tempo! 5 rthur Scher,ius (12@2-$929) (LBinventore di *nigma) In)e)nere tedesco! 1918: ,revetta Eni)ma (macc&ina cifrante ,asata su rotori)! 1926: la Marina Militare tedesca adotta una variante di Eni)ma per le sue comunicazioni cifrate! 6 LBEnigma militare (LBinventore di *nigma) Uso di un pannello di controllo ag)iuntivo (detto 6plu),oard”) per offuscare ulteriormente il processo di cifratura. 7 1om,a >r/ptologiczna (19?2) (Macchina in )rado di decifrare la prima versione di *nigma) 1932: studio teorico condotto da polacc&i 6rompe8 lBalgoritmo di Eni)ma! Inizia il progetto di una macc&ina 6calcolatrice8 in )rado di rompere rapidamente il codice se)reto criptato da Eni)ma. → 6rapidamente8 poic&E i codici di Enigma venivano cambiati ogni )iorno! 8 1om,a >r/ptologiczna (19?2) (Macchina in )rado di decifrare la prima versione di *nigma) 1932-1937: costruzione ed evoluzione di una macc&ina calcolatrice (6,om,a crittolo)ica8) in )rado di ricostruire velocemente la posizione dei rotori di Eni)ma decifrare i messa))i prodotti da Enigma 1938: i polacc&i &anno una macc&ina calcolatrice in )rado di decifrare rapidamente il codice Eni)ma! 9 Marian ReFews>i (19"3-$92") (LBautore dello studio teorico del $9?2G il coautore di 61omba”) Matematico e critto)rafo! 1929: durante )li studi universitari a 7oznam, se)ue un corso se)reto di crittograCa presso lo Stato Mag)iore polacco! 1932: viene assunto dallBUHcio CrittograCco dellBesercito polacco! %opo poc&e settimane individua e rompe il primo algoritmo di Eni)ma! 10 I coautori dello studio del 19?2 (Henr/> J/)als>i e 9erz/ (oz/c>i) Ienr/> Z/)alski 9erzy (oz/c>i ($9"2-$9@2) ($9"9-$9:2) 11 *voluzione di Enigma (19?2-$9?9) (Macc&ina in )rado di decifrare la seconda versione di *nigma) 1938-1939: i nazisti cam,iano la struttura di Eni)ma. .uattro rotori al posto di tre Una plu),oard a))iuntiva c&e fun)e da rotore → La ,om,a crittologica non K piL in )rado di decifrare i messa))i in maniera rapida! 12 Un incontro importante (19?9-$9:2) (I polacc&i condividono le loro conoscenze con inglesi e francesi) Lu)lio 1939: cinMue settimane dopo lBinvasione della 7olonia da parte dei nazisti, Rejews>i ed i suoi colle)&i presentano i loro studi ai colle)&i francesi ed in)lesi! 1939-1942: i polacc&i, costretti allBesilio in Francia, colla,orano con i loro colle)&i francesi! 13 Il progetto di Bombe (19?9) (Macc&ina in )rado di decifrare la seconda versione di *nigma) 1939: a 1letc&ley 7ar> viene completato il pro)etto di 6Bom,e8, una nuova macc&ina calcolatrice con lBobiettivo di rompere nuovamente Eni)ma. 14 LBevoluzione di Bombe (19:"-$9::) (Macc&ina in )rado di decifrare la seconda versione di *nigma) 1940: primo prototipo in )rado di rompere Eni)ma classico! 1941: scoperta di Eni)ma a Muattro rotori ()razie ad errori commessi dai nazisti)! Invio di messa))i con il Muarto rotore in posizione sba)liata (einvio de)li stessi messa))i con il Muarto rotore in posizione corretta 15 LBevoluzione di Bombe (19:"-$9::) (Macc&ina in )rado di decifrare la seconda versione di *nigma) 1942: rottura del cifrario Eni)ma a Muattro rotori! Uso di un metodo di attacco alternativo: Known Plaintext Attac ! Si assume noto il testo in c&iaro corrispondente ad una porzione di testo cifrato! Si prova a rompere il cifrario con Muesta informazione a))iuntiva! → pproccio molto più efficiente della bomba crittologica polacca, c&e operava a forza bruta! 