chapter 4 Flashcards
what is a hacker (textbook)
individuals with an interest in computers and technology that access computer systems without legal access to those computer systems
includes: anybody who likes to explore software, and those with malicious intent
phone Phreaks
started in the 60s and 70s describes the forerunners of modern computer hacking
blue box - makes free long distance calls by breaking into phone technology
political subversive
crackers
NOW used to describe all malicious hackers (bad)
traditionally someone who could fix early computer systems in the 60s
programmers of malware
small group of people who create malware like computer viruses
social engineering
confidence game- conman
they trick user into giving up sensitive or private information through some kind of scam
dumpster diving
physical theft of technical info on software
hackers vs computer criminals
computer criminal violates federal law
hackers- makes distinctions, they don’t define the all who hacks as criminal (break the law and not be a criminal)
scitpt kiddies
hackers that use premade malicious software
download existing hacking tools
inexperienced hacker
hactivist
a person who hacks for a political message
hacking to convert a political message
example anonymous, peta, disturbance theatre
penetration testing
find weaknesses and hacks software
distinctions of good and bad hackers
penetration testing
exploring networks
adherence to subcultural values
white hat hackers
a good hacker
Reframed hackers who work as network security specialists often engaged in penetration testing/ reverse engereining
black hat hackers
bad hacker- malicious hacker on cracker
gray hat hackers
sometimes hack ethically and sometimes maliciously
invades networks recreationally
50s-60s
hackers are creative problem solvers, fix early problematic programs. positive.
70s
advent of phone phreaks
rebels
first hackers subculture begins to emerge
80s
key decade
new breed of computer user
just teenagers/media
criminalization of hacking
software piracy- stole games, and movies, software is expensive
just exploring the software
post internet 90s to present
the emergence of organized criminal hacking groups
3 views of hacking
media
law enforcement
hackers
media view on hacking
negative view of hacking, focus on the outrageous cases
Law Enforcement on hacking
hacking is a crime
hackers view on hacking
they make distinctions between good and bad (white, black and grey hats)
adherence to subcultural values
hacker subcultural norms
technology
knowledge
commitment
categorization
laws
technology
deep intense interest
video games
time honing skills