Computer hackingPrecis of "Who reads your email"The article exposes the vulnerability of computer data and companies with the popularity of the Internet. The Internet can allow hackers to access any computer in the world, with intrusions can go virtually unnoticed. Major companies and government security departments have acknowledged that hacker intrusions are out of control. Some companies are too fearful to join networks because firewalls are no longer fully effective. New technologies such as "Pilot Network Services" (offering supervised Internet access) have been developed; “Netranger” (a monitoring device used by the Pentagon) and “Encrypton” (software that scrambles messages). the fundamental principles of cybersecurity (using strong passwords and protecting data) are not respected in a worryingly high number of American companies surveyed. A new law requires system operators to become responsible for security. Hackers can only be prosecuted (resulting in heavy fines) if the exposed company has actively demonstrated security awareness. Additionally, exposed companies are liable to other companies if their lack of security precautions allowed their computer network to become an opening for other business break-ins. Companies are reluctant to report security breaches as it denotes a bad image and highlights their vulnerability. Customers demand security and the lack of it will push them elsewhere. Billions of dollars are spent on protective equipment every year. Others are using the expertise of convicted former hackers to fine-tune and update their own security features. It's about befriending the enemy to learn more. These hackers walk out the door with a ready market for their expertise and great financial rewards. The explosion in the use of the Internet and networks around the world has brought with it the need for greater security awareness among users and managers of system operations. Technology must be constantly updated in the war against ever-growing insidious and malicious hackers. Summary of "Hackers: Taking a byte out of computer crime" by W. Roush. Roush discusses the changing face of cybercrime with the advent of the modem and tougher legislation. The article looks at the effect these changes are having on hackers themselves and the measures being put in place to address the problem. It also explores the common ground that hackers and cybersecurity experts agree on. In the 1960s the definition of hacker in the dictionary was a "computer virtuoso". Hackers consisted of young, computer-literate, rebellious gangs who competed for the image of status symbols and the thrill of breaking into a computer network. All this changed with the popularity of the modem and a growing
tags