16 Colossus (19::) (LBevoluzione di *nigma) 7rimo calcolatore di)itale ,ritannico. *voluzione di Bom,e! Usato inizialmente per rompere il cifrario di Lorenz! Cifrario 6classificato8 dei nazisti 7rogramma,ile mediante switc&. Autput su telescrivente! ntesi)nano dei moderni calcolatori. 17 lan ;uring ($9$2-$93:) ((ompe *nigma per la seconda volta, fra le tante altre cose!!!) Matematico! Criptoanalista! 7ioniere dell’Informatica moderna! 1939: costruisce “Bom,e8! 1om,e K inizializzata con messag)i cifrati il cui contenuto in c&iaro K noto! 1944: costruisce 6Colossus8, prototipo del primo calcolatore moderno! 18 0ordon <elchman (19"4-$923) (Il 6capo8 di ;uring) Matematico! Criptoanalista! 7rofessore Universitario! Capo dell’unità di cifratura nellBIut 8 (dove lavora ;urin))! 19 Harold 6%oc8 Neen ($29:-$9@?) (Il costruttore di 1ombe) In)e)nere! 7rogetta e costruisce Bom,e! 20 (ené Carmille (1224-$9:3) (7recursore de)li 6ethical hacker”) Revisore dei conti militare, esperto di sc&ede perforate! 6 )ente doppio8 durante la Resistenza francese! 6Sa,otatore etico8 del meccanismo di censimento automatico de)li e,rei operato dai nazisti nella Francia occupata. lterazione delle sc&ede perforate! (iprogrammazione delle macc&ine perforanti. 21 MI; ;ech Model Railroad Clu, (;he wellspring of &ac>er culture) Circolo di modellismo ferroviario del MI; (1946-)! Mem,ri+ professori, studenti, appassionati di modellismo! 7assione condivisa: capire la natura delle cose e saperla controllare in modo creativo! → 6Iac>in)8! 22 6Uncle8 John McCart&/ (192@-2"$$) (7ioniere dellB I, creatore del LIS7) Matematico! 7ioniere dellBInformatica moderna. Inventore del termine 6Intelli)enza rtiCciale8! Inventore del lin)ua))io LISP! 7rogettista del lin)ua))io lgol! 7recursore del time-s&arin)! Mem,ro del MIT ;ec& (ailroad Clu,! 23 9ac> %ennis (19?$-) (7adre di MUL;ICS, nonno di U=IX, bisnonno di 0=U#LinuP) 1964: Coinventore del SO MUL;ICS (con Cor,ato e Fano)! 67adre8 di U=IX (a sua volta 6padre8 di 0=U/LinuP)! Mem,ro del MIT ;ec& (ailroad Clu,! Jac> Fernando (oberto %ennis 9! Corbato Mario Fano ($9?$-) (1924-) (19$@-2"$4) 24 7eter Deutsch (19:4-) (Padre di Smalltal>, nonno di (u,/) Informatico! 1963: autore del LISP 1.5 per 7%7-$! 1972: creatore del primo compilatore 9I; (Smalltalk)! Smalltalk → 6nonno8 di Ru,/! 1988: creatore di 0&ostscript! utore di diversi (FC IE;F! Mem,ro del MIT ;ec& (ailroad Clu,! 25 lan Kotok (19:$-2""4) Informatico! (;&e Crst true hacker) 1960: coautore del primo video)ioco (SpacewarQ) con Steve (ussell! 1994: fonda il <3C! Mem,ro del MIT ;ec& (ailroad Clu,! 7resenta ai suoi colle)&i il computer ;O-0, con cui ci si divertiva la notte!!! lan Steve → Spostamento dai trenini ai Noto> (ussell computer!!! (19:$-2""4) (19?@-) 26 ;O-" (Il computer che ispirer' i 7%7) 1955: computer progettato al MIT! 1asato su transistor! 7rocessore a 12 ,it. Spazio indirizzi a 14 bit! :NB di memoria a nuclei di ferrite! Il primo computer usato dagli 6&ac>er8 del MIT ;ec& (ailroad Clu,! 1961: %EC sempliCca il pro)etto del ;O-0 e produce il 7%7-$! 27 (ichard Greenblatt (19::-) 7rogrammatore! (;&e Crst computer &ac>er) 1962: scrive un compilatore Fortran per il 7%7-1, in modo da poter ese)uire un pro)ramma di controllo dei ,inari scritto per lBIBM 7090. 