+ All Categories
Home > Documents > Final Group Project on Hacking

Final Group Project on Hacking

Date post: 14-Apr-2018
Category:
Upload: persian-power
View: 217 times
Download: 0 times
Share this document with a friend

of 30

Transcript
  • 7/27/2019 Final Group Project on Hacking

    1/30

    Group Project on Hacking 1

    Group Project on Hacking

    Rohullah Sadiqi, Masood Omary, Shafiullah Rasool

    CIS-208

    25/09/2013

    R.K Sharma

    Stratford University (New Delhi)

  • 7/27/2019 Final Group Project on Hacking

    2/30

    Group Project on Hacking 2

    ACKNOWLEDGEMENT

    We accord our gratitude to our guide Mr. RK Sharma, who has contributed his life-size

    expertise in bringing out the best of us in this piece of project work, but for which this

    work would not have seen the light of the day.

    At last but not the least whom we owe a lot of thanks are for our all classmates for

    their valuable cooperation in helping me to get the nice work of presentation without

    which the present presentation of my work would have been altogether different. We are

    greatly in debt to numerable friends of ours, Parents, Sisters and Brothers, whose name

    could not find place in this acknowledgement, extended their infallible inspirations in

    giving me the final touch to this work.

    We on behalf of millions of students fraternity preserve the highest form of gratefulness

    to Stratford, USA which tirelessly striving in giving shapes to millions of career and

    thereby building the nation.

  • 7/27/2019 Final Group Project on Hacking

    3/30

    Group Project on Hacking 3

    Finally we dedicate this work to forefathers of computer, which was the beginning of the

    modern technological age.

    (Rohullah Sadiqi)(Shafiullah Rasool)(Masoom Omary)

    CERTIFICATE

    It is to certify that the project entitled Hacking is done by Mr. Rohullah Sadiqi,

    Shafiullah Rasool, Masoom Omary, Students of MAII Stratford, Lajpat Nagar, New

    Delhi.

    This system is going to be proved very useful and productive in Computer Science

    and forensics. Their work is genuinely original and to finalize it, they have put in

    tremendous energy and effort. The usefulness of the work needs to be appreciated.

    I wish them all success.

    (Campus Dean)(Faculty)

  • 7/27/2019 Final Group Project on Hacking

    4/30

    Group Project on Hacking 4

    DECLARATION

    I hereby declare that the project entitled AUTOLAND ARMORED COMPANY is genuinely

    original and no one has ever before produced exactly this piece of work to the best of my

    knowledge and belief. This project has not been submitted earlier whether to this

    university or to any other institution for fulfillment of the requirement of a course of study.

    PROJECT GUIDE STUDENTS

    (Raj Kumar Sharma) (Rohullah Sadiqi)

    (Shafiullah Rasool)(M.Tech. Computer Science)

    (Masoom Omary)

  • 7/27/2019 Final Group Project on Hacking

    5/30

    Group Project on Hacking 5

    Abstract

    In this paper, various classes of computer hackers, with special emphasis on fame-

    driven versus profit-driven hackers. We use simple economic analysis to examine how

    each of these hacking "markets" work. To evaluate the current policy of the United States,

    with the aim of reducing the threat of computer hacking and that this policy greatly affects

    the resulting framework is used. Our comments policy is consistent with the framework

    provided insight as a means to strengthen cyber security.

  • 7/27/2019 Final Group Project on Hacking

    6/30

    Group Project on Hacking 6

    TABLE OF CONTENTS

    Introduction To Hacking..... 7

    A Brief History of Hacking ..... 9

    Good Hackers...... 13

    Bad Hackers: Hacking of Notoriety 15

    The Economics of Fame-Driven Hacking ....... 19

    Greedy Hackers: Hacking for Profit 22

    Policy Implications . 23

    Policy and Profit-Driven Hacking... 24

    Policy and Fame-Driven Hacking ...... .25

    Conclusion ....... 28

    References ...... 31

  • 7/27/2019 Final Group Project on Hacking

    7/30

    Group Project on Hacking 7

    Introduction

    In the digital age cyber security is perhaps the most important form of security

    individuals must be concerned with. Banks, schools, hospitals, businesses, governments

    and virtually every other modern institution you can think of stores and organizes its

    information electronically. This means that all of your most sensitive informationfrom

    credit card numbers and checking accounts, to medical records and phone billsis

    accessible for viewing, stealing, or manipulating to anyone with a PC, an Internet

    connection, and some computer know-how. The increasingly computer-based world is

    increasingly vulnerable to malevolent computer hackers.

