Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Inozemna_mova.pdf
Скачиваний:
1144
Добавлен:
09.02.2016
Размер:
5.75 Mб
Скачать

Computers also offer great opportunities for extortion or malicious damage. It is relatively simple to insert a virus (or rogue program) into a computer, which will automatically be passed on to the software of other computers which have dealings with the infected network.

The damage to banks, insurance companies, mail order firms, and so on can be catastrophic, not least because, when the virus first shows itself, hundreds of thousands or even millions of pounds may have to be spent оn checking other programs to see if they are affected. One large insurance company, thanks to a hacker “having fun”, lost a set of computer files and the back-up copies. Restoring the information took nearly a year and cost more than £7 million with another £15 million in lost business. The mere threat to trigger a 'time bomb' virus can be used to extort a ransom which a big corporation may think is the lesser of two evils to pay. Like other victims of blackmail, they seldom report it.

Other forms of extortion - such as by threat to kidnap, kill, maim,

sabotage, bomb or (increasingly prevalent) to contaminate food or pharmaceutical products – are also used by both terrorists and criminal

extortioners.

IT IS INTERESTING TO KNOW !

DEFINITIONS

Hacker - An individual or group of individuals who attempt to gain or who gain unauthorized access to computer systems.

Hackers often spend hours trying to obtain network users identifications and associated passwords.

323

Once access has been obtained, hackers have the capability to steal, alter or destroy computer programs and data.

Hacker profile

Shy or introverted

Not popular with other students

Sloppy or unorganized

Intelligent

- High IQs

-Poor Grades

Extremes

- Underweight or overweight

Good talkers

Big egos

-Need constant attention and admiration

-Strong negative response to threats to self-esteem

Peak at age 16-17 years Mostly males

Between the ages of 12 and 28.

Have own vocabulary - speech patterns

Do not use their names

Will use a handle while exchanging information on bulletin boards or when dealing with other hackers.

Examplеs of handles

Phiber Optic

Grim Reaper

Outlaw

Acid Freak

Captain Chaos

Cyber Angel

Will become a member of a group of hackersTypical names of hacker groups

Anarchy Inc.Sherwood ForestChaos Computer ClubPhreaks Against Geeks

324

Legion of Doom

Masters of Destruction

Phreaker - One who hacks telephone systems, usually to obtain free long distance calling and other services such as conference calling.

Phreaks originally used blue boxes, black boxes - specific pieces of equipment that generate the tones needed to control the phone system (generate a dial tone).

Today phreaking is more access code oriented, stealing phone card access numbers and changing the billing system so that someone else is billed for your calls. Also involves the illegal monitoring of telephone conversations.

Lamer- Someone who lacks the knowledge of computer systems and hacking.

Elite - Someone who is above the average hacker in his abilities. Member of a select few.

Cardz - Refers to credit card numbers or telephone calling card numbers.

Codez - Refers to access codes to a computer system.

War Dialer - Computer program that is utilized to control a computer modem to call either the same number again and again or is used to keep calling consecutive telephone numbers until a modem is located at the dialed number. The telephone number is then logged for later use.

Sysop - Person who is assigned to monitor and maintain a computer system. Normally used to refer to the owner of a computer bulletin board system.

Sniffer - Computer program that is inserted by the hacker into the target computer system. The program monitors and records all of the data that is being sent or received through the communications port of the computer. It allows the hacker to have access to all information being sent and

325

received by the computer including user id's and passwords. Normally can not be easily detected by the system administrator.

Cracker - Hacker who uses any method possible to gain access to a computer system. Does not care if the system is made to crash. Will normally cause some type of damage to the system.

Call Looping - Method by which a hacker attempts to disguise the location where he is calling from by calling additional numbers and linking multiple phone switches. Normally an 800 number is called, then the hacker causes the phone system to give him a dial tone, then a second 800 number is dialed, there by linking two phone systems. The first 800 number may be a AT&T number and the second a MCI number.

REASONS FOR WANTING TO GAIN ILLEGAL ACCESS TO A

COMPUTER SYSTEM

To listen to the conversations between computers.

To gain entry into the computers and look around for valuable information.

To gain access to the computer system so that the system can be shut down.

To learn passwords and access codes so that the hacker can gain unlimited access to the system.

To intercept the private e-mail messages being sent on the system.

EXERCISES

Ex. 1. Translate into Ukrainian:

the damage to banks, access , the proceeds of computer fraud, to trigger a 'time bomb' virus, loss, insurance company, breaching national

326

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]