1969: scrive Incompati,le ;ime Sharin) S/stem, il SO usato al MI; CS IL, dove &a fondato la prima comunità &ac>er informatica! Mem,ro del MIT ;ec& (ailroad (ichard 0reenblatt 28 Clu,! ($9:$-) Josef Carl Engressia, Jr! (19:9-2""@) (Joybubbles, possibl/ t&e Crst modern phone phreaker) Laureato in Closofia! =on vedente, dotato del cosiddetto 6orecc&io assoluto8 (capacit' di riprodurre una nota esattamente)! 1956: scopre c&e, riproducendo un suono alla freMuenza di 2600Hz, K possi,ile attivare )li switc& telefonici ;R;, telefonando )ratis! 1971: viene inCne arrestato! 29 Il primo 6hac>8 malizioso (<ar dialin) sul 7%7-$ di Iarvard) 1963: il )iornale de)li studenti del MIT (;&e ;ec&) riferisce di una intrusione nel 7%7-1 di Iarvard, riprogrammato per scandire i numeri di telefono alla ricerca di altri calcolatori! → <ar dialin)! Lo sc&erzo porta ad una ,olletta telefonica astronomica per Iarvard! 30 %ivul)azione della prima vulnerabilit' (Aperata nel $943 da %avid Matt&ews per C;SS di I1M @"9:) 1965: %avid Matt&ews del MIT scopre un difetto nel SO C;SS (Compati,le ;ime Sharin) S/stem) su un I1M 7094. Se due utenti aprono lBeditor simultaneamente, i Cle delle password e del 6messa)e of the da/8 si scam,iano (QSQ)! → A)ni utente c&e si autentica vede tutte le password utente! 31 9ohn Draper (19:?-) (Captain Crunc&, phone phreaker ePtraordinaire) 7rogrammatore.
Recommended publications
  • Paradise Lost , Book III, Line 18
    _Paradise Lost_, book III, line 18 %%%%%%%%%%%%%%%%%%%%%%%% ++++++++++Hacker's Encyclopedia++++++++ ===========by Logik Bomb (FOA)======== <http://www.xmission.com/~ryder/hack.html> ---------------(1997- Revised Second Edition)-------- ##################V2.5################## %%%%%%%%%%%%%%%%%%%%%%%% "[W]atch where you go once you have entered here, and to whom you turn! Do not be misled by that wide and easy passage!" And my Guide [said] to him: "That is not your concern; it is his fate to enter every door. This has been willed where what is willed must be, and is not yours to question. Say no more." -Dante Alighieri _The Inferno_, 1321 Translated by John Ciardi Acknowledgments ---------------------------- Dedicated to all those who disseminate information, forbidden or otherwise. Also, I should note that a few of these entries are taken from "A Complete List of Hacker Slang and Other Things," Version 1C, by Casual, Bloodwing and Crusader; this doc started out as an unofficial update. However, I've updated, altered, expanded, re-written and otherwise torn apart the original document, so I'd be surprised if you could find any vestiges of the original file left. I think the list is very informative; it came out in 1990, though, which makes it somewhat outdated. I also got a lot of information from the works listed in my bibliography, (it's at the end, after all the quotes) as well as many miscellaneous back issues of such e-zines as _Cheap Truth _, _40Hex_, the _LOD/H Technical Journals_ and _Phrack Magazine_; and print magazines such as _Internet Underground_, _Macworld_, _Mondo 2000_, _Newsweek_, _2600: The Hacker Quarterly_, _U.S. News & World Report_, _Time_, and _Wired_; in addition to various people I've consulted.