    While we know little about these shadowy hackers we have a very clear picture of

    the damage they do. In 2003, hacker-created computer viruses alone cost businesses $55

    billionnearly double the damage they inflicted in 2002 (SecurityStats.com 2004). In

    2000 the total cost of all hack attacks to the world economy was estimated at a staggering

    $1.5 trillion (PricewaterhouseCoopers 2000). In a 2004 survey of American companies

    and government agencies conducted by the Computer Security Institute, over half of

    respondents indicated a computer security breach in the past 12 months and 100 percent

    of respondents indicated a Web site related incident over the same period (CSI 2004).

    If anything, these figures probably underestimate the amount of security breaches

    involving hackers. Companies, especially financial institutions, are very reluctant to report

    hackers to steal the fear of how it might affect the perception of customers and

    shareholders for their safety. In the survey of U.S. companies conducted jointly by CSI

  • 7/27/2019 Final Group Project on Hacking

    8/30

    Group Project on Hacking 8

    and the FBI, nearly 50% of companies that experienced the system in the past year said

    they did not report the intrusion to anyone.

    The main reason cited by the negative impact of perceived corporate image or actions

    (CSI 2004: 13-14), and similar results have been confirmed by others (see, e.g., United

    Nations, 1994, Shell et al 2002: 40). What can we say about the enigmatic hacker, and

    what we can do for the cost it imposes hackers?

    This paper uses a simple economic analysis to try and better understand the

    phenomenon of hacking. In particular we are interested in developing a framework for

    analyzing the policy is related to hacking. Toward this goal, the hacker community can be

    divided into three groups separated by motivation. The first floor consists of hackers as

    "good. The hackers illegally breaking into computer systems, but on a voluntary basis

    with those responsible for security weaknesses of these systems share. Second -class

    reputation based hackers. The third group of hackers is greedy These hackers are not

    motivated by considerations of reputation, rather than profit driven. Profit -driven hackers

    can be good" or " bad depending on the type of behavior led to the greatest financial

    return.

    Economic Analysis hackers distinct categories gives important clues to the policies

    aimed at reducing the security threat posed by hacking. In Section 2 we provide a brief

    history of piracy. Section 3 of the good hackers, Section 4 of fame-driven hackers and

    hackers for profit are considered in Section 5. The policy implications of the analysis in

    Section 6 and 7 is our conclusion.

  • 7/27/2019 Final Group Project on Hacking

    9/30

    Group Project on Hacking 9

    2. A Brief History of Hacking

    Hack history dates back to the 1960s in the U.S., where members of the Tech

    Model Railroad Club at MIT systems "hack" control model trains to run faster, more

    efficient or different from what they were designed. About the same time, its Artificial

    Intelligence Laboratory at MIT, where some of the first large mainframe computers are in

    the introduction. The innate curiosity of how things work, several of the club members are

    attracted to the MIT AI lab. The computer name is big, slow and PDP -1 are very

    expensive to operate. To overcome some of these problems, making smart programmers

    "hack" the system shortcuts that perform some functions faster and easier.

    MIT only source of activity is not piracy. Calculations research centers such as Bell

    Laboratories (Bell Labs) in it too. One of the most important in the history of piracy, AT

    & T Bell Laboratories in 1969, two workers, Dennis Ritchie and Ken Thompson, an open

    source operating system market leader, which they called UNIX. UNIX is the computing

    speed of the standard language. The first steps in hacking it has something to do with

    illegal activities or cybercrime. Conversely, improved access to consensual and hackers

    deface place.

    In the 1970s, however, things began to change. Hackers are starting to realize the

    potential of piracy for personal gain. Specifically, wiretapping activity is increasingly an

    activity called "phreaking" in the early 1970s Vietnam veteran named John Draper is a free

    plastic whistle that came in a cereal box or something Captain overwhelming sound

    crushed under the wheels, and therefore require the accurate reproduction of the teeth or

    below 2600 Hz for long distance calls. Blowing the whistle on the phone at the right time

    AT & T switching system that has been granted legal access to a remote phone and the

    caller has the ability to pay.

  • 7/27/2019 Final Group Project on Hacking

    10/30

    Group Project on Hacking 10

    After discovering I Draper Takes on the pseudonym "Cap'n Crunch" and quickly produced

    under the ground for hackers and phreaks your creativity with the used in remote calls.

