Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Часть 2 компьютерные преступления.doc
Скачиваний:
3
Добавлен:
14.08.2019
Размер:
188.93 Кб
Скачать

In the news…

Interview with Kevin Mitnick

Kevin David Mitnick (born 1963) is one of the most famous hackers to be jailed. He was arrested by the FBI in 1995. Mitnick was convicted of wire fraud and of breaking into the computer systems of Fujitsu, Motorola, Nokia, and Sun Microsystems. He served five years in prison, where he was restricted from using any communications technology other than a landline telephone. He was released in 2000 and today runs a computer security firm.

In a telephone interview with CNN's Manav Tanneeru, Mitnick talks about his past and the state of online security today.

CNN: You were once the most famous and sought after hacker in the country, and you now run a Web security firm, which is a fascinating evolution.

Mitnick: It's kind of interesting, because hacking is a skill that could be used for criminal purposes or legitimate purposes, and so in the past I was hacking for the curiosity, and the thrill, to get a bite of the forbidden fruit of knowledge, I'm now working in the security field and it is really rewarding to know that I can take my background and skills and knowledge and really help the community.

CNN: Compared to the time you were an illegal hacker, and the contemporary landscape, how easy is it to hack a computer? Has security improved much? Would you still be able to do what you did years ago?

Mitnick: I get hired to hack into computers now and sometimes it's actually easier than it was years ago. What about the security landscape, the only thing that's changed in regards to vulnerability are technical issues, but with social engineering, it's all remained the same. So, it depends how vigilant the owners and the operators of the computer systems and the network are, and it really doesn't go to the question of are we living in a more secure world?

CNN: You mentioned social engineering. What exactly does that term mean to you?

Mitnick: Social engineering is using manipulation, influence and deception to get a person, a trusted insider within an organization, to comply with a request, and the request is usually to release information or to perform some sort of action item that benefits that attacker.

CNN: And how do contemporary hackers use social engineering in what they do?

Mitnick: The IRS just did a security audit and called 100 managers posing as IT people at the IRS, and 35 of those mangers freely gave out their password and user name over the telephone. So, it's a significant threat. A company can spend hundreds of thousands of dollars on firewalls, intrusion detection systems and encryption and other security technologies, but if an attacker can call one trusted person within the company and that person complies, and if the attacker gets in, then all that money spent on technology is essentially wasted.

CNN: Do you pay bills online or shop online? I'm just curious if Kevin Mitnick is worried about ID theft?

Mitnick: Somebody already stole my identity once and used it to apply for a cell phone account. That's really easy, because all you need to steal someone's identity is the Social Security number. It's not really rocket science. But, I don't have a problem at all using my credit card online. There are attacks that can be done, but it's unlikely that I'll be targeted as an individual. It's more likely the attackers will target the bank. So that way they can get many user names and passwords, and get access to many accounts, rather than just targeting me.

CNN: Do you miss being on the run?

Mitnick: No, no, I don't miss it all. I like my life now. I made some really stupid mistakes in the past as a younger man that I regret. I'm lucky that I've been given a second chance and that I could use these skills to help the community.

CNN October 2005

Comments

Wire fraud - мошенничество с использованием электронных средств коммуникации (например, телефона)

Social engineering - социотехника (искусство обмана пользователей сети или администраторов, используемая злоумышленниками с целью выведывания паролей, необходимых для проникновения в защищенную систему)

insider - инсайдер (лицо, в силу служебного положения располагающее конфиденциальной информацией о делах фирмы)

IRS (information retrieval system) - информационно-поисковая система

Comprehension check

1. What was Kevin Mitnick convicted of in 1995?

2. What business does he run now?

3. What was the motivation of his illegal deeds in the past?

4. What does he say about the contemporary security landscape?

5. What does he understand by the term “social engineering”?

6. Does Mitnick consider social engineering to be a significant threat?

7. Does he beware of doing transactions online because of the hackers’ intrusion?

8. Has he ever been targeted by illegal attackers?

Match the words below with their translations

1. criminal purpose a) уязвимость

2. security field b) шифрование

3. vulnerability c) преступная цель

4. firewall d) система обнаружения

5. detection system e) сфера безопасности

6. encryption f) брандмауэр

Complete the text below with these phrases from the interview.

technology, vulnerability, social engineering, security landscape, encryption

Nowadays the only thing that's changed in the ……….1 in regards to ……….2 are technical issues, but with ……….3, it's all remained the same. It is a significant threat. A company can spend thousands of dollars on firewalls, intrusion detection systems and ……….4 and other security technologies, but if an attacker can call one trusted person within the company all that money spent on ……….5 is essentially wasted.

Roleplay. Organize a press-conference.

Some of you are members of a group of security experts (former black hats). Some of you are journalists who are going to interview the security experts.

Security experts. Talk together to decide the following:

- background

- skills and knowledge

- what influenced your life

- current activity

- present credo

- threats people should be aware of

- attitude to black hats

Journalists. Work together to think of some questions to ask the security experts. When you are ready, conduct the interview.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]