Professional Documents
Culture Documents
Cybersecurity Awareness
Cybersecurity Awareness
CYBERSECURITY AWARENESS
Definition of “Cyber”
Definition of “Cybercrime”
These are the crimes referring to the ones that were committed using a
computer and the Internet to steal data information.
Definition of “Cybersecurity”
Its objective is to establish rules and measure to use against attacks over
the Internet.
II. HACKING
Definition of “Hacking”
This is the process of attempting to gain or successfully gaining, unauthorized
access to computer resources.
History of Hacking
1903- Magician and inventor Nevil Maskelyne disrupts John Ambrose Fleming's
public demonstration of Guglielmo Marconi's purportedly secure wireless
telegraphy technology, sending insulting Morse code messages through the
auditorium's projector.
When hacking first started it was not thought of as that serious. The hackers
were not even known as hackers but as practical jokers. The very first hack came
in 1878 when the phone company, Bell Telephone, was started. A group of
teenage boys, hired to run the switchboards, would disconnect or misdirect calls.
The first authentic computer hackers came in the 1960s. During those times,
computers were mainframes, locked away in temperature controlled, glassed in
areas. It cost a lot of money to run these machines, so programmers had limited
access to them. The smarter students, usually MIT students, had an insatiable
curiosity about how things worked. So, the smartest ones created what they
called "hacks", programming shortcuts, to complete computing tasks more
quickly. In some cases the shortcuts were better than the original program. One
of the hacks that was created in the 60s, 1969 to be exact, was created to act as
an open set of rules to run machines on the computer frontier. It was created by
two employees from the Bell Lab's think tank. The two employees were Dennis
Ritchie and Ken Thompson and the "hack" was called UNIX.
Famous Hackers
Julian Assange started his activities as a hacker when he was 16 years old, under the
name “Mendax”. He has hacked into many government, educational and corporate
networks.
This famous hacker is mostly known for being the creator of WikiLeaks(research about
WikiLeaks) in 2006. The United States have launched an investigation against him, and he
is now living in the Ecuadorian Embassy in London.
Gary McKinnon, working under the name “Solo”, has been responsible for the biggest
military computer hack of all times in 2002. He has accessed many computers belonging
to the NASA and the US Armed Forces, and has supposedly deleted several important
files.
Jonathan James, under the name “c0mrade”, started hacking computers when he was
15 years old. He hacked into commercial and government networks, including NASA and
the United States Department of Defense. He spent a few months in jail. He was then
accused of many network attacks in 2007. He claimed he was not involved, and eventually
committed suicide because he was afraid of being wrongfully convicted.
Michael Calce, under the name “Mafiaboy”, was 15 years old when he discovered how to
hack into the networks of university computers to attack Yahoo!, Amazon, Dell, eBay, and
CNN, among others. His actions raised concerns about cybercrimes, and the importance of
improving cybersecurity. He eventually became a security expert, writing a book about his
story, as well as a column on computer security for Le Journal de Montreal.
Anonymous is not a hacker, but a group of famous hackers who have assembled over the
concept of social justice to attack different targets, including Amazon, the Westboro Baptist
Church, and the Church of Scientology. Many businesses and IT services have taken
security measures to protect against these organized hacking attempts. Anonymous
started their activities in 2003, and since the group has no membership system and no
hierarchy, it’s impossible for the authorities to find all the hackers who claim to be a part of
it.