    Other hackers Draper built on innovation, by building "blue boxes" designed to help the

    long-distance phone fraud. Given the time involved in. Such phreaking hackers include:

    Steve Wozniak and Steve Jobs, future founders of Apple Computers. In 1978, two

    hackers from Chicago to start a computer bulletin board computers, creating the first

    virtual meeting place for the growing hacker community, where members can advise,

    stolen credit card numbers and other information, go to the or coming out of Their

    hacking activities to share.

    The publicity given to the Packers in 1983 somewhat war video games, in part,

    with the new price of computers and the world increasingly online, partly stimulated by

    the presence (ARPANET during this time, becoming Internet) , Shyvhk team rises again in

    the 1980s. 's. 414 of the first bands to arrest and punish by law for cybercrime, including

    illegal access to computer systems at the Los Alamos National Laboratory, which is

    developing a nuclear weapon, breaking into the system Sloan Kettering Cancer Center in

    New York, 0.414 is not alone in the new world of hacker crime.

    "Legion of Doom" and "Masters of Deception" one to two leading, rival hacker

    gangs were born in the 80s. In response to the increasing number of crimes related to the

    hackers, the government of the United States 1984 made it a crime to gain unauthorized

    access to computer systems.

    But it does not stop hackers breaking into computer systems. In 1988, the world

    witnessed the first act of a new type of Internet worm hacker inadvertently spread by its

    author, Robert Morris Cornell University. Morris has been identified, a fine of $ 10,000

    and sentenced to three years probation. In the late 80s the first state visit to the hacker.

  • 7/27/2019 Final Group Project on Hacking

    11/30

    Group Project on Hacking 11

    Several members of the band West German hackers, "Chaos Computer Club" steal

    information stored electronically and sell it to the United States to the Soviet KGB.

    In the 1990s an activity of hackers increasingly asks the U.S. government to conduct

    surprise raids on suspected hackers clothing locations in 14 cities across the country

    ("Operation Sun Devil"). Although arrests have been made and many in the hacker

    community turn for safety, pirate activity continues. Another trick is over guys

    pranksters behavior or mass retailers. Hackers have turned their talents to a much larger

    journey. In 1995, two Russian hackers have stolen $ 10 million Citibank. In response to

    the serious hacker activity, like this one, in 1998, the National Information Center of the

    United States, infrastructure protection, designed to protect telecommunications,

    transport and technological systems from hacker attacks curtain.

    In the new millennium, hacking activities once largely confined to the U.S. and

    Western Europe is a global phenomenon. The severity of the crimes committed by hackers

    again increases. Design hackers "denial of service" companies fell hackers network as

    Yahoo, eBay, Amazon, and others, that cost millions of dollars in lost business. Power and

    the spread of malicious viruses continues to grow, culminating in May 2000 with the virus

    of "I Love You", it is estimated that the global economy nearly $ 9 billion, most harmful

    viruses, hackers created to date cost (CIS 2002).

    As history shows, the "hack" refers to various activities. This includes, for example,

    password cracking, mail bombing "logic bomb" denial of service attacks, viruses and

    worms writing and publishing, visualization is limited to electronically stored information

    belonging to others, URL redirection, unadulterated web site, or any other behavior that

    involves accessing a computer system without proper authorization. Moreover, although

    in most cases limited to hacking, does not have to be, and can be increased to fraudulent

    activities related to the phone (e.g., tricking the phone to allow long distance calls, the

  • 7/27/2019 Final Group Project on Hacking

    12/30

    Group Project on Hacking 12

    The term "phreaking"), credit cards (e.g., a toy to "steal" code stored in magnetic credit

    cards, and copy to others), subway passes (e.g., adultery happens or approve reader

    allows unlimited free travel), parking meters (m fraud allows unlimited free parking,

    parking meters) and almost every other electronic components. We limit our analysis

    mainly for hacking computers, but the basic principles are clear to us may also be applied

    to other forms of piracy.

    Some hackers called many of the above activities "piracy" and lead to "hackers." In

    these circumstances, they insist, must be harmless (and often illegal) activities of computer

    enthusiasts that the system is a break, take a look around to learn how things work and

    leave everything intact. According to this view, the "cracker" to destructive behaviors

    "Leave" listed above, which are incorporated regularly hacked harmless. While we know

    the difference, however, choose to refer exclusively to the discussion of the pirates and the

    community.

