+ 1-888-787-5890  
   + 1-302-351-4405  
 
 
 
 

Essay/Term paper: Wire pirates

Essay, term paper, research paper:  Technology

Free essays available online are good but they will not follow the guidelines of your particular writing assignment. If you need a custom term paper on Technology: Wire Pirates, you can hire a professional writer here to write you a high quality authentic essay. While free essays can be traced by Turnitin (plagiarism detection program), our custom written essays will pass any plagiarism test. Our writing service will save you time and grade.



Wire Pirates

Someday the Internet may become an information superhighway, but right now it is
more like a 19th-century railroad that passes through the badlands of the Old
West. As waves of new settlers flock to cyberspace in search for free
information or commercial opportunity, they make easy marks for sharpers who
play a keyboard as deftly as Billy the Kid ever drew a six-gun.

It is difficult even for those who ply it every day to appreciate how much the
Internet depends on collegial trust and mutual forbearance. The 30,000
interconnected computer networks and 2.5 million or more attached computers that
make up the system swap gigabytes of information based on nothing more than a
digital handshake with a stranger.

Electronic impersonators can commit slander or solicit criminal acts in someone
else's name; they can even masquerade as a trusted colleague to convince someone
to reveal sensitive personal or business information.

"It's like the Wild West", says Donn B. Parker of SRI: "No laws, rapid growth
and enterprise - it's shoot first or be killed."

To understand how the Internet, on which so many base their hopes for education,
profit and international competitiveness, came to this pass, it can be
instructive to look at the security record of other parts of the international
communications infrastructure.

The first, biggest error that designers seem to repeat is adoption of the
"security through obscurity" strategy. Time and again, attempts to keep a system
safe by keeping its vulnerabilities secret have failed.

Consider, for example, the running war between AT&T and the phone phreaks. When
hostilities began in the 1960s, phreaks could manipulate with relative ease the
long-distance network in order to make unpaid telephone calls by playing certain
tones into the receiver. One phreak, John Draper, was known as "Captain Crunch"
for his discovery that a modified cereal-box whistle could make the 2,600-hertz
tone required to unlock a trunk line.

The next generation of security were the telephone credit cards. When the cards
were first introduced, credit card consisted of a sequence of digits (usually
area code, number and billing office code) followed by a "check digit" that
depended on the other digits. Operators could easily perform the math to
determine whether a particular credit-card number was valid. But also phreaks
could easily figure out how to generate the proper check digit for any given
telephone number.

So in 1982 AT&T finally put in place a more robust method. The corporation
assigned each card four check digits (the "PIN", or personal identification
number) that could not be easily be computed from the other 10. A nationwide on-
line database made the numbers available to operators so that they could
determine whether a card was valid.

Since then, so called "shoulder surfers" haunt train stations, hotel lobbies,
airline terminals and other likely places for the theft of telephone credit-card
numbers. When they see a victim punching in a credit card number, they transmit
it to confederates for widespread use. Kluepfel, the inventor of this system,
noted ruefully that his own card was compromised one day in 1993 and used to
originate more than 600 international calls in the two minutes before network-
security specialists detected and canceled it.

The U.S. Secret Service estimates that stolen calling cards cost long distance
carriers and their customers on the order of 2.5 billion dollars a year.

During the same years that telephone companies were fighting the phone phreaks,
computer scientists were laying the foundations of the Internet. The very nature
of Internet transmissions is based on a very collegial attitude. Data packets
are forwarded along network links from one computer to another until they reach
their destination. A packet may take dozen hops or more, and any of the
intermediary machines can read its contents. Only a gentleman's agreement
assures the sender that the recipient and no one else will read the message.

But as Internet grew, however, the character of its population began changing,
and many of the newcomers had little idea of the complex social contract. Since
then, the Internet's vulnerabilities have only gotten worse. Anyone who can
scrounge up a computer, a modem and $20 a month in connection fees can have a
direct link to the Internet and be subject to break-ins - or launch attacks on
others.

The internal network of high-technology company may look much like the young
Internet - dozens or even hundreds of users, all sharing information freely,
making use of data stored on a few file servers, not even caring which
workstation they use to accessing their files. As long as such an idyllic little
pocket of cyberspace remains isolated, carefree security systems may be
defensible. System administrators can even set up their network file system to
export widely used file directories to "world" - allowing everyone to read them
- because after all, the world ends at their corporate boundaries.

