Articles Ethical Hacking | Page 4

International Journal of Scientific and Research Publications, Volume 5, Issue 6, June 2015 ISSN 2250-3153 X. C RIMINALIZATION Legislators and law enforcement began to get serious about criminalizing and prosecuting these activities in the mid-1980s. Congress passed its first hacking-related legislation, the Federal Computer Fraud and Abuse Act, in 1986. The act made computer tampering a felony crime punishable by significant jail time and monetary fines. By the mid-1990s several high- profile arrests had taken place and signalled the seriousness with which government and businesses were dealing with these activities. Kevin Mitnick, perhaps the best known hacker of this era, was arrested twice, served significant jail time, and was barred from touching a computer for several years after completing his sentence. company but rather scan for opportunities to disrupt and vandalize systems. Most “hackers” and “hacking” events reported on by the popular press are actually of this type. R EFERENCES [1] [2] [3] [4] [5] XI. HACKER GOOD, CRACKER BAD Although the term “hacker” is in widespread use, the sense in which it is employed is generally incorrect. Popular media and entertainment providers have long used it to describe anyone who tampers with a system, particularly in connection to criminal activity. This journalistic misuse of the name upset many “traditional” hackers, who responded to the vilification of their good name by offering a new term for these individuals: “crackers.” Crackers are vandals and thieves whose sole purpose is unauthorized “cracking” into secure systems for personal gain.5 This darker side of hacking has three main motivations with varying degrees of harm. The most benign cracks are attempts to gain unauthorized access in order to satisfy a personal motive such as curiosity or pride. More malicious cracking seeks to gain unauthorized access in order to tamper with or destroy information. The goal of the most serious and professional crackers is unauthorized access to systems or computer services in order to steal data for criminal purposes. Systems commonly under attack are universities, government agencies, such as the Department of Defence and NASA, and large corporations such as electric utilities and airlines. Many crackers are professional criminals involved in corporate or government espionage and have links to organized crime. A relative newcomer to the “hacker” field, script kiddies are another break-off group mistakenly called hackers by the media. A lower form of crackers, script kiddies are not particularly knowledgeable about computer and networking details. Instead, they download ready- made tools to seek out weaknesses on systems accessible via the Internet. They do not target specific information or a specific 4 [6] . Stallman, Richard. “The GNU Manifesto.” The New Media Reader. Eds. Noah Wardrip-Fruin and Nick Môn fort. Cambridge: MIT Press, 2003. Sterling, Bruce. Encyclopaedia Britannica. 2003. Encyclopaedia Britannica Premium Service. 28 Oct, 2003 . Cyber Terrorism. Online. Discovery Communications. 28Oct.2003. Quittner, Jeremy. Hacker Psych 101. Online. Discovery Communications. 28Oct.2003.. Hackers: Methods of Attack and Defense. Online. Discovery Communications.28Oct.2003 . A UTHORS First Author – Susidharthaka Satapathy persuing Master in Computer Application from O.U.A.T, Odisha, India in 2012-2015.He is working in the area of Ethical Hacking for last 6 months., Email: [email protected] Second Author – Dr.Rasmi Ranjan Patra received Master In Computer Application With 1st Class With distinction fromO.U.A.T, Odisha, India in 2001, M.Tech in Computer Science and Technology from C.E.T Bhubaneswar ,India in 2010 and PhD Degree in 2013 from Utkal University, India .He is working as Assistant professor in Department of Computer Science and Application under Orissa University of Agriculture and Technology(O.U.A.T).He has Published many papers at national /international Journals and Conferences in the areas of Sensor Network, Soft Computing, Cloud computing and Big data. Mr. Patra has authorized one book in Computer Science area., Email: [email protected] www.ijsrp.org