Abstract

VIOLATES COMPUTER SECURITY FOR LITTLE REASON BEYOND MALICIOUSNESS OR FOR PERSONAL GAIN

Rajesh Kumar, Dr. G.P. Singh

018-023

Vol: 1, Issue: 4, 2011

Illicit tempering of computer systems (computer misuse) takes many forms and the most common are probably hacking and computer viruses. Hacking generally refers to activity of gaining unauthorized access to a computer system or network. Computer viruses generally refer to programs which replicate themselves, delete stored information or alter the stored information from the infected computer. Hacking is often the first step in a computer misuse instance. Once a hacker has managed to gain unauthorized entry to a computer system he or she can then try to reprogram the system, delete or modify the data contained therein.

Download PDF

    References

  1. Sterling, Bruce (1993). 'Part 2(d)'. The Hacker Crackdown. McLean, Virginia: IndyPublish.com. p. 61. ISBN 1-4043-0641-2
  2. Blomquist, Brian (May 29, 1999). 'FBI's Web Site Socked as Hackers Target Feds'.New York Post. Retrieved on October 21, 2008
  3. S. Raymond, Eric. 'Jargon File: Cracker'. Retrieved 2010-05-08. 'Coined ca. 1985 by hackers in defense against journalistic misuse of hacker'
  4. Tim Jordan, Paul A. Taylor (2004). Hacktivism and Cyberwars. Routledge. pp. 133– 134.ISBN 9780415260039. 'Wild West imagery has permeated discussions of cybercultures.'
  5. Thomas, Douglas. Hacker Culture. University of Minnesota Press. p. 90.ISBN 9780816633463.
  6. Clifford, Ralph D. (2006). Cybercrime:The Investigation, Prosecution and Defense of a Computer-Related Crime Second Edition. Durham, North Carolina: Carolina Academic Press
  7. Wilhelm, Douglas. '2'. Professional Penetration Testing. Syngress Press. p. 503.ISBN 9781597494250
  8. Moore, Robert (2005). Cybercrime: Investigating High Technology Computer Crime. Matthew Bender & Company. p. 258. ISBN 1-59345-303-5.Robert Moore
  9. Moore, Robert (2006). Cybercrime: Investigating High-Technology Computer Crime(1st ed.). Cincinnati, Ohio: Anderson Publishing. ISBN 9781593453039
  10. Thomas, Douglas (2002). Hacker Culture. University of Minnesota Press.ISBN 9780816633463.
  11. Andress, Mandy; Cox, Phil; Tittel, Ed. CIW Security Professional. New York, NY: Hungry Minds, Inc.. p. 638. ISBN 0764548220.
  12. 'Blue hat hacker Definition'. PC Magazine Encyclopedia. Retrieved 31 May 2010. 'A security professional invited by Microsoft to find vulnerabilities in Windows.'
  13. Fried, Ina (June 15, 2005). ''Blue Hat' summit meant to reveal ways of the other side'.Microsoft meets the hackers. CNET News. Retrieved 31 May 2010.
  14. Markoff, John (October 17, 2005). 'At Microsoft, Interlopers Sound Off on Security'. New York Times. Retrieved 31 May 2010.
  15. Hacking approach
  16. 'Kevin Mitnick sentenced to nearly four years in prison; computer hacker ordered to pay restitution ...' (Press release). United States Attorney's Office, Central District of California. 9 August 1999. Retrieved 10 April 2010.
  17. Boyd, Clark (30 July 2008). 'Profile: Gary McKinnon'. BBC News. Retrieved 2008-11- 15.
  18. Staples, Brent (May 11, 2003). 'A Prince of Cyberpunk Fiction Moves Into the Mainstream'. The New York Times. Retrieved 2008-08-30. 'Mr. Gibson's novels and short stories are worshiped by hackers'
Back

Disclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.