  • 7/27/2019 Final Group Project on Hacking

    13/30

    Group Project on Hacking 13

    3. Good Hackers

    While piracy psychology is still in its early stages, the preliminary investigation

    appears to be some consensus about what motivates hackers are hacking. Individual

    hackers and hacker groups in large underground networks composed of social work or

    similar community. It is based on the best empirical work that examines the pirate mind is

    based primarily on interviews and surveys the underground community members. Briefly

    summarize some of the latest findings in the literature following small. It seems that many

    hackers to "kick scientists generally false or misleading impression to others about their

    reasons for piracy (Platt , 1997 : 53 ) .4 However, this fact should be noted that the results

    of research aimed to identify motivated hackers . However, the best information we have

    so far, so we have to use it unless it avoids the problem of empirical research altogether.

    Current and complete information about the population of hackers, motivation,

    lifestyle, etc. are collected by Shell et al (2002). There e) the presence in July 2000. These

    agreements include the Convention on the DEFCON 8 H2K the New York Convention in

    Las Vegas. Besides managing the anonymous survey, the researchers randomly assigned

    some hackers in depth issues (again anonymous) hackers agreed to do the interview.

    The total size of the hacker community is uncertain, though many accounts, is

    relatively small. According to Sterling, Some professional informants have estimated the

    Hacker population size as high as fifty thousand. However," this is likely to be highly

    inflated. 'S. 'S.de others showing that the population of male hackers, only 9 percent of

    those surveyed by Shell et al (2000), women (see, e.g., Taylor 1999, Gilboa 1996). thus

    consistent with older findings, most hackers were younger than 30 years, the average age

    of about 27 years, an average of 24 and 25 (i.e., SRI 1994).

  • 7/27/2019 Final Group Project on Hacking

    14/30

    Group Project on Hacking 14

    The motivation for piracy vary, but an important part of harmless hackers stated

    reasons for his behavior. 36 percent said they cut the "advanced networking capabilities

    and PC software", 34 percent say they hack "to solve puzzles and challenges," and 5

    percent said they hacked into "the community a better place to live. If we are to believe

    the numbers, the vast majority of hackers are harmless. True, unauthorized access to

    computer systems, which represent a potential security threat. But they themselves will

    not cause damage. However, to the extent that they share with other members of the

    security holes that are indirectly responsible for the hacker community of computer users

    at risk, but it is unclear to what extent the "good" job of hackers.

    The good part of the population that hackers are the services of questionable value for

    non-computer users. Some of the discovered security holes hackers, programmers and

    system operators of computer systems that are security weaknesses. This information can

    then be used to patch holes or strengthen vulnerabilities, preventing intrusion by less

    benevolent hackers.

    However, we suspect that we recommended here by hackers (and hacked) is spam.

    So should have been corrected. Although in a sense, because it's better you play, other

    means can be justified in their anger.

    Unfortunately, good data on the proportion of benevolent hackers in this way are

    not available. Complicating matters is the fact that good hackers are good hackers are

    much more robust than other operators and system programmers who are vulnerable to

    their advice. Some hackers are well aware of the threat to security weaknesses release

    holes unless they have found to correct the problem.

  • 7/27/2019 Final Group Project on Hacking

    15/30

    Group Project on Hacking 15

    Good hackers seem to be the most difficult to treat because their human "basic" needs and

    not motivated by money or fame. Fortunately, because they are the weakest and probably

    responsible for at least a threat of harm to people and businesses in the community of

    hackers community.

    We lose relatively little at least in terms of felt the cost of this lack of understanding.

    Much more important from a security perspective are evil people who do hackers to gain

    knowledge of such acts for the benefit of personal profit.

    4. Bad Hackers: Hacking for Notoriety

    Research by Shell et al (2000) show that only 11 percent of respondents with evil motives.

    However, a small percentage of bad hackers may be important to consider them, they are

    responsible for the full cost of the damage caused by hackers every year. It is hard to say

    what it is, but it is clearly contrary to the other review motivated hackers. Fame and

    recognition of partner ranks among the main motivations cited by security experts and

    hackers alike hackers, hackers and other discussions on psychology (see, for example,

    Zoetermeer 1999, Blake 1994, Stirling 1991; Hannemyr 1999, Platt, 1997, Thomas 2002;

    Verton 2002) 0.7

    As Dnyng, noted that "the stereotypical image of a hacker who is socially incompetent,

    and stop supporting people's computers, hackers are, the more likely it is that the social

    aspect. They love interact with other people on message boards, full email, and in person.

