This website uses cookies to ensure you have the best experience. Learn more

Kevin Mitnick Social Engineering And Computer Hacking Mastermind

4016 words - 17 pages

Kevin Mitnick – Social Engineering and Computer Hacking Mastermind


Shelby Descoteaux
Professor Kabay
IS 340 A
Nov. 22, 2013

Table of Contents
Introduction 3
Kevin Mitnick 3
Hackers and Their Motives 3
The Early Years 4
Adolescence 5
Kevin in Trouble 6
Kevin’s Final Visit from the FBI 7
Hacker or Engineer? 8
Impact on Computer Security 8
Conclusion 9
Works Cited 10

Introduction
Most people today are aware of the detrimental risk that hackers pose to their computers. They might know about identity theft, viruses, Trojans and worms however what they fail to recognize is how these things are accomplished and if they have actually fallen victim to one of ...view middle of the document...

Kevin’s final and last arrest got him thrown into federal prison for a total of five years, restricted him from using the Internet for three years, and also restricted him from profiting off of his story for seven years (Smith).
“I was indicted on twenty-three counts of access device fraud. Of these, twenty-one were related to calls made when my phone was cloned to someone else’s number. The other two counts were for possessing information, specifically the mobile phone number and electronic serial number pairs that could be used for cloning. The maximum sentence was twenty years for each free phone call. Twenty years for each call! I was facing a worst-case scenario of 460 years.” (K. D. Mitnick)
Hackers and Their Motives
The connotation of “hacker” has evolved over time. There are many different types of hackers. Some hackers simply display a funny message across your screen each time you log on. This type of foolish hacker is not particularly common today. Other hackers might try to get access to a system and steal all of the victim’s bank and credit card information, or even worse, steal their identity. Hackers like Kevin gain access to company’s systems to steal things. Each hacker in these scenarios have different motives, and the number of these motives continues to grow. As time goes on, the extent of damage that hackers are capable of continues to grow and the FBI’s interest in these crimes grows with it.
The Early Years
The first successful sneaky move Kevin accomplished took place when he was only about one and a half years old. Kevin’s mom had her first wakeup call when she found him on the other side of what was a once locked child gate door. She found him after she realized he escaped from his crib. Kevin and his mother moved around a lot throughout his child hood, but stayed in the Los Angeles area for the most part. At ten years old, Kevin found a passion for magic through his neighborhood friend’s father. In his book, Ghost in the Wires, Kevin explains his fascination with the magic tricks he saw his friend’s dad perform and the affect it had on his own future.
“He was an accomplished magician whose card tricks, coin tricks, and larger effects fascinated me. But there was something else, something more important: I saw how his audiences of one, three, or a roomful found delight in being deceived. Though this was never a conscious thought, the notion that people enjoyed being taken in was a stunning revelation that influenced the course of my life.” (K. D. Mitnick)
This fascination for deception that Kevin was still unaware of at the time was a huge driving force for many crimes he would commit later in life. Other people helped Kevin along the way as well. Being a young boy in the city with a mom who was always working meant that Kevin needed to use the buses to get around. It was on a bus that Kevin learned another sort of magic trick. Bob Arkow, a city bus driver, was a ham radio enthusiast who showed Kevin all...

Other assignments on Kevin Mitnick - Social Engineering And Computer Hacking Mastermind

Cyber Security Essay

317 words - 2 pages &Worms/ Sniffing Traffic Social Engineering / Session Hijacking /Exploiting web servers /Cryptography/ Metaspoit Security: VPN, Checkpoint, Juniper Firewall,Honeypots,IDS , Open Web Application Security Project (OWASP) Ideally ITIL incident management, problem management and change management Behavior-excellent communicator, professional, motivated, analytical thinker PROFESSIONAL EXPERIENCE______________________________________________ Royal Air

Ethical Hacking And Network Defense Unit 2 Assignment

1705 words - 7 pages circumstance (Purser, 2008). 4. Social engineering is a powerful tool in the world of hacking and can be used to gain a wealth of knowledge. Social engineering is often used to gain information such as usernames or passwords. A companies procedures and policies are often used against itself. 5. Enumeration is part of the second step of the ethical hacking process. It is all part of gathering as much information as you can about a network. This

Computer Info

1079 words - 5 pages . "Bringing 'No Ceiling' to Scratch: Can One Language Serve Kids and Computer Scientists?" (with Jens Mönig, a talk at the Constructionism 2010 conference in Paris). Scratch is the brilliant grandchild of Logo, from the MIT Media Lab, that uses drag-and-drop visual programming to achieve, truly at last, the "no threshold" half of Logo's famous promise, combined with a half-million-strong social network of kid programmers sharing projects and working

