This is a 1 -2 page essay on an issue you found interesting while reading Cuckoos Egg.
Examples include the continuing conflict between the FBI and Apple or Kevin Mitnick or
Stuxnet or how terrorists use the Internet or how the US government decision to attack ISIS
digitally. These are master’s level essays not college descriptive essays. You must find and
analyze interesting and challenging issue. Prior to submitting the paper, you must submit a five
source annotated bibliography with two paragraphs about each source. The first is a summary of
the article. The second is your reflection on the article – what it makes you think about. Each
paragraph contains a minimum of five sentences. Submit to me on blackboard. The document
should include the paper and the annotated bibliography
Solution
Kevin Mitnick:
-->The hacker who change his hat.He is the most famous hacker drones on about technoology.
-->The nebulous language of section 814 does not clearly differenciate between a computer
crime or an electronic
prank and an international act of terror.
--> Kevin Mitnick did anything all that illegal, but there\'s no denying that he was the world\'s
first high profile computer criminal.
-->hacker Kevin Mitnick is (although he is undeniably great), but how devastatingly effective he
is at tricking people into
revealing critical information in casual conversations
-->Under this legislation,Mafiaboy or kevin Mitnick would be considered a cyber-terrorist,even
though they were
not acting against critical national infrastructures.
-->This is like equating a water-balloon attack with a political assassination.
-->Mitnick became a legend in the nascent hacking community for some of his cunning stunts:
dumpster-diving
outside businesses to uncover discarded staff manuals and access codes, posing as an IT
department staff member
so that other workers would voluntarily cough up passwords over the phone.
-->He was proclaimed \"the world\'s most notorious cyber-thief\" in The New York Times, and
\"the poster boy for computer crime\"
on TV\'s 60 Minutes.
--> The FBI finally nailed him, living under a fake identity in North Carolina.
-->Mitnick was presented in court as extremely dangerous, \"the world\'s most wanted\"
computer criminal, and his trial
coincided with a time when American cyber paranoia was at an all-time high.
Stuxnet:
--> The FBI defines cyber terrorism as a “premeditated, politically motivated attack against
information,
computer systems, computer programs and data which results in violence against non-combatant
targets by
subnational groups or clandestine agents.
-->a terror group might launch a “digital Pearl Harbor” to Stuxnet-like sabotage (ahem,
committed by state forces)
to hacktivism, WikiLeaks and credit card fraud. As one congressional staffer put it, the way we
use a term like
cyber terrorism “has as much clarity as cybersecurity — that is, none at all.
--> “It is possible for a terrorist group to develop cyber-attack tools on their own .
This is a 1 -2 page essay on an issue you found interesting while re.pdf
1. This is a 1 -2 page essay on an issue you found interesting while reading Cuckoos Egg.
Examples include the continuing conflict between the FBI and Apple or Kevin Mitnick or
Stuxnet or how terrorists use the Internet or how the US government decision to attack ISIS
digitally. These are master’s level essays not college descriptive essays. You must find and
analyze interesting and challenging issue. Prior to submitting the paper, you must submit a five
source annotated bibliography with two paragraphs about each source. The first is a summary of
the article. The second is your reflection on the article – what it makes you think about. Each
paragraph contains a minimum of five sentences. Submit to me on blackboard. The document
should include the paper and the annotated bibliography
Solution
Kevin Mitnick:
-->The hacker who change his hat.He is the most famous hacker drones on about technoology.
-->The nebulous language of section 814 does not clearly differenciate between a computer
crime or an electronic
prank and an international act of terror.
--> Kevin Mitnick did anything all that illegal, but there's no denying that he was the world's
first high profile computer criminal.
-->hacker Kevin Mitnick is (although he is undeniably great), but how devastatingly effective he
is at tricking people into
revealing critical information in casual conversations
-->Under this legislation,Mafiaboy or kevin Mitnick would be considered a cyber-terrorist,even
though they were
not acting against critical national infrastructures.
-->This is like equating a water-balloon attack with a political assassination.
-->Mitnick became a legend in the nascent hacking community for some of his cunning stunts:
dumpster-diving
outside businesses to uncover discarded staff manuals and access codes, posing as an IT
department staff member
so that other workers would voluntarily cough up passwords over the phone.
-->He was proclaimed "the world's most notorious cyber-thief" in The New York Times, and
"the poster boy for computer crime"
on TV's 60 Minutes.
--> The FBI finally nailed him, living under a fake identity in North Carolina.
2. -->Mitnick was presented in court as extremely dangerous, "the world's most wanted"
computer criminal, and his trial
coincided with a time when American cyber paranoia was at an all-time high.
Stuxnet:
--> The FBI defines cyber terrorism as a “premeditated, politically motivated attack against
information,
computer systems, computer programs and data which results in violence against non-combatant
targets by
subnational groups or clandestine agents.
-->a terror group might launch a “digital Pearl Harbor” to Stuxnet-like sabotage (ahem,
committed by state forces)
to hacktivism, WikiLeaks and credit card fraud. As one congressional staffer put it, the way we
use a term like
cyber terrorism “has as much clarity as cybersecurity — that is, none at all.
--> “It is possible for a terrorist group to develop cyber-attack tools on their own or to buy them
on the black market,” Lynn warned.
“A couple dozen talented programmers wearing flip-flops and drinking Red Bull can do a lot of
damage.”
-->Taking down hydroelectric generators, or designing malware like Stuxnet that causes nuclear
centrifuges to spin out of
sequence doesn’t just require the skills and means to get into a computer system. It’s also
knowing what to do once you are in.
To cause true damage requires an understanding of the devices themselves and how they run,
the engineering and physics behind the target.
-->The Stuxnet case, for example, involved not just cyber experts well beyond a few wearing
flip-flops, but also experts in areas that ranged
from intelligence and surveillance to nuclear physics to the engineering of a specific kind of
Siemens-brand industrial equipment.
-->It also required expensive tests, not only of the software, but on working versions of the
target hardware as well.