    They share stories, gossip, opinions, and information; work on projects together; teach

    younger hackers; and get together for conferences and socializing (1992: 60).

    From bigger, stronger, more destructive, or creators new hack his notoriety among

    members of Metro community.8 the password hacker can abuse among members of the

  • 7/27/2019 Final Group Project on Hacking

    16/30

    Group Project on Hacking 16

    community in a number of ways to spreads. First, hackers could be by word of mouth to

    spread, reproduce fellow hackers or other replicates the rival gang members and others.

    Second, hackers may be responsible for hacking websites, bulletin boards or lists as

    "BugTraq," 9 "rootshell", "Summary Risk Profile" and "VulnWatch email hacker." With

    other members of the community for these people to eat.

    Anonymity preserving its nickname chosen by the authorities.10 hackers tend to be more

    memorable and impressive, for example, "Dark Dante" (aka Kevin Poulsen), "Captain

    ZAP" (aka Ian Murphy), "Nocturne" (leading member of the group hacker Cult of Dead

    Cows), etc.a factor that aids hackers ability to generate notoriety within the

    community when they post new information. The same is true of names selected by

    hacking gangs, for example, World of Hell, Bad Ass Mother F*ckers, Circle of

    Death, Farmers of Doom, and so on.11

    The fame-based motivation of many bad

    hackers helps to explain why profane, absurd and overstated gang names and handles

    pervade the hacking underground.

    Hackers and hacker groups are creating their own celebrity status can also go for

    Mods Hkrhara in the community setting. For example, two of the most famous hacker

    groups history of piracy, the Legion of Doom and Masters of Deception, by virtue of a

    process in which a group of hackers and after a lot of comics based on the characters.

    Similarly, the band 414 - one of the first bands of hackers raided by the authorities -

    marked tendency to create categories based on numbers (Shell et al 2000: 58).

    Underground world of computer hackers has its own media outreach publish

    books related to hacking, newspapers and magazines and zines. Some examples of the

    latter in 2600: Hacker Quarterly Magazine, Black Hacker, Computer Underground

    Digest, Phrack Magazine, tick Journal piracy Hack academy Journal,

  • 7/27/2019 Final Group Project on Hacking

    17/30

    Group Project on Hacking 17

    Hacker chair, piracy, smugglers, and the binary Magazine to name a few. Within these

    media, hackers published How to" articles (for example, how to cheat Zdndstgah ATM)

    and new information to share from the last meeting is taking advantage of their hacks.

    Books and articles published under highly publicized hacker access the author of a large

    audience and meet some of the hackers as "better" in your area, increasing within the

    community. One of the biggest problems - Phrack, but includes a section called "pro -

    edge" in which famous hackers, retired legends, or rising stars in the hacking community

    are profiled and interviewed for readers, with special highlights on their biographies and

    most impressive hacks. In this way, outlets like Phrack served as the means to legitimate

    hackers for the underground . . . presenting them as celebrated heroes to the readers that

    made up the underground (Thomas 2002: 140).

    The fame through these channels has its advantages for hackers who can produce

    underground fame on additional digital access only be shared within the group. As a

    hacker, put it: "It was very important to recognize, for example, when recognized, will

    have access to more so Many people rush for fame and whoevers hacked.' ... is an

    informative article on a magazine (e.g., Phrack, NIA, etc.) may be admitted to the bulletin

    boards.

    Such was the case, for example, Captain Crunch, whose name is forever linked to

    the operation of the phreaking great discovery has led, among other things, another major

    hacker publications -2600 - named after its discovery.

    "Condor" also known as Kevin Mitnick, the hacker underground and in the same

    star status as a cult itself. His photographs and stories have appeared in newspapers and

  • 7/27/2019 Final Group Project on Hacking

    18/30

    Group Project on Hacking 18

    magazines around the country and Mitnick, told his story on TV 60 minutes. In addition

    to serving as the basis for numerous books, Mitnick hacked helped inspire the term

    "Cyberpunk" in popular culture, famous in part Mitnick pointed to by writers / journalists

    Kathy and John Hafnr Markov (1991) 13 was used in the last Mitnick arrest in 1995 by a

    group of his followers, the hacker community has protested the trial in late 1990. The

    group of hackers who called themselves a band called "Hacking for Girlies was

    organized," New York Times web page cannot load and delete a message, Mitnick guilty

    to all readers.

