AuthorsDen.com   Join Free! | Login    
   Popular! Books, Stories, Articles, Poetry
Where Authors and Readers come together!

SIGNED BOOKS    AUTHORS    eBOOKS new!     BOOKS    STORIES    ARTICLES    POETRY    BLOGS    NEWS    EVENTS    VIDEOS    GOLD    SUCCESS    TESTIMONIALS

Featured Authors:  James McClelland, iPamela Taeuffer, iErnest Paquin, iGeorg Mateos, iGreg Pendleton, iKarl Morgan, iLinda Alexander, i

  Home > Internet > Articles Popular: Books, Stories, Articles, Poetry     

Carl J Tengstrom

· + Follow Me
· Contact Me
· Books
· Articles
· 5 Titles
· 2 Reviews
· Save to My Library
· Share with Friends!
·
Member Since: May, 2012

Carl J Tengstrom, click here to update your pages on AuthorsDen.




Featured Book
Swift Boat Down, The Real Story of the Sinking of PCF-19
by James Steffes

This book is an eye--witness testimony to a tragic incident in the Vietnam War...  
BookAds by Silver
Gold and Platinum Members


Books by Carl J Tengstrom

Threats To Information Security
by Carl J Tengstrom   
Rated "G" by the Author.
Last edited: Friday, May 04, 2012
Posted: Friday, May 04, 2012

  Print   Save    Follow    Share 

Recent articles by
Carl J Tengstrom

Falling In Love When Retired
Dog Life
The Law And Morality
           >> View all

The absence of routine security precautions can make it a lot easier for unlawful attempts on computer systems to occur. Both the intruder and the person who has not taken proper security measures may be held liable for what happens.

Different Kinds of Computer Crimes

You may divide the typical crimes related to computers in four different groups:

  1. Assault against the results of the computer processing
  2. Damage of the software
  3. Computer espionage
  4. Damage of the hardware

The Extent of Computer Crimes

The technical character of computing is such that it opens possibilities and opportunities for crime in quite a different way than traditional crime does. By nature it is very hard to discover a computer crime and to follow its path.

In fact, the computing technique is not perfect in itself. That makes it even harder to tell if there has been a technical disturbance, a natural malfunction, or if an intruder willingly has manipulated the system in a criminal way.

Four different facts seem to be especially important when we try to discover why some people are prepared to commit crime.

  1. The person's attitude towards morals and norms
  2. The person's motives (psychological, economical, etc.)
  3. The person's apprehension to the risk of being discovered and
  4. The opportunity

You may ask yourself what reasons you have to take some security measures in the system. It is, of course, important to weigh the costs of a security system against the importance of confident technique in the information system, the costs of an intrusion in the computing system, and finally, yet importantly, the possibility of being sued for damages as a result of the lacking information system and the ethical instability.

Recently there have been several attacks of viruses pointed against big companies all around the world. Today you could read in the paper that a recent security flaw has been discovered in a program's email clients. According to the author it would be possible for a hacker using this hole in the system to open up your computer and completely take charge of it through an email that has been received by the email program. It isn't even necessary to open the email; the malicious code would take control of the computer before you even have had a chance to read and delete the email. Recently, there have been several quite severe alarms about security flaws concerning products of a well-known company. Undoubtedly the question comes to mind if the company deliberately incorporates a low level of security. The customers are those who in this manner try out the products. When a flaw appears in the security system of a product, the company eventually hands out a patch to resolve the problem.

Two different parties discovered the vulnerability above independently of each other. They contacted the company that had made the email programs and agreed not to publish the vulnerability until a patch was in place.

It gives us something to think about when you learn that even security companies agree to be silent about email viruses of this kind. With this virus' capability to spread, it is much more dangerous than previous ones. This way of handling a severe attack must be considered highly unethical.

Information security breaches appear in six areas of risk:

  • Electronic (hacking and related) risk
  • Malicious code (virus, Trojan worm and related) risk
  • Privacy risk
  • Downtime risk
  • Physical risk
  • Human factors risk

The Hacker's Ethics

In his book, Hackers: Heroes of the Computer Revolution, Steven Levy introduced the following six guidelines:

  1. Access to computers -- and anything, which might teach you something about the way the world works -- should be unlimited and total. Always yield to the Hands-On imperative!
  2. All information should be free.
  3. Mistrust authority -- promote decentralization.
  4. Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race or position.
  5. You can create art and beauty on a computer.
  6. Computers can change your life for the better.

This creed was expanded with three principles published in PHRACK, the "official" hacker newsletter:

  • First, hackers reject the notion that "businesses" are the only groups entitled to access and use of modern technology.
  • Second, hacking is a major weapon in the fight against encroaching computer technology.
  • Finally, the high cost of equipment is beyond the means of most hackers, which results in the perception that hacking and phreaking are the only recourse to spreading computer literacy to the masses.

Someone upholding ethical and legal rules of the society cannot take these "rules" seriously. But they still give us something to think about. Hackers usually acknowledge that their activities may occasionally be illegal. Nevertheless, a considerable amount of energy is placed on limiting violations only to those required to obtain access and learn a system. The hackers are hostile towards those who go beyond these limits.



Want to review or comment on this article?
Click here to login!


Need a FREE Reader Membership?
Click here for your Membership!


Popular Internet Articles
  1. AuthorsDen on Facebook
  2. Something is 'not quite right'
  3. Why are our children and teenagers not pro
  4. B.O.W. Problem
  5. Star Controllers
  6. Enjoying Self-Espression and the Net in ou
  7. Harpies and Magpies on the Internet

Patriot Schemes by Charles Neff

Four individuals in as many locations discover pieces of a conspiracy in progress; they meet, share information, and work together to avert the plot...  
BookAds by Silver, Gold and Platinum Members

With Love Stan: A Soldiers Letters From Vietnam To The World by Karen Epp

A primary source book, a compilation of Sp4 Stanley D. Ross's letters home from the front lines of Vietnam in 1969.Photographs and recollections of the men who served with Karen Ro..  
BookAds by Silver, Gold and Platinum Members

Authors alphabetically: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Featured Authors | New to AuthorsDen? | Add AuthorsDen to your Site
Share AD with your friends | Need Help? | About us


Problem with this page?   Report it to AuthorsDen
AuthorsDen, Inc. All rights reserved.