Black-Hat-Hacker's Vulnerabilities

Decent Essays
A black-hat-hacker is one who discovers vulnerabilities and uses it for their own benefit. One such hacker named Kevin Poulsen in the 80’s hacked into telephone lines for a Los Angeles radio station. By doing so, he was the 102nd caller and won a Porsche 944 along with other prizes. He was on the FBI’s most wanted list when he hacked into federal systems and stole wiretap information. In 1991, he was captured. He pleaded guilty to seven counts of mail, wire and computer fraud, money laundering, obstruction of justice and for obtaining information on covert businesses run by the FBI.
A white-hat-hacker is one who finds the vulnerabilities and calls attention to them, so they can be fixed. Dan “Effugas” Kaminsky, a white hat hacker, in

Related Documents

  • Improved Essays

    Figure 6 shows Internal Security settings that were not set as high as they might have been to aide in threats that require a human response. Lesson 7: Invest in good technological defenses, but do not under invest in people who will be operating this equipment. Another, related lesson learned here is the need to strive to be excellent, rather than average. This stems from the view that we had taken during many simulation results that we were still doing "pretty good" when looked at in the context of all sectors taken together.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Pros And Cons Of Hacking

    • 434 Words
    • 2 Pages

    I am going to take about how apple had wanted to refuse to unlock a app phone. But the FBI says that they need to unlock the phos so that they can know of there is going to be a fucher attack. But App says they will not because they had already unlock about nine phone. But the FbI had say “that there can be a fucher russon attack”.…

    • 434 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Definitions Corporate Accountability- When you have to be responsible for your stakeholders Fraud- A criminal acts to achieve more money Whistleblower- A person who knows that the company has been doing illegal acts and decides to tell the government. Canadian Tire Reflecting on Canadian Tire’s Code of Conduct…

    • 461 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Hactivism as a process has a dual-edged character. The organised activity exposes the “transparency and accountability” (Diamond 71) of global power exploitation. However, such methods are seen questionable in the accountability and transparency of their practice(s). The main concern with hactivism is the preconceived notions of its values are translated offline as vigilantism. However, the whole concept of vigilantism is based on the idea of not condoning individual action to exercise authority if there is an immediate presence enforcing it.…

    • 609 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Above are the vulnerabilities that I discovered from Mr. Savanh's computer. This proves that his computer was vulnerable and open to remote hacking attacks. In my opinion, vulnerability does pose an immediate threat to computers. It is a potential entry point for other threats, such as intrusion, viruses, worms and Trojans, which can have destructive effects. How can Mr. Kelly deny my claims that Mr. Savanh computer was vulnerable to exploit attacks, infected with malware and hacked.…

    • 200 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Survival. What is survival? Survival is continuing to live or exist under adverse or unusual circumstances. When it comes to survival in the book there are two characters, Peter and Noa.…

    • 766 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Finally, Bernie confessed to 11 different federal crimes and operating the largest private Ponzi scheme. He was sentenced to 150 years in prison and restitution of 170 billion. (Varchaver,…

    • 1375 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Free scientist Josep Pi Rodriguez has recognized three vulnerabilities in the SCADA Engine BACnet OPC Server application. SCADA Engine has delivered another product form that mitigates these vulnerabilities. Josep Pi Rodriguez has tried the new programming form to approve that it settle every one of the three…

    • 48 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    The term “Hacking” came around when two men (Steve Gold and fellow journalist Robert Schifreen) were convicted for forgery under the Act of Forgery and Counterfeiting of 1981. Also these two attackers gain access to the British Telecom Prestel account and got access to all of the Identification numbers of Customers. However, messages were left in the Duke of Edinburgh (Prince Phillip) private mailbox. They weren’t intentionally attempting to gain anything. They were both charged with this offence but in interest today, because of the obvious wrongness for distributing sufficiently with the attacker.…

    • 323 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    He spent a large sum of time in his teenage years submerged in an online video game known as EVO. He uses his past to shed light on his belief that virtual theft is simply part of online games. In fact, Evo actually supported in-game theft (732) He was often the offender in these scenarios and states, “A few years ago, I could have been one of those pirates.” (733) He mentions many forms of his own thievery such as: fake investments, corporation thievery, pretending to be a girl in e-relationships, etc.…

    • 714 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Intruder Analysis

    • 176 Words
    • 1 Pages

    There is always a time in a person’s life when they reach the point that they are no longer a child and they begin to take the steps to become an adult. During those steps, they are in the “coming of age” part of their life. In coming of age stories the author often uses an extreme or dramatic moment to have the protagonist reach the stage of adulthood. It is these moments that signify to the reader the difficulty of coming of age.…

    • 176 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Villains are an interesting bunch in that the same person can be seen as both minor/major, or helpful/dangerous. I guess the same could be said about heroes though. Chuck Klosterman, a best selling author, wrote an essay titled “Electric Funeral,” a chapter of I Wear the Black Hat: Grappling with Villains (Real and Imagined), which details villains of today-different types of technocrats. The three “villains” he mainly focuses on are Perez Hilton, Kim Dotcom, and Julian Assange, who each vary greatly on the spectrum of their acts. Hilton is a blogger who likes to post photoshopped pictures and articles, Dotcom created Megaupload, a website to post copyrighted material illegally, and Assange is the head creator of WikiLeaks.…

    • 1254 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Ethics Of Hacking

    • 1119 Words
    • 5 Pages

    Computers have evolved with time as people get more interested in how they work. Most of this technology has come from things that we use. Like phones, typewriters and other technology that has contributed to the functions and the innovations of computers. However, as this piece of technology continues to grow, so does the desire of people trying to crack the codes of this innovation. A general amount of people think computers are full of different kinds of mysteries, which cause them to lose their self in their own self lust of figuring the mechanisms of certain types of technology.…

    • 1119 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Jordan Belfort Case Study

    • 1096 Words
    • 5 Pages

    After being charged with securities fraud, stock manipulation, money laundering, and other organized crime tactics (NATIONAL ASSOCIATION OF SECURITIES DEALERS, INC), Belfort was sentenced to 4 years in prison and a $110.4 million dollar fine. However, after pleading guilty to fraud and money laundering along with testifying against his fellow associates, Belfort was given a reduced sentence of 22 months in Taft Correctional Center where he later wrote his biography. Daniel Porush was also “[...]censured, fined $250,000 and barred in all capacities,” (NATIONAL ASSOCIATION OF SECURITIES DEALERS, INC). The duo both suffered tremendous losses both financially and personally after the fall of Stratton Oakmont, propelling the two leave the stock industry forever.…

    • 1096 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The theses of the TED talk “The power of vulnerability”, by Brené Brown , is that we all struggle with vulnerability in our lives; we fail to truly express ourselves and allow ourselves to be deeply seen, for the fear of not being accepted. But it is when we can truly accept who we are, and recognize our worth, that we can finally embrace vulnerability. Brown uses a humorous and an intimate tone in her Ted talk, to point out her struggle with vulnerability. These two tones are visible when Brown gets personal about her struggle with vulnerability, leading her to go see a therapist as she had a “breakdown”, but as intimate as she gets about her life, she still has a very humorous tone, keeping the audience entertained at the same time.…

    • 603 Words
    • 3 Pages
    Improved Essays