    Select hackers to gain their fame among the "elites" underground worms. These

    people are usually leaders of the band as "Lax Luther" (former head of the Legion of

    Doom), or "Phiber Optik" (former master of deceit) that even the New York Magazine as

    one of the cities "was proclaimed smarter 100 personas.se used.

    Most hackers, however, did not reach the level of fame simply download pre-built

    data and programs as "Trin00", "Tribe Flood Network" or "Stacheldraht" prepared by the

    best hackers use to attack systems.14 The "script kiddies", Elmas by elite hackers. It

    requires some skill to hit piracy Amazon.com, for example, "Mafia boy," some code

    hacking ANTICS 15 year cost of $ 1.7 billion in the largest Internet retailers in February

    2000 showed.

    The most famous hackers driven explicitly avoid monetary gain to hacking as part of his

    work reckless and Profile such entities as subordinating the creative skills of the hacker to

    the greedy corporate world.

  • 7/27/2019 Final Group Project on Hacking

    19/30

    Group Project on Hacking 19

    4.1 The Economics of Fame-Driven Hacking

    Drives based on the reputation that many hackers have specific implications for this

    part of the market "hacker" looks. "Coin of the realm" for hacking driven fame, of

    course, fame. How can we model this "market" because traditional markets where

    money drives the production and prices adjust to balance different providers and

    Fame-driven hacking "the market" in terms of quantifying the relationship between

    reputation and hacks? The map of "supply and demand (as discussed below, the

    demand in the conventional sense) fame / hacked space.

    On the one hand, the "market" is known producers who want to cut. Hackers plan

    to launch the normal positive slope. When you have to get a little fame by hacking,

    they are less willing to offer.

    The position of the supply curve, is determined primarily by the cost of piracy.

    Average hackers hacking initial fixed costs, which in most cases is reduced to a

    computer, a phone line (or cable) modem and a face. Variable costs, electricity

    costs are composed primarily of hackers.

    Another factor determining the position of the supply curve is the number of

    hackers in the industry. This population is significantly limited the number of people

    seeking fame in the hacker underground (his sister, for example, might be able to

    hack, but they tend to be very popular among hackers, etc.) is relatively small. The

    population of people who wish to enter the "Hall of Fame Hacker", which ends up

    limiting factor that determines the position of the supply curve of hacking.

    The other side of this uncommon common sense "market" is that it. Launch hack

    hacked hackers happier when the rest of the community. The access version

    security value of the company, for instance, has been compromised, or may serve as

  • 7/27/2019 Final Group Project on Hacking

    20/30

    Group Project on Hacking 20

    indirect hacker attacks to see their political objectives

    In the fame-driven case the hacking community does not pay for more hacking

    with a higher price. The producers of hacks do not seek money and, as we noted

    previously, often explicitly reject monetary reward. They seek fame. This, in conjunction

    with the fact other members of the hacking community value additional hacking, leads

    them to cheer more, so to speak, when additional hacking occurs. Additional cheering is

    translated into additional fame for the suppliers of hacks. Rather than demanding the

    output of suppliers in the usual sense, the other side of the fame-driven hacker market

    consists of individuals (the hacking community) who respond to the supply of hacking

    with greater or lesser applause. In the language of economists, the hacking community has

    a reaction function, which specifies how this community reacts with fame to various

    quantities of hacking that are supplied by hackers. More hacking is rewarded with more

    applause and less with less applause. The hacking communitys reaction function is

    therefore positively sloped like the supply of hacking itself. The interaction of the supply

    curve for hacking and the hacking communitys reaction function creates two possibilities,

    depicted in Figure 1 and Figure 2.

  • 7/27/2019 Final Group Project on Hacking

    21/30

  • 7/27/2019 Final Group Project on Hacking

    22/30

    Group Project on Hacking 22

    1.8 billion industry in the United States alone (Wing field 2002), respectively. Some

    security experts employed or running the company reformed hackers

    Some examples of this are already gone, Com sec Data Security, former members of the

    Legion of Doom function by four and put the security office of Mark Abene (aka Phiber

    Optik) former leader of the Masters of Deception. Provision, called Crunch box and Ian

    Murphy (also known as Captain ZAP) implemented IAM Secure Data Systems Inc.17

    Out of mistrust, many companies are reluctant to hire reformed hackers to improve

    security. Ultimately, responsible and went bankrupt because of Comsec. Big companies

    like American Express, Dun and Bradstreet and Monsanto hired so-called "tiger teams" to

    test your system for vulnerabilities in (Roush 1995: 6).

