Hackers On the Computer Should Get Prosecuted
Download
Report
Transcript Hackers On the Computer Should Get Prosecuted
Mayling Nil
CIS 1055 Section 22
Practice of modifying computer hardware
Practice of modifying computer software
Most common among teenagers and young
adults
They enjoy programming and have expert
level skills in particular programs
Enjoys learning details of a programming
language
Enjoys doing the programming
Person capable of appreciating someone
else’s hacking
Person who pick up programming quickly
Person who is an expert in a particular
programming language
How to program
Get one of the open source Unixes
Learn how to use the internet and write HTML
Know functional English
1970s- Origins of Hacker Subculture
1980s- 1985 – All Fun and War Games
1985 – 1990 – Theft and Bugs
1990- Combating the Perceived Hacker
Threat
2000 – New Trends
Graph of Home Computers
Do Not Regularly Update Anti-Virus Software
Do Not Have Properly and Securely Configured Firewalls
Parents Do Not Use Parental Controls
Users Have Spyware Lurking on Home Computers
0%
20%
40%
60%
80%
100%
120%
Hackers’ computer equipment, modems and
storage devices should be taken away.
First offense
Second offense
Third offense
Guy Hacking Into Temple’s Network
"Facts/Statistics About Computer Security and Loss of Data."
Google Answers. 6 Feb. 2004. 8 Aug. 2008
<http://answers.google.com/answers/threadview?id=30430
8>.
Harvey, Brian. "What is a Hacker?" What is a Hacker? 8 Aug.
2008 <http://www.cs.berkeley.edu/~bh/hacker.html>.
Heaton, Jordana. "Hacker History." Hacker History. 8 Aug.
2008 <http://www.slais.ubc.ca/people/students/studentprojects/j_heaton/>.
Hinders, Dana. "What is Computer Hacking?" What is
Computer Hacking? 8 Aug. 2008
<http://www.wisegeek.com/what-is-computerhacking.html>.