Illicit tempering of computer systems (computer misuse) takes many forms and the most common are
probably hacking and computer viruses. Hacking generally refers to activity of gaining unauthorized
access to a computer system or network. Computer viruses generally refer to programs which replicate
themselves, delete stored information or alter the stored information from the infected computer. Hacking
is often the first step in a computer misuse instance. Once a hacker has managed to gain unauthorized
entry to a computer system he or she can then try to reprogram the system, delete or modify the data
contained therein.
Download PDF
References
- Sterling, Bruce (1993). 'Part 2(d)'. The Hacker Crackdown. McLean, Virginia: IndyPublish.com. p. 61. ISBN 1-4043-0641-2
- Blomquist, Brian (May 29, 1999). 'FBI's Web Site Socked as Hackers Target Feds'.New York Post. Retrieved on October 21, 2008
- S. Raymond, Eric. 'Jargon File: Cracker'. Retrieved 2010-05-08. 'Coined ca. 1985 by hackers in defense against journalistic misuse of hacker'
- Tim Jordan, Paul A. Taylor (2004). Hacktivism and Cyberwars. Routledge. pp. 133– 134.ISBN 9780415260039. 'Wild West imagery has permeated discussions of cybercultures.'
- Thomas, Douglas. Hacker Culture. University of Minnesota Press. p. 90.ISBN 9780816633463.
- Clifford, Ralph D. (2006). Cybercrime:The Investigation, Prosecution and Defense of a Computer-Related Crime Second Edition. Durham, North Carolina: Carolina Academic Press
- Wilhelm, Douglas. '2'. Professional Penetration Testing. Syngress Press. p. 503.ISBN 9781597494250
- Moore, Robert (2005). Cybercrime: Investigating High Technology Computer Crime. Matthew Bender & Company. p. 258. ISBN 1-59345-303-5.Robert Moore
- Moore, Robert (2006). Cybercrime: Investigating High-Technology Computer Crime(1st ed.). Cincinnati, Ohio: Anderson Publishing. ISBN 9781593453039
- Thomas, Douglas (2002). Hacker Culture. University of Minnesota Press.ISBN 9780816633463.
- Andress, Mandy; Cox, Phil; Tittel, Ed. CIW Security Professional. New York, NY: Hungry Minds, Inc.. p. 638. ISBN 0764548220.
- 'Blue hat hacker Definition'. PC Magazine Encyclopedia. Retrieved 31 May 2010. 'A security professional invited by Microsoft to find vulnerabilities in Windows.'
- Fried, Ina (June 15, 2005). ''Blue Hat' summit meant to reveal ways of the other side'.Microsoft meets the hackers. CNET News. Retrieved 31 May 2010.
- Markoff, John (October 17, 2005). 'At Microsoft, Interlopers Sound Off on Security'. New York Times. Retrieved 31 May 2010.
- Hacking approach
- 'Kevin Mitnick sentenced to nearly four years in prison; computer hacker ordered to pay restitution ...' (Press release). United States Attorney's Office, Central District of California. 9 August 1999. Retrieved 10 April 2010.
- Boyd, Clark (30 July 2008). 'Profile: Gary McKinnon'. BBC News. Retrieved 2008-11- 15.
- Staples, Brent (May 11, 2003). 'A Prince of Cyberpunk Fiction Moves Into the Mainstream'. The New York Times. Retrieved 2008-08-30. 'Mr. Gibson's novels and short stories are worshiped by hackers'
Back