    [Show full text]
  • Hacks, Leaks and Disruptions | Russian Cyber Strategies
    CHAILLOT PAPER Nº 148 — October 2018 Hacks, leaks and disruptions Russian cyber strategies EDITED BY Nicu Popescu and Stanislav Secrieru WITH CONTRIBUTIONS FROM Siim Alatalu, Irina Borogan, Elena Chernenko, Sven Herpig, Oscar Jonsson, Xymena Kurowska, Jarno Limnell, Patryk Pawlak, Piret Pernik, Thomas Reinhold, Anatoly Reshetnikov, Andrei Soldatov and Jean-Baptiste Jeangène Vilmer Chaillot Papers HACKS, LEAKS AND DISRUPTIONS RUSSIAN CYBER STRATEGIES Edited by Nicu Popescu and Stanislav Secrieru CHAILLOT PAPERS October 2018 148 Disclaimer The views expressed in this Chaillot Paper are solely those of the authors and do not necessarily reflect the views of the Institute or of the European Union. European Union Institute for Security Studies Paris Director: Gustav Lindstrom © EU Institute for Security Studies, 2018. Reproduction is authorised, provided prior permission is sought from the Institute and the source is acknowledged, save where otherwise stated. Contents Executive summary 5 Introduction: Russia’s cyber prowess – where, how and what for? 9 Nicu Popescu and Stanislav Secrieru Russia’s cyber posture Russia’s approach to cyber: the best defence is a good offence 15 1 Andrei Soldatov and Irina Borogan Russia’s trolling complex at home and abroad 25 2 Xymena Kurowska and Anatoly Reshetnikov Spotting the bear: credible attribution and Russian 3 operations in cyberspace 33 Sven Herpig and Thomas Reinhold Russia’s cyber diplomacy 43 4 Elena Chernenko Case studies of Russian cyberattacks The early days of cyberattacks: 5 the cases of Estonia,
    [Show full text]
  • Computer and Network Security CS 215 © Denbigh Starkey
    Computer and Network Security CS 215 © Denbigh Starkey 1. Introduction 1 2. Hackers 1 3. Phreaks 4 4. Software Security 6 5. Network Security 8 1. Introduction I’ve already covered some of the topics that fall into this category in my notes on malicious acts. In particular I’ve discussed viruses and related issues. I’ll get into a bit more detail here on these topics, but will mainly concentrate on other issues like hackers and phreaks. 2. Hackers Hacking used to be considered an ethical profession, but then some hacking groups like the Legion of Doom, whose only goals were negative, changed the connotations of the name to where it is now almost universally thought of as a very negative term. Possibly, however, things might change back, since I have just got a new book called Hands-On Ethical Hacking and Network Defense. Ethical hacking describes is how we first thought of the hacking community before it got corrupted. Levy’s hacker ethic, which was the moral code for hackers, had six principles: 1. Access to computers – and anything which might teach you something about the way the world works – should be unlimited and total. Always yield to the Hands- On Imperative. 2. All information should be free. 3. Mistrust Authority – Promote Decentralization. 4. Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position. 5. You can create art and beauty on a computer. 6. Computers can change your life for the better. So while the hacking code certainly implies lifestyle that is anarchistic in its underlying philosophy, it is not negative or destructive.
    [Show full text]
  • Building Hacker Collective Identity One Text Phile at a Time: Reading Phrack
    Media History Monographs 11:2 (2008-2009) ISSN 1940-8862 Building Hacker Collective Identity One Text Phile at a Time: Reading Phrack Brett Lunceford University of South Alabama Research concerning computer hackers generally focuses on how to stop them; far less attention is given to the texts they create. Phrack, an online hacker journal that has run almost continuously since 1985, is an important touchstone in hacker literature, widely read by both hackers and telephone and network security professionals. But beyond its instantiation as a compendium of illicit technical knowledge, Phrack was, above all, a rhetorical publication. The files in each issue of Phrack created a shared rhetorical vision concerning the place of the hacker underground within society and in relation to law enforcement officials, as well as what it means to be a hacker. This essay examines two important events in the evolution of the hacker movement through the lens of Phrack—Operation Sundevil and the arrest of Kevin Mitnick. How these events were framed in Phrack both shaped and reflected emerging shifts in hacker collective identity. ©2009 Brett Lunceford Media History Monographs 11:2 Lunceford: Reading Phrack Building Hacker Collective Identity One Text Phile at a Time: Reading Phrack Stephen Segaller describes the formation of Managers that Helps Protect Corporate Data the Internet as “one of the twentieth century’s from Assaults by the Hackers” and “The most productive accidents,” explaining that the World of Data Confronts the Joy of Hacking,” “seeds of the Internet were planted by the U.S. which begins, “The recent electronic government in the wake of nationwide concern escapades of a group of Milwaukee youths over the Soviet launch of Sputnik.”44 Hackers have brought national attention to the growing were an integral part of the construction of this problem of computer security,”47 demonstrate network.
