Preview

Kevin Mitnick

Better Essays
Open Document
Open Document
1277 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Kevin Mitnick
The word hacker in today’s society has many meaning, but the definition that I will be talking about in this paper is best described by dictionary.com as, “One who uses programming skills to gain illegal access to a computer network or file.”[1] According to wikipedia.com there are three different types of hackers, white hat hackers, grey hat hackers and black hat hackers. A white hat hackers is, “. . .a person who is ethically opposed to the abuse of computer systems. Realizing that the Internet now represents human voices from all around the world makes the defense of its integrity an important pastime for many.”[2] A grey hat hacker is, “. . .a skilled hacker who sometimes acts legally and in good will and sometimes not. They are a hybrid between white and black hat hackers. They hack for no personal gain and do not have malicious intentions, but occasionally may or may not commit crimes in their actions.”[3] And lastly a black hat hacker is, “a malicious or criminal person whose correct label is "cracker". . .Usually a Black Hat refers to a person that maintains knowledge of the vulnerabilities and exploits they find as secret for private advantage, not revealing them either to the general public or manufacturer for correction.”[4] One of the world’s most notorious black hat hackers goes by the alias Condor, named after the Robert Redford movie, “Three Day’s of the Condor”[7]. This is none other than the notorious, Kevin Mitnick. He has been a major thorn in the side of many companies computer networks since the beginning. His first major “crack” was in 1979, “. . .when a friend gave him the phone number for the Ark, the computer system at Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. He broke into DEC's computer network and copied DEC's software. . .”[5] This in turn gave him not only the ability to make free phone calls but also listen in and eavesdrop on anyone he pleased.[6] Kevin’s first run-in

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It530

    • 681 Words
    • 3 Pages

    hacking. In what ways does ethical hacking differ from “black hat” hacking? Put yourself into the…

    • 681 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    Who Are Hackers ­ A Hacker 's Tools Of The Trade | Hackers | FRONTLINE | PBS. (n.d.).…

    • 820 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Kevin K. Kumashiro

    • 403 Words
    • 2 Pages

    Kevin K. Kumashiro, Ph.D., is currently the dean of Education at the University of San Francisco. He is a master at educational policy, reform teacher preparation, school, and educational equity and social justice, with many accomplishments as a scholar, educator, leader, and advocate. He has been a teacher in schools and colleges across the US and in many diffirent countries, and he has worked as a consultant for school districts, organizations, and state and federal agencies.…

    • 403 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    ARTICLE SUMMARY

    • 1028 Words
    • 7 Pages

    An ethical hacker is a person who performs most of the same activities a cracker does, but with the owner or company’s permission.…

    • 1028 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    kevin

    • 8848 Words
    • 29 Pages

    Buck, M. L. (2011). Intravenous Acetaminophen Use in Infants and Children. Retrieved from Medscape Multispecialty: http://www.medscape.com/viewarticle/742445_2…

    • 8848 Words
    • 29 Pages
    Powerful Essays
  • Satisfactory Essays

    Final Exam Paper

    • 491 Words
    • 2 Pages

    ____ are hackers of limited skill who use expertly written software to attack a system…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A gray hat may gain unauthorized access to a computer system to raise awareness—expose flaws to improve security—of a stubborn or uninformed administrator. Although there is no malicious intent, the lack of authorization creates a criminal act that can be prosecuted if received poorly.…

    • 413 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Michael Klein

    • 815 Words
    • 4 Pages

    Michael offers common ground for choreographers. The dance space is no longer studio space but instead an excavation site. In a communal setting, choreographers dig to find movement from the inner self. Use all of your superpowers when digging. Strategies are given and we are asked to dig in all directions, to listen to ourselves and to change anything we need to be comfortable. We may move as much as we want, when we want or not move at all. Personally, I thrive in this type of environment. Without any consideration, I have created a similar type of workspace. In this clearing, the choreographer can see and hear again. To explore our space, Michael asks us to smell the ground. We are…

    • 815 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Kevin

    • 3225 Words
    • 13 Pages

    The first book begins with an introduction to Gregory "Greg" Heffley and his middle school life. It takes place during his first year of middle school. The book also explains the "Cheese Touch" early on. It is just like cooties but more intense. In the book, a kid named Darren Walsh touches the cheese with his finger. It is passed around the school, and later gets to Abe Hall, who moved to California still holding the Cheese Touch.…

    • 3225 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Kevin Lynch

    • 5015 Words
    • 21 Pages

    At every instant, there is more than the eye can see, more than the ear can…

    • 5015 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    Hacktivism Ethics

    • 7214 Words
    • 29 Pages

    E. Spafford, "Are Computer Hacker Break-ins Ethical?," in Computers and Ethics in the Cyberage, D. M. Hester and P. J. Ford, Eds. Upper Saddle River, New Jersey: Prentice Hall, 2001, pp. 332-344.…

    • 7214 Words
    • 29 Pages
    Powerful Essays
  • Good Essays

    Computer Crime In America

    • 929 Words
    • 4 Pages

    of the Internet. All of these factors plus the fact of more and more business…

    • 929 Words
    • 4 Pages
    Good Essays