Home About IUP Magazines Journals Books Amicus Archives
     
A Guided Tour | Recommend | Links | Subscriber Services | Feedback | Subscribe Online
 
Effective Executive Magazine:
Hacking and Hackers How to Protect yourself
:
:
:
:
:
:
:
:
:
 
 
 
 
 
 
 

Hackers are playing a very important role, though a dubious one, in the phenomenal rise in computer related security incidents. This article discusses the history of hacking, the methodology of attack, and different ways to defend your organization. It also discusses the future of hacking.

During February 2003, hackers broke into Omaha (US) based Data Processing International Inc. (DPI), a company which specializes in processing credit card transactions for the direct marketing and mail order companies. Hackers, according to various reports, stole eight million credit card numbers and other details. According to published reports, this was the largest single incident of theft of credit card information. One can imagine the havoc the hackers could have caused, had the theft not been detected in time. Bibliofind.com, a subsidiary of Amazon.com, however, was not that lucky. On February 2001, the company website's home page was defaced and investigation into the incident led to the discovery that between October 2000 and February 2001, hackers stole the credit card information stored on its servers. The company informed all the affected card holders and the local police, but the damage was already done. Bibliofind.com had to close down their services to repair the damage.

 
 
 

Hackers, Data Processing International Inc. (DPI),credit card transactions,direct marketing,investigation,C Programming language,Federal Computer Fraud,intellectual curiosity,software piracy,game hackers,Scanning, Enumeration and Exploiting.