    The markets for good and bad hackers seeking profit motive is introduced. Because the

    money supply and demand balance hack price / value of the price of traditional suppliers.

    Both markets are the sloping supply curves and demand curves have negative slope. In

    both cases, hackers hacked a larger amount if they are paid more, and less, if they are paid

    less. Similarly, both criminal and legitimate Nothing.

    This can be good or bad from the point of view of security. Although piracy trick to gain

    profit is bad, the winner ahead of safety. Several hackers, bad endogenous and foreign

    collectors. However, if evil Profit

    Hacking is more profitable, the opposite is true. Growing pirate threat supply the best and

    brightest hackers to gain employment in the dark.

    6. Policy Implications

  • 7/27/2019 Final Group Project on Hacking

    23/30

  • 7/27/2019 Final Group Project on Hacking

    24/30

    Group Project on Hacking 24

    The current policy of the Mass hacking for profit effectively reduce the piracy, this is

    all what politics cannot do this. As mentioned above, the rate of return relative to a hacker

    as a bad job, a good income to determine which of the top markets for the benefit of

    hackers generally get hacking for profit. As we both have a positive effect on security.

    First, it reduces the number of hackers, bad for profits and, second, that employ a "side" in

    the battle against evil hackers.

    One way to look fairly good profit piracy more attractive to hackers hacking for profit, to

    raise money for the benefit of the poor , who carry out the law of prohibition of the

    activity . Another good way to increase the competitiveness of hacking for profit,

    however, to rise up against his back in the bad hacking for profit. To do this, the

    government can fine industry workers and companies to profit from piracy through direct

    transfer or through tax breaks and other subsidies, preferential treatment, leading to

    increased revenue in this industry. The effects of this policy is shown in Figure 4.

  • 7/27/2019 Final Group Project on Hacking

    25/30

    Group Project on Hacking 25

    6.2 Policy and Fame-Driven Hacking

    Although current legislation is appropriate for profit-driven hacking, it may not be

    effective in reducing the quantity of hacking for fame-driven hackers. Recall from Section

    4 that the fame-driven hacking industry may look one of two ways. In the first case the

    supply schedule for hacking is less elastic than the fame reaction function for hacking, and

    in the second case the opposite is true. We also noted in Section 4 that these differing

    cases have contradictory implications for the effectiveness of present policy. To see why

    this is so, consider Figures 5 and

  • 7/27/2019 Final Group Project on Hacking

    26/30

    Group Project on Hacking 26

    As a non-profit hacking, piracy is punishable current law, which usually increases the

    cost of hacking activities driven reputation too. This results in the release hack in Figures

    5 and 6 present the demons of the left SHIFT S'H demonstrated S '' H. The uneven impact

    of this policy in all cases in which a high note. Figure 5, where the heck is less elastic

    supply reaction function of the fame of the hacker community , politics affects the stability

    drops to hack the Q'H Q '' H. When supply is more elastic than the hack hacking backlash

    from the community, however, is true. Figure 6 a perverse effect on politics. Increases the

    cost of the anti - piracy that led directly to the compromised more, not less. In particular,

    the increase in the amount of HK Q '' H - Q'H a. Perhaps surprisingly, stiffer penalties for

    piracy imposed by law, to further enhance the reputation driven hack.

    In light of the contradictory effects of the policy in each of these cases, the question

    arises: which of them is likely to be a real industry reputation based on characters trick?

    The elasticity of supply known as hackers ' ability to meet the growing demand

    additional depends heavily hacked hacking. Since the marginal cost of piracy is positive

    and increases with additional output, it is reasonable the hack is fairly inelastic, at least in

    an output range.

  • 7/27/2019 Final Group Project on Hacking

    27/30

    Group Project on Hacking 27

    In contrast, Heck reputation, it seems quite elastic. The logic here is simple. The

    final cost of fame is very low, if not zero, the hacker community. Unlike the loss of money

    , which included victimize successive major options such as increasing the price paid ,

    provided that the celebrity is essentially no cost. Increasing fame hack

    The "pay a heck of a lot cheaper. Their person and power "(2002: 114). Whilst it is

    possible to develop a number of celebrities, fame, winning the negative sum game. This

    means that the hacker known by others members of their community grants is relatively

    sensitive to changes in the supply of hacking. Tender a perverse effect.