    [Show full text]
  • Evolution of Cyber Security Invotra
    Evolution of cyber security Invotra Digital Workplace, Intranet and Extranet 700 bc Scytale used by Greece and Rome to send messages And kids ever since.. Image Source: https://commons.wikimedia.org/wiki/File:Skytale.png 1467 Alberti Cipher was impossible to break without knowledge of the method. This was because the frequency distribution of the letters was masked and frequency analysis - the only known technique for attacking ciphers at that time was no help. Image Source: https://commons.wikimedia.org/wiki/File:Alberti_cipher_disk.JPG 1797 The Jefferson disk, or wheel cypher as Thomas Jefferson named it, also known as the Bazeries Cylinder. It is a cipher system using a set of wheels or disks, each with the 26 letters of the alphabet arranged around their edge. Image Source: https://en.wikipedia.org/wiki/Jefferson_disk#/media/File:Jefferson%27s_disk_cipher.jpg 1833 Augusta Ada King-Noel, Countess of Lovelace was an English mathematician and writer, chiefly known for her work on Charles Babbage's proposed mechanical general-purpose computer, the Analytical Engine. She is widely seen as the world's first programmer Image Source: https://commons.wikimedia.org/wiki/File:Ada_Lovelace_portrait.jpg 1903 Magician and inventor Nevil Maskelyne interrupted John Ambrose Fleming's public demonstration of Marconi's purportedly secure wireless telegraphy technology. He sent insulting Morse code messages through the auditorium's projector. Image Source: https://en.wikipedia.org/wiki/Nevil_Maskelyne_(magician)#/media/File:Nevil_Maskelyne_circa_190 3.jpg 1918 The Enigma Machine. It was developed by Arthur Scherbius in 1918 and adopted by the German government and the nazi party Image Source: https://commons.wikimedia.org/wiki/File:Kriegsmarine_Enigma.png 1932 Polish cryptologists Marian Rejewski, Henryk Zygalski and Jerzy Różycki broke the Enigma machine code.
    [Show full text]
  • Table of Contents
    Cyber Times International Journal of Technology & Management Vol. 10 Issue 2, April 2017 – September 2017 TABLE OF CONTENTS 1. Evolution and Shift in Trend of Cyber Crime: An Overview 01 Ratikant Sadananda Mohanta 2. Cyber Security: A Boon to success Digital India 05 Rohini P. Lokare & Jyoti Maske 3. Fractal Compressed Image Hiding Technique in DCT domain 11 Pournima Jungle 4. Study of Automation Testing benefits and Limitations 15 Prafulla Kumbhar 5. Data Mining for Security Applications 19 Asmita R Namjoshi 6. Security Framework for IOT: A Review 25 Minal D. Kalamkar EVOLUTION AND SHIFT IN TREND OF CYBER CRIME: AN OVERVIEW Ratikant Sadananda Mohanta Student, Tilak Maharashtra Vidhyapeeth [email protected] ABSTRACT Cybercrime in general is any criminal activity which involves computers and networks. As technology has progressed, cost of technology has decreased thus connecting more and more people together. Though it has reduced the gap of communication it has also led to increase in Cybercrime incidents. The change in technology has brought forth a new face of Cybercrime, not just sheer increase in number of incidents. Cybercrime sums up various crimes such as Cyber Stalking, Internet frauds, Spreading Malwares, Spamming, Cyber- warfare, Identity theft, Phishing, Child Pornography, etc. Cybercrime which started as hacking activities of a few university graduates in early seventies has come a long way. With existence of market place such as Silk Road, where one can purchase various banned drugs and illegal weapons, Stuxnet a multistage malware, etc. one can say for sure that Cybercrime has evolved to an extent beyond ones belief. The main objective of this paper is to show case how Cybercrime has evolved and bring forth it’s ever changing nature.
    [Show full text]
  • The Day of the Cyber Wolf
    Regis University ePublications at Regis University All Regis University Theses Fall 2014 The aD y of the Cyber Wolf Ryan K. Buch Regis University Follow this and additional works at: https://epublications.regis.edu/theses Part of the Criminology and Criminal Justice Commons Recommended Citation Buch, Ryan K., "The aD y of the Cyber Wolf" (2014). All Regis University Theses. 210. https://epublications.regis.edu/theses/210 This Thesis - Open Access is brought to you for free and open access by ePublications at Regis University. It has been accepted for inclusion in All Regis University Theses by an authorized administrator of ePublications at Regis University. For more information, please contact [email protected]. Regis University College for Professional Studies Graduate Programs Final Project/Thesis Disclaimer Use of the materials available in the Regis University Thesis Collection (“Collection”) is limited and restricted to those users who agree to comply with the following terms of use. Regis University reserves the right to deny access to the Collection to any person who violates these terms of use or who seeks to or does alter, avoid or supersede the functional conditions, restrictions and limitations of the Collection. The site may be used only for lawful purposes. The user is solely responsible for knowing and adhering to any and all applicable laws, rules, and regulations relating or pertaining to use of the Collection. All content in this Collection is owned by and subject to the exclusive control of Regis University and the authors of the materials. It is available only for research purposes and may not be used in violation of copyright laws or for unlawful purposes.