Network Security And Ethical Hacking

5261 words - 22 pages used: * The OSSTMM * NIST 4-Stage Pen-Testing Guideline * CHECK The OSSTMM is an open-source peer-reviewed methodology to guide security testing and metrics. The testing is split into five sections which test: information and data controls, personnel security awareness levels, fraud and social engineering control levels, computer and telecommunications networks, wireless devices, mobile devices, physical security access controls

Us Programmer Layoff From Off Shoring

2582 words - 11 pages SOFTWARE ENGINEERING ROLES IN THE UNITED STATES Software Engineering Roles for Displaced Computer Programmers R. B. Blinder ENG-201-OL December 10, 2011 Thomas Edison State College Table of Contents SOFTWARE ENGINEERING ROLES IN THE UNITED STATES 1 Abstract 3 Software Engineering for Displaced Computer Programmers 4 Purpose 5 Education and Training Requirements 8 Sources of data 9 Figure 1 Projections Data 9

Internet

444 words - 2 pages Another privacy issue is hacking. Because social networks do not offer security measures for their users, many of the computers used by networkers are vulnerable to hackers. Every bit of information on a networker’s computer becomes available to those skilled in this science, often without the knowledge of the networker. Along with the ability to hack is the ability to plant viruses. Many viruses today are passed through social networks

Ethical Issues Arising From The Intersection Of Law, Compliance & Investigations

417 words - 2 pages There are several ethical issues that arise in information security. The security is one of most issue of concern for every business organization. Ethics is a term which is used to distinguish between right or wrong things. Ethical issues in computer security includes cybercrimes, computer hacking and information warfare. In an Internet world, many banking organizations are attacked by attackers and millions of credit card details stolen every

Social Change And Modernization

314 words - 2 pages computer, Genetic Engineering, and the invention of the automobile are all examples of social change. Clothing styles changing happen all of the time, is sometimes intentional but is sometimes an accident, and doesn’t matter that much in the grand scheme of things. The computer was an intentional social change; it was created to better the quality of life, yet it was controversial. Many people had difficulty recognizing that trusting in technology

Management Of Information Systems

1747 words - 7 pages • User lack of knowledge • Social engineering: • Tricking employees into revealing their passwords by pretending to be legitimate members of the company in need of information Data Thefts: The Biggest Worry and Insider Threats Here are a few examples of possible criminal acts from an insider of a company: • A computer staff illegally accesses employees’ e mails to steal information that could be

Cyberloafing

1774 words - 8 pages Evaluate the impact of technology tools such as Internet in work performance. Does the ability to engage in leisure activities such as Facebook, Twitter and other social networking tools during work improve productivity, or does it act as a distraction. Cyberslacking, cyberloafing, research has shown its the engagement of non-productive computer activities during work. It is the availability and use of the world wide web, to shop and engage in

Busn 460

489 words - 2 pages Resource Review: Resource Review-5 Sources Samuel Bakos DeVry University G.Nikhita Reddy#1, G. R. (2013). Effects of Wireless Electricity on Human Bodies. International Journal Of Engineering Trends And Technology, (6), 2567 In this part of the report I will be researching the ethical concerns society has with the introduction of wireless electricity. One of the main ethical concerns we have about wireless electricity is how will it

Similar Documents

Ethical Hacking Essay

2587 words - 11 pages been around for so many years. Since the Internet became widely used in the World, We have started to hear more and more about hacking. Only a few Hackers, such as Kevin Mitnick, are well known. In a world of Black and White, it’s easy to describe the typical Hacker. A general outline of a typical Hacker is an Antisocial, Pimple-faced Teenage boy. But the Digital world has many types of Hackers. Hackers are human like the rest of us and are

Ceh Course Essay

458 words - 2 pages attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you

Cmgt 410 Week 2 Individual Essay

1178 words - 5 pages -cyberespionage-brazen-prolific-a/240153934 Quist, A. (2002). Security Classificatoin of Information (5th ed.). Oak Ridge, TN: Oak Ridge Classification Associates, LL U.S. Naval Institute. (2013). Retrieved from http://blog.usni.org/2012/10/16/social-engineering-kevin-mitnick-history-conference

Secutiry Threats Essay

452 words - 2 pages as "social engineering") into installing "back door" programs. These can allow intruders easy access to your computer without your knowledge, change your system configurations, or infect your computer with a computer virus. An attachment that you may receive via email may have malicious software designed to destroy the data on your computer. Without the proper protection that malicious software sent by potential a hacker can cause severe