Blog No. 2


Top 10 most notorious hackers in the world

Kevin Mitnick

FBI most wanted hacker in 1990. He was charged with stealing computer manuals from Pacific Bell. Throughout his hacking career, Mitnick didn’t spread the access and data he’d obtained. While it’s rumored that he obtained full control of Pacific Bell’s network, Mitnik wasn’t out to exploit the results, but wanted to prove it could be done. A warrant was issued for his arrest for the Pacific Bell incident, but he was not caught because he hides for two years. When caught, he went to prison for multiple counts of wire fraud and computer fraud. Mitnick ultimately went white hat, but according to Wired, in 2014, he launched “Mitnick’s Absolute Zero Day Exploit Exchange,” which sells unpatched, critical software exploits to the highest bidder.

Anonymous

The group exhibits little organization and is loosely focused on the concept of social justice. For example, in 2008 the group took issue with the Church of Scientology and begin disabling their websites, it results in negative impact on there search rankings in Google and overwhelming its fax machines with all-black images. In March 2008, a group of “Anons” marched passed Scientology centers around the world wearing the now-famous Guy Fawkes mask. As noted by The New Yorker, while the FBI and other law enforcement agencies have tracked down some of the group’s more prolific members, the lack of any real hierarchy makes it almost impossible to eliminate Anonymous as a whole.

Adrian Lamo

Used an unprotected content management tool at Yahoo to modify a Reuters article and add a fake quote attributed to former Attorney General John Ashcroft. In 2010, 29-year-old Lamo learned he had Asperger’s Disorder, a mild form of Autism often called “geek syndrome” because people with Asperger’s have trouble with simple social interactions and display odd, highly focused behavior. Many experts believe this explains Lamo’s entry into the world of hacking culture Asperger’s Disorder is reportedly prevalent among the hacking community.

Albert Gonzalez

Stole more than 180 million payment card accounts from companies including OfficeMax, Dave and Buster’s and Boston Market. During his time as a paid informant, Gonzalez, along with a group of accomplices, continued his criminal activities and stole more than 180 million payment card accounts from companies including OfficeMax, Dave and Buster’s and Boston Market. The notes that Gonzalez’s 2005 attack on US retailer TJX was the first serial data breach of credit information. Using SQL injection, this famous hacker and his team created back doors in several corporate networks and stole an estimated $256 million from TJX alone. During his sentencing in 2015, the federal prosecutor called Gonzalez’s human victimization “unparalleled.”

Matthew Bevan and Richard Pryce

Matthew Bevan and Richard Pryce are a team of British hackers who hacked into multiple military networks in 1996, including Griffiss Air Force Base, the Defense Information System Agency and the Korean Atomic Research Institute (KARI). Bevan (Kuji) and Pryce (Datastream Cowboy) have been accused of nearly starting a third world war after they dumped KARI research onto American military systems. Bevan claims he was looking to prove a UFO conspiracy theory, and according to the BBC, his case bears resemblance to that of Gary McKinnon. Malicious intent or not, Bevan and Pryce demonstrated that even military networks are vulnerable.

Matthew Bevan and Richard Pryce are a team of British hackers who hacked into multiple military networks in 1996

Jeanson James Ancheta

Ancheta was curious about the use of bots — software-based robots that can infect and ultimately control computer systems. Using a series of large-scale “botnets,” he was able to compromise more than 400,000 computers in 2005. According to Ars Technica, he then rented these machines out to advertising companies and was also paid to directly install bots or adware on specific systems. Ancheta was given 57 months in prison, and his sentence marked the first time a hacker was sent to jail for the use of botnet technology.

Michael Calce

discovered how to take over networks of university computers and used their combined resources to disrupt the number-one search engine at the time. Within a week, he’d also brought down Dell, eBay, CNN and Amazon using a dedicated denial of service (DDoS) attack that overwhelmed corporate servers and caused websites to crash. Calce’s wake-up call was perhaps the most jarring for investors and Internet proponents. If the biggest website in the world — valued at over $1 billion — could be so easily sidelined, was any online data truly safe? It’s not an exaggeration to say that the development of cybercrime legislation suddenly became a top government priority thanks to Calce’s hack.

Kevin Poulsen

hacked into ARPANET, the Pentagon’s computer network. Poulsen didn’t heed this warning and continued hacking. In 1988, Poulsen hacked a federal computer and dug into files pertaining to the deposed president of the Philippines, Ferdinand Marcos. Discovered by authorities, Poulsen went underground. While he was on the run, Poulsen kept busy, hacking government files and revealing secrets. According to him, in 1990, he hacked a radio station contest and ensured that he was the 102nd caller, winning a brand new Porsche, a vacation, and $20,000.

Jonathan James

hacked into several companies. In 2007, TJX, a department store, was hacked and many customer’s private information were compromised. Authorities suspected James might be involved despite a lack of evidence. Johnathan James eventually killed himself by gunshot in 2008. According to the Daily Mail, James wrote in his suicide note, “I have no faith in the ‘justice’ system. Perhaps my actions today, and this letter, will send a stronger message to the public. Either way, I have lost control over this situation, and this is my only way to regain control.”

ASTRA

he had been hacking into the Dassault Group, for almost half a decade.  However, according to the Register some information has been released about ASTRA, namely that when he was apprehended by authorities in 2008, he was a 58-year old Greek mathematician. Reportedly, he had been hacking into the Dassault Group, for almost half a decade. During that time, he stole cutting edge weapons technology software and data which he sold to 250 individuals around the world. His hacking cost the Dassault Group $360 million in damages. No one knows exactly why his true identity has not been revealed but the word Astra is a Sanskrit word for ‘weapon’.

Reference: https://usa.kaspersky.com/resource-center/threats/top-ten-greatest-hackers

Why is the cost to identify and remove a defect in the early stages of software development might be 100 times less than the cost of removing a defect in software that has been distributed to hundreds of customers

Because in the early stages, the development phase reduces the time, the cost and the resources required for rework. If the cost is not identified in the early stages, some rework of the deliverables produced in the preceding stages must be done. Also, if the later part the error is found, the more people are affected by the error. And also late stages, it will cost money to communicate the details of a defect, distribute and apply software fixes, retrain end-users for a product that has been sold to hundreds of customers. In the present era there are so many solutions that can be found in the internet so that a software defect must be resolve.

Reference: https://www.coursehero.com/file/15135990/9507-3-Discussion-Sheet/

The Three Criteria I consider in Quality System

Responses will vary. The system should meet the needs of its users it should response the way the users wants it. And also the responses must meet the user’s ability to response. The efficiency of a certain product is the most important thing to consider.

 Free from inaccuracies. All of the output of a software must be accurate to what is the specification of the software. Software must be accurate in order to provide customer a trust worthy services. It is highly recommended that in a software it must be accurate to avoid quality management issue.

Be user-friendly. All of the information that needs by the user must be provide. It must be fit in the criteria of the users point of view. The software must be a user friendly because it is the only way to connect users and to gain also a good impression to users. It must be tested through several types of personality and also in different ages.

https://www.oreilly.com/library/view/designing-data-intensive-applications/9781491903063/ch01.html

Leave a comment