    [Show full text]
  • Page 1 of 3 12.1.2004
    Page 1 of 3 ==Phrack Inc.== Volume Two, Issue 23, File 2 of 12 ==Phrack Pro-Phile XXIII== Created and Written by Taran King Done on January 18, 1989 Welcome to Phrack Pro-Phile XXII. Phrack Pro-Phile was created to bring information to you, the community, about retired or highly important/ controversial people. This issue, we bring you a user and sysop having great contributions through his boards, articles published, and general phreak/hack activity... The Mentor ~~~~~~~~~~ Handle: The Mentor Call Him: Loyd Past Handles: An article for Phrack written as The Neuromancer for (then present) security reasons. Handle Origin: The Grey Lensman series by E.E. 'Doc' Smith Date Of Birth: 1965 Current Age: 23 Height: 5' 10" Weight: 200 lbs. Eye Color: Brown Hair Color: Brown Computers: (In order of owning...) TRS-80, Apple //e, Amiga 1000, PC/AT Sysop: The Phoenix Project (512-441-3088) Origins in Phreak/Hack World: When he was 13, a friend's father who was a professor at a local university gave him accounts to use on one of the PDP 11/70s at the school. This was his first introduction to mainframes, and he was hooked. He continued to use the University's equipment through junior high and high school, upgrading to a DEC-10 and then finally a VAX 8600. Needless to say, since he wasn't a student, acquiring accounts to use was sometimes tricky, so he began to write fake front ends, trojan horses, and other hacker utilities. Loyd's interest in hacking grew from this to the point where he wanted to get into *everything* instead of just his local systems.
    [Show full text]
  • Cybersecurity Cybersecurity
    Issue: Cybersecurity Cybersecurity By: Pat Wechsler Pub. Date: February 1, 2016 Access Date: September 27, 2021 DOI: 10.1177/237455680203.n1 Source URL: http://businessresearcher.sagepub.com/sbr-1775-98146-2715384/20160201/cybersecurity ©2021 SAGE Publishing, Inc. All Rights Reserved. ©2021 SAGE Publishing, Inc. All Rights Reserved. Can businesses protect themselves from computer crime? Executive Summary As fast as Internet use has grown over the past two decades, so too has the cybersecurity challenge for businesses and governments that are fighting to keep their data and networks safe from intruders. Today, they face an unprecedented assault from a powerful global army of sophisticated, well-organized and well-financed hackers who vigilantly seek vulnerabilities to exploit. In the past couple of years alone, these shadowy figures have stolen personal information on hundreds of millions of U.S. customers and employees and have cost enterprises close to $500 billion. With each new device or product connected to the Internet, the possibility of hackers wreaking economic chaos has grown. Despite the mounting threat, most enterprises have failed to implement the kind of rigorous security protocols necessary to keep out even low-tech efforts to penetrate networks. Among the questions being debated: Are companies responding adequately to cybercrime? Should the United States encourage American companies to “hack back” when they think they've been hacked? Can information sharing between businesses and government help fight cybercrime? Overview Larry Ponemon, who has counseled companies for years on how to protect their data and computer systems, remembers a cybersecurity presentation he made not long ago to a major technology company on areas of risk.
