08-03-2012, 03:09 PM
Ethical Hacking for Educators
[attachment=18114]
THE GREAT HACKER WAR
Legion of Doom vs Masters of Deception; online warfare; jamming phone lines.
1984: Hacker 'ZinesHacker magazine 2600 publication; online 'zine Phrack.
CRACKDOWN (1986-1994)
1986: Congress passes Computer Fraud and Abuse Act; crime to break into computer systems.
1988: The Morris WormRobert T. Morris, Jr., launches self-replicating worm on ARPAnet.
1993: Why Buy a Car When You Can Hack One?Radio station call-in contest; hacker-fugitive Kevin Poulsen and friends crack phone; they allegedly get two Porsches, $20,000 cash, vacation trips; Poulsen now a freelance journalist covering computer crime.
First Def Con hacking conference in Las Vegas
ZERO TOLERANCE (1994-1998)
1995: The Mitnick Takedown: Arrested again; charged with stealing 20,000 credit card numbers.
EC-Council has certified IT professionals from the following organizations as CEH:
Novell, Canon, Hewlett Packard, US Air Force Reserve, US Embassy, Verizon, PFIZER, HDFC Bank, University of Memphis, Microsoft Corporation, Worldcom, Trusecure, US Department of Defense, Fedex, Dunlop, British Telecom, Cisco, Supreme Court of the Philippines, United Nations, Ministry of Defense, UK, Nortel Networks, MCI, Check Point Software, KPMG, Fleet International, Cingular Wireless, Columbia Daily Tribune, Johnson & Johnson, Marriott Hotel, Tucson Electric Power Company, Singapore Police Force
Hackers are here. Where are you?
The explosive growth of the Internet has brought many good things…As with most technological advances, there is also a dark side: criminal hackers.
The term “hacker” has a dual usage in the computer industry today. Originally, the term was defined as:
HACKER noun. 1. A person who enjoys learning the details of computer systems and how to stretch their capabilities…. 2. One who programs enthusiastically or who enjoys programming rather than just theorizing about programming.
What is a Hacker?
Old School Hackers: 1960s style Stanford or MIT hackers. Do not have malicious intent, but do have lack of concern for privacy and proprietary information. They believe the Internet was designed to be an open system.
Script Kiddies or Cyber-Punks: Between 12-30; predominantly white and male; bored in school; get caught due to bragging online; intent is to vandalize or disrupt systems.
Professional Criminals or Crackers: Make a living by breaking into systems and selling the information.
Coders and Virus Writers: See themselves as an elite; programming background and write code but won’t use it themselves; have their own networks called “zoos”; leave it to others to release their code into “The Wild” or Internet. (tlc.discovery.com)