It does not take much imagination to see what can happen when such a trusting
environment opens its digital doors to Internet. Suddenly, "world" really means
the entire globe, and "any computer on the network" means every computer on any
network. Files meant to be accessible to colleagues down the hall or in another
department can now be reached from Finland or Fiji. What was once a private line
is now a highway open to as much traffic as it can bear.

If the Internet, storehouse of wonders, is also a no-computer's land of
invisible perils, how should newcomers to cyberspace protect themselves?
Security experts agree that the first layer of defense is educating users and
system administrators to avoid the particularly stupid mistakes such as use no
passwords at all.

The next level of defense is the so called fire wall, a computer that protects
internal network from intrusion. To build a fire wall you need two dedicated
computers: one connected to the Internet and the other one connected to the
corporation's network. The external machine examines all incoming traffic and
forwards only the "safe" packages to its internal counterpart. The internal
gateway, meanwhile, accepts incoming traffic only from the external one, so that
if unauthorized packets do somehow find their way to it, they cannot pass.

But other people foresee an Internet made up mostly of private enclaves behind
fire walls. A speaker of the government notes, "There are those who say that
fire walls are evil, that they are balkanizing the Internet, but brotherly love
falls on its face when millions of dollars are involved".

In the meantime, the network grows, and people and businesses ent

 

Other sample model essays:

Technology / Hacking
Hacking Jenna Gray p.1 Another one got caught today, it's all over the papers. "Teenager Areested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"....Damn kids. They're a...
Technology / Hacking
Hacking Contents ~~~~~~~~ This file will be divided into four parts: Part 1: What is Hacking, A Hacker's Code of Ethics, Basic Hacking Safety Part 2: Packet Switching Netw...
Knowledge is Power: How To Buy A Computer Buying a personal computer can be as difficult as buying a car. No matter how much one investigates, how many dealers a person visits, and how much ba...
Internet / The Internet
The Internet BY ALNUR ISAMIL 8-6 Introduction w What is the internet? w Why you should have it? w I have it Body w Who sells the internet? w Equipment that's...
Information Technology / Morality And Ethics And Computers
Morality and Ethics and Computers There are many different sides to the discussion on moral and ethical uses of computers. In many situations, the morality of a particular use of a comput...
Internet / Neural Networks
Neural Networks A neural network also known as an artificial neural network provides a unique computing architecture whose potential has only begun to be tapped. They are used to address ...
Internet / Software Piracy
Software Piracy Software piracy is the failure of a licensed user to adhere to the conditions of a software license or the unauthorized use or reproduction of copyrighted software by a per...
Internet / Software Piracy
Software Piracy What is Software Piracy The PC industry is just over 20 years old. In those 20 years, both the quality and quantity of available software programs have increased dramaticall...
Internet / Telecommuting
Telecommuting As defined in Webster's New World Dictionary, Third Edition, telecommuting is "an electronic mode of doing work outside the office that traditionally has been done in the off...
The Communications Decency Act The Communications Decency Act that was signed into law by President Clinton over a year ago is clearly in need of serious revisions due, not only to its vag...
Experience with Dream Essay - Reliable and great customer service. Quality of work - High quality of work.
, ,
Dream Essay - Very reliable and great customer service. Encourage other to try their service. Writer 91463 - Provided a well written Annotated Bibliography with great deal of detail per th
, ,
it is always perfect
, ,
The experience with Dream Essay is stress free. Service is excellent and forms various forms of communication all help with customer service. Dream Essay is customer oriented. Writer 17663
, ,
Only competent & proven writers
Original writing — no plagiarism
Our papers are never resold or reused, period
Satisfaction guarantee — free unlimited revisions
Client-friendly money back guarantee
Total confidentiality & privacy
Guaranteed deadlines
Live Chat & 24/7 customer support
All academic and professional subjects
All difficulty levels
12pt Times New Roman font, double spaced, 1 inch margins
The fastest turnaround in the industry
Fully documented research — free bibliography guaranteed
Fax (additional info): 866-332-0244
Fax (additional info): 866-308-7123
Live Chat Support
Need order related assistance?—Click here to submit a inquiry
© Dreamessays.com. All Rights Reserved.
Dreamessays.com is the property of MEDIATECH LTD