    [Show full text]
  • Capítulo Quinto El Hacktivismo Como Estrategia De Comunicación: De
    Capítulo quinto El hacktivismo como estrategia de comunicación: de Anonymous al cibercalifato Manuel R. Torres Soriano Resumen El propósito de este capítulo es analizar cómo el hacktivismo ha sido emplea- do por individuos y organizaciones como una eficaz estrategia de comunica- ción. Se presta una especial atención a dos manifestaciones particulares: el hacktivismo yihadista y el antisistema. El propósito de ambos estudios de caso es analizar las dinámicas organizativas de estos movimientos. Se parte de la tesis de que el principal reto al que tiene que enfrentarse el hacktivis- mo (particularmente el de carácter delictivo) no es tanto la viabilidad de sus operaciones sino cómo conciliar su vertiente colectiva con la individualidad de sus miembros. Palabras clave Internet, ciberseguridad, medios de comunicación, privacidad, propaganda. Abstract The purpose of this chapter is to analyze how hacktivism has been used by in- dividuals and organizations as an effective communication strategy. Particu- lar attention is paid to two particular manifestations: Jihadist and anti-system hacktivism. The purpose of both case studies is to analyze the organizational 197 Manuel R. Torres Soriano dynamics of these movements. The starting point is the thesis that the main challenge facing hacktivism (particularly that of a criminal nature) is not so much the viability of its operations, but how to reconcile its collective side with the individuality of its members. Keywords Internet, cybersecurity, media, privacy, propaganda. 198 El hacktivismo como estrategia de comunicación: de ... Introducción A comienzos de 2010, la secretaria de Estado norteamericana Hillary Clinton presentó la Internet Freedom1 como uno de los ejes de la política exterior de su país.
    [Show full text]
  • Open Bartels.Thesis.Final.Pdf
    THE PENNSYLVANIA STATE UNIVERSITY SCHREYER HONORS COLLEGE COLLEGE OF INFORMATION SCIENCES & TECHNOLOGY TRUTH, JUSTICE, AND THE INTERNET WAY: SECURITY IMPLICATIONS OF THE ONLINE ACTIVIST MOVEMENT ELIZABETH BRENNAN BARTELS Spring 2012 A thesis submitted in partial fulfillment of the requirements for baccalaureate degrees in Security and Risk Analysis and Information Sciences and Technology with honors in Security and Risk Analysis Reviewed and approved* by the following: Gerald Santoro Senior Instructor of Information Sciences and Technology Assistant Professor of Communications Arts and Sciences Thesis Supervisor Peng Liu Director, Cyber Security Lab Director, LIONS Center Professor of Information Sciences and Technology Honors Adviser * Signatures are on file in the Schreyer Honors College. ABSTRACT The Internet revolution has led to the development of a parallel culture where the rules are different. Existing in a purely digital form, this cyber-culture has nurtured its own social systems that parallel social systems in the 'real' world. One important example, the hacker activist, or hacktivist, has emerged as a very real and growing threat to the confidentiality, integrity and availability of information and communication systems worldwide. This thesis examines the phenomenon of hacktivism to reveal its methods, motivations, and implications for cybersecurity professionals. i TABLE OF CONTENTS List of Figures ........................................................................................................................ iii
    [Show full text]
  • History of Computer Crime”  Notorious Worms and Viruses M
    Topics Why study historical records? History of Trends 1960s / 70s – Sabotage Computer Crime Impersonation Phone Phreaking Data Diddling CSH6 CSH6 Chapter 2 Logic Bombs Chapter 2 Trojan Horses “History of Computer Crime” Notorious Worms and Viruses M. E. Kabay Spam Denial of Service With supplemental updates Hacker Underground Recent Developments 1 Copyright © 2014 M. E. Kabay. All rights reserved. 2 Copyright © 2014 M. E. Kabay. All rights reserved. Why study historical Trends records? Early days: sabotage, disgruntled/dishonest Common body of knowledge employees Distinguish amateurs from professionals Physical damage prominent threat until 1980s Shared history of significant events Unauthorized access common What has shaped development of field Telecommunications subversion popular in 1960s/70s Understand references from senior people Malicious software developed in 1980s Put new events and patterns into perspective Fax-based fraud developed in 1980s (4-1-9) Growth of Internet multiplied threats Financial crime mediated by computers & networks grew in 1990s New malware types developed in 1990s Illegitimate uses of e-mail spawned spam, phishing, 4-1-9 e-mail fraud 3 Copyright © 2014 M. E. Kabay. All rights reserved. 4 Copyright © 2014 M. E. Kabay. All rights reserved. Rough Guesses About 1960s / 70s – Sabotage Sources of Damage to IT Before 1993 Computers can be tools and targets of crime Also repositories of evidence 1969.02 – fire in computer center during student riot in Montréal, Québec, Canada Sir George Williams University (now Concordia) $2M damages & 97 people arrested After 1993 In 2001, survey by Novatech showed ~¼ of all computers had been physically assaulted by owner (4,200 respondents) MORAL: remember this fuzzy graph and don’t trust precise statistics about computer crime! 5 Copyright © 2014 M.
    [Show full text]