IDEAS home Printed from https://ideas.repec.org/a/aat/journl/y2014i4p85-103.html
   My bibliography  Save this article

National Security & Reducing Of Cyber-Attack Risks

Author

Listed:
  • Elena BADARAU

    (prof., IRIM)

Abstract

When ordinary computer user hears the word “hacker”, most think of a dodgy internet criminal who breaks in to government intelligence files or steal people’s identities and credit card information. For the more tech savvy, however, the term is not just limited to people who use their ability for crime. By “hackers” they mean computer experts who can create and alter computer code and enter computer systems undetected. Hackers can be divided into 3 head categories depending on their intentions: White hat hackers: non-malicious hackers, like company employees who test the security of the firm’s own computer system by trying to break into it. Black hat hackers/crackers: malicious hackers, also known as crackers, who hack into systems with the intent to steal or vandalize. Grey hat hackers: in between the white hat and the black hat hacker, grey hats sometimes act illegally. They will for example break through a system without authorization in order to put vulnerabilities on show and then charge the owner a fee to repair it. The word “hackers” used in the computer sense appeared for the first time in 1963 in the MIT (Massachusetts Institute of Technology) paper “The Tech”. It was used to describe pranks involving technology. Members of MIT\’s Tech Model Railroad Club had begun working with a computer and started applying the model railroad slang to computers. MIT became the building ground for the very first computer hackers and their experiments. In the early days, the 70’s and 80’s, the term “hacker” was used to describe a visionary programmer, passionate about coming up with new ways to use a computer – building new programs and systems. Computer company executives like Steve Jobs, Steve Wozniak and Bill Gates were all hackers back in the day. Today, the phrase is used more about individuals who enter systems and work with code, rather than with reference to software creators. Here on the BullGuard website you will often see the phrase “internet criminals”, as an umbrella-term covering the people we try to protect the ordinary user from today. At the turn of the millennium, internet access at home was becoming a normal commodity and with this followed new practical online possibilities like online banking and shopping. Useful as the new possibilities were, they also opened the door for a part of the underground community of hackers, virus writers etc. to take their activities to the next level and make money off their illegal hobbies. This was the case for some, while others put their abilities to good use by working for companies or governments. The days when virus creators spread out infections with the purpose of making a name for themselves are gone. Nowadays cybercrime is better organized than ever and is becoming a multimillion dollar “business”. Moreover, the increasing popularity of social networking sites has attracted the attention of cyber criminals which exploit these in every possible way gaining significant financial benefits. Cyber fraud caused by Internet criminals accounts for approximately 60 million pounds in UK only and it is likely to move away from home users and concentrate on companies targeting larger amounts of money.

Suggested Citation

  • Elena BADARAU, 2014. "National Security & Reducing Of Cyber-Attack Risks," Economy and Sociology, The Journal Economy and Sociology, issue 4, pages 85-103.
  • Handle: RePEc:aat:journl:y:2014:i:4:p:85-103
    as

    Download full text from publisher

    File URL: https://old.economy-sociology.ince.md/?edmc=886
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:aat:journl:y:2014:i:4:p:85-103. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Iordachi Victoria (email available below). General contact details of provider: https://edirc.repec.org/data/iefscmd.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.