    These policies are subject to change in response to the hacking community right-to-

    left instead of moving the supply curve.

    At least some of the actions that can be taken in this direction there. Unfortunately,

    towards the end of the flagrant violations of basic civil liberties that many will disagree.

    For example, we have discussed above, one of the ways that the hacker community has

    established a reputation for innovative hackers published in magazines and books. Hackers

    hack to the reputation of the publication ban does not, but is likely to be forced to find

    ways of encouraging more costly to hackers and fame. It can work against the public

    bulletin boards and mailing lists has been hacked. Hackers forbid hackers programs, tips,

    etc., is more expensive for the hacker community known for its awards, innovative

    hackers. Again, the obvious reasons, well, the process is like it is hated. However, they

    can remain effective tool for reducing the amount of piracy celebrity driven

    7. Conclusion

    While computer hackers constitutes a major security concern for individuals, businesses

    and public institutions across the globe, hacking and hackers underground culture remains

  • 7/27/2019 Final Group Project on Hacking

    28/30

    Group Project on Hacking 28

    much of a black box for both lawmakers and those vulnerable to hacker attacks. The

    mystery that surrounds much of hacking prevents us from arriving at definitive solutions

    to the security problem it poses; but our analysis provides at least tentative insights for

    dealing with this problem.

    Analyzing computer hacking through the lens of economics gives rise to several

    suggestions in this vein. First, it is critical to recognize that are different kinds of hackers

    characterized by disparate motivations. Because of this, the most effective method of

    Reducing the risk posed by hackers in general will tailor legislation in such a way as to

    target different classes of hackers differentially. We looked at fame-driven and profit-

    driven hackers and showed how punishment appropriate for one may actually worsen the

    problem generated by the other. Current policy directed at reducing hacking by affecting

    the supply side effectively reduces the quantity of bad profit-driven hacking. Fortunately,

    there are also good reasons to think that this policy effectively reduces the quantity of

    fame-driven hacking. If, however, there were strong reasons to think that the elasticities

    characterized in Figure 6 prevailed over those in Figure 5, supply management that raises

    the cost of hacking would exacerbate instead of reduce the quantity of fame-driven

    hacking. We have suggested why we believe this is unlikely to be the case. Still, because

    of its contradictory policy implications it is important to investigate this issue further.

    Our analysis has only touched upon the many and complicated issues regarding

    computer hacking. In particular, we have not given adequate attention to good hackers

    who are driven neither by fame nor money,but who voluntarily report security weaknesses

    to vulnerable computer operators. While the behavior of these hackers is still illegal, it

    may play an important role in helping to prevent the attacks of more malicious hackers.

    We have also not paid sufficient attention to the potential impact that tailoring

    hacking-related punishments to the age group of the perpetrator may hold for reducing the

  • 7/27/2019 Final Group Project on Hacking

    29/30

    Group Project on Hacking 29

    security threat posed by computer hackers. We noted that most hackers are relatively

    youngunder the age of 30. While this demographic generally cuts across fame-driven

    and profit-driven hacking groups, there is some evidence suggesting that a

    disproportionate number of profit-driven hackers are above this age threshold.

    The different ages of the individuals in these two different groups suggests that

    punishments designed to hit each age group where it hurts will be more effective in

    reducing hacking than a one-size-fits-all approach that may deter the members of one

    group who are older, but do little to deter the other class of hackers who are younger. In

    other words, we may want to punish fame-driven hacking, where hackers are younger,

    with one kind of punishment that deters younger individuals, and punish bad profit-driven

    hacking, where hackers are older, with another kind of punishment. This seems relatively

    simple and yet to our knowledge has not yet been addressed in policy discussions.

    Presumably 14 year-old script kiddies and 50 year-old men value different things, so

    effective deterrence will mean differential punishments.

    If even after considering these issues it is decided that a uniform punishment for all

    types of hacking (fame or profit-driven) is desirable, it will still be wise in developing

    legislation for dealing with hackers to take into consideration the fact that it will inevitably

    apply primarily to young men. This suggests that effective punishment might be

    unconventional even if it is uniform across types of hacking. We leave issues like these for

    future research.

    Reference

    www.google.com: some Informations have been taken from google search engine

    Wikipedia: This website helped a lot in completion of this project some general knowledge

    taken from Wikipedia and implemented in the project

  • 7/27/2019 Final Group Project on Hacking

    30/30


Recommended