International Journal of Scientific and Research Publications, Volume 5, Issue 6, June 2015
ISSN 2250-3153
X. C RIMINALIZATION
Legislators and law enforcement began to get serious about
criminalizing and prosecuting these activities in the mid-1980s.
Congress passed its first hacking-related legislation, the Federal
Computer Fraud and Abuse Act, in 1986. The act made computer
tampering a felony crime punishable by significant jail time and
monetary fines. By the mid-1990s several high- profile arrests
had taken place and signalled the seriousness with which
government and businesses were dealing with these activities.
Kevin Mitnick, perhaps the best known hacker of this era, was
arrested twice, served significant jail time, and was barred from
touching a computer for several years after completing his
sentence.
company but rather scan for opportunities to disrupt and
vandalize systems. Most “hackers” and “hacking” events
reported on by the popular press are actually of this type.
R EFERENCES
[1]
[2]
[3]
[4]
[5]
XI. HACKER GOOD, CRACKER BAD
Although the term “hacker” is in widespread use, the sense
in which it is employed is generally incorrect. Popular media and
entertainment providers have long used it to describe anyone
who tampers with a system, particularly in connection to criminal
activity. This journalistic misuse of the name upset many
“traditional” hackers, who responded to the vilification of their
good name by offering a new term for these individuals:
“crackers.” Crackers are vandals and thieves whose sole purpose
is unauthorized “cracking” into secure systems for personal
gain.5 This darker side of hacking has three main motivations
with varying degrees of harm. The most benign cracks are
attempts to gain unauthorized access in order to satisfy a personal
motive such as curiosity or pride. More malicious cracking seeks
to gain unauthorized access in order to tamper with or destroy
information. The goal of the most serious and professional
crackers is unauthorized access to systems or computer services
in order to steal data for criminal purposes. Systems commonly
under attack are universities, government agencies, such as the
Department of Defence and NASA, and large corporations such
as electric utilities and airlines. Many crackers are professional
criminals involved in corporate or government espionage and
have links to organized crime. A relative newcomer to the
“hacker” field, script kiddies are another break-off group
mistakenly called hackers by the media. A lower form of
crackers, script kiddies are not particularly knowledgeable about
computer and networking details. Instead, they download ready-
made tools to seek out weaknesses on systems accessible via the
Internet. They do not target specific information or a specific
4
[6]
.
Stallman, Richard.
“The GNU Manifesto.” The New Media Reader. Eds. Noah Wardrip-Fruin
and Nick Môn fort. Cambridge: MIT Press, 2003. Sterling, Bruce.
Encyclopaedia Britannica. 2003. Encyclopaedia Britannica Premium
Service. 28 Oct, 2003 .
Cyber
Terrorism.
Online.
Discovery
Communications.
28Oct.2003. Quittner, Jeremy.
Hacker
Psych
101.
Online.
Discovery
Communications.
28Oct.2003..
Hackers: Methods of Attack and Defense. Online. Discovery
Communications.28Oct.2003
.
A UTHORS
First Author – Susidharthaka Satapathy persuing Master in
Computer Application from O.U.A.T, Odisha,
India in 2012-2015.He is working in the area of
Ethical Hacking for last 6 months., Email:
[email protected]
Second Author – Dr.Rasmi Ranjan Patra received Master In
Computer Application With 1st Class With
distinction fromO.U.A.T, Odisha, India in 2001,
M.Tech in Computer Science and Technology
from C.E.T Bhubaneswar ,India in 2010 and PhD
Degree in 2013 from Utkal University, India .He
is working as Assistant professor in Department of Computer
Science and Application under Orissa University of Agriculture
and Technology(O.U.A.T).He has Published many papers at
national /international Journals and Conferences in the areas of
Sensor Network, Soft Computing, Cloud computing and Big
data. Mr. Patra has authorized one book in Computer Science
area., Email: [email protected]
www.ijsrp.org