Each student will post a thoughtful follow-up comment to the relevant discussion forum for one of these news postings. Comments should be at least 3-4 paragraphs in length and should contain links to other relevant online articles.
Security News Video 2 – Hackers and Hacktivism
Welcome to IST-456 Online security news video 2. This is Dr. Gerry Santoro and our topic today is hackers and hacktivism.
Information security managers have to deal with many possible threats to information and communication assets. One of these is the possibility of the intentional compromise of network or system security. The agent of this threat has come to be known as the ‘hacker.’
Hackers use a variety of methods to compromise network and application security. Hacking toolkits and malware development kits are available to support their activities. Hacking organizations have web sites and hold conferences – although the conferences are most likely attended by security professionals as opposed to criminal hackers.
Hacking has many goals – organized crime may sponsor hacking to steal information such as credit card numbers. Nation-sponsored hackers may be after military or economic information. Individual hackers may be trying to gain notoriety or exact revenge against an organization for some perceived transgression.
An analysis of 250,000 hacker conversations from a hacker forum revealed some interesting information regarding hacker methods. For example, in a discussion of attack methods 19% of the discussions were about SQL injection, while another 22% were about denial of service.
The most popular topics discussed were beginner hacking (25%), hacking tools and programs (22%), and web site and forum hacking (22%).
The threat from hackers is very real and growing. A few examples:
In October of 2007 and July of 2008 hackers used the connection from a ground station to affect the operation of the Landsat 7 and Terra satellites – which are used for Earth observation. It is believed that the attacks came through a commercial satellite station in Norway. It is also believed that the hacking originated from China.
Symantec Corp., a major security firm, announced in October of 2011 that hackers had targeted at least 48 chemical and military-related companies in an effort to steal trade secrets. The attacks used e-mail in an attempt to plant malware dubbed “Poison Ivy” on company computers.
Symantec also revealed, in early January 2012, that a hacker had stolen, and published, some of the Norton Anti-Virus source code.
During Fall of 2011, a Swedish hacker hijacked the Twitter account of a prominent member of Parliament and released details of more than 90,000 private e-mail accounts in a crusade to “let people know they handle their information wrongly.”
Adding to the hacker danger is the rise of the ‘hactivist.’ This is a hacker, who may or may not be a member of a loosely-configured organization, and whose goals are more aligned with social or political activism as opposed to financial or strategic gain.
The most popular example of a hactivist organization is Anonymous, which derives it name from anonymous postings on the 4Chan blog. Anonymous has made the news lately with a number of high-profile attacks.
In February of 2011, it was revealed that Anonymous had hacked the accounts of HB Gary President Aaron Barr. HB Gary is a major security consulting firm whose customers include the US Government. They then revealed a large amount of sensitive information – including how HB Gary had failed to follow even basic security procedures.
In early Fall 2011, Anonymous hacked a number of ISP’s that hosted child pornography sites in what was called ‘Operation Darknet.’ They then made account details of 1,589 users public.
In late Fall 2011, it is believe that Anonymous members hacked the security organization Stratfor – compromising SSNs and e-mail information for defense, intelligence and police officials in the US and UK.
The thing about hactivist organizations that makes them especially scary is that their motivations are not always clear. An organization could become a target due to some perceived transgression, as happened to Visa and Bank of America when they cut off funds to Wikileaks. Or, an organization could become collateral damage if its ISP is targeted for some other reason.
This concludes IST-456 Online security news video number 2. Please check the syllabus for the due date if you wish to respond to this video.
From University Park, this is Dr. Gerry Santoro hoping that you will ‘Live long and Prosper”
Our Service Charter
Excellent Quality / 100% Plagiarism-FreeWe employ a number of measures to ensure top quality essays. The papers go through a system of quality control prior to delivery. We run plagiarism checks on each paper to ensure that they will be 100% plagiarism-free. So, only clean copies hit customers’ emails. We also never resell the papers completed by our writers. So, once it is checked using a plagiarism checker, the paper will be unique. Speaking of the academic writing standards, we will stick to the assignment brief given by the customer and assign the perfect writer. By saying “the perfect writer” we mean the one having an academic degree in the customer’s study field and positive feedback from other customers.
Free RevisionsWe keep the quality bar of all papers high. But in case you need some extra brilliance to the paper, here’s what to do. First of all, you can choose a top writer. It means that we will assign an expert with a degree in your subject. And secondly, you can rely on our editing services. Our editors will revise your papers, checking whether or not they comply with high standards of academic writing. In addition, editing entails adjusting content if it’s off the topic, adding more sources, refining the language style, and making sure the referencing style is followed.
Confidentiality / 100% No DisclosureWe make sure that clients’ personal data remains confidential and is not exploited for any purposes beyond those related to our services. We only ask you to provide us with the information that is required to produce the paper according to your writing needs. Please note that the payment info is protected as well. Feel free to refer to the support team for more information about our payment methods. The fact that you used our service is kept secret due to the advanced security standards. So, you can be sure that no one will find out that you got a paper from our writing service.
Money Back GuaranteeIf the writer doesn’t address all the questions on your assignment brief or the delivered paper appears to be off the topic, you can ask for a refund. Or, if it is applicable, you can opt in for free revision within 14-30 days, depending on your paper’s length. The revision or refund request should be sent within 14 days after delivery. The customer gets 100% money-back in case they haven't downloaded the paper. All approved refunds will be returned to the customer’s credit card or Bonus Balance in a form of store credit. Take a note that we will send an extra compensation if the customers goes with a store credit.
24/7 Customer SupportWe have a support team working 24/7 ready to give your issue concerning the order their immediate attention. If you have any questions about the ordering process, communication with the writer, payment options, feel free to join live chat. Be sure to get a fast response. They can also give you the exact price quote, taking into account the timing, desired academic level of the paper, and the number of pages.