StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Stalking the Wily Hacker - Case Study Example

Comments (0) Cite this document
Summary
This case study "Stalking the Wily Hacker" discusses one major security attack that occurred over the internet - the case of Lawrence Berkeley National Laboratory in California. The Internet is a resource that has brought about massive changes in the way people live…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful
Stalking the Wily Hacker
Read Text Preview

Extract of sample "Stalking the Wily Hacker"

Download file to see previous pages Cliff Stoll, an astronomer became the Systems Manager at Lawrence Berkeley lab when a high percentage accounting error alerted him of the presence of an illegal user on his system. The hacker’s code name was ‘hunter’ – a strange invader hiding inside an electronic labyrinth, breaking into the United States computer systems and stealing confidential military and security information. Stoll initiated a vigorous hunt of the hacker, spying the spy, and plunging into an incredible international investigation that finally caught the attention of the U.S counter-intelligence agents. The ‘Stalking the Wily Hacker’ is a description of Cliff Stoll’s pursuit of a prominent security breach at Lawrence Berkeley Laboratories (LBL). The record demonstrates how the hacker avoided traces of his invasion. (Stoll,1989, p.26).

The author was a manager at Lawrence Berkeley National Laboratory in California. In August 1986, he was requested by his supervisor to resolve an accounting error that had occurred ion the computer usage accounts. The hacker had spent nine seconds of unpaid computer time, an error that made him realize the hacker’s access to the LBL system. The hacker had interfered with the move mail functioning of the original GNU Emacs. Cliff worked tirelessly for a period of ten months and successfully realized that the hacker was using a 1200 baud connection and that the infringement was emanating from a telephone modem connection. Paul Murray and Lloyd Belknap, his colleagues helped with the phone lines. With the absence of desks of co-workers, Cliff rounded up fifty terminals within a fortnight. He attached the teleprinters to the fifty incoming telephone lines (Chaturvedi, 2000, p18).

During the fateful weekend, the hacker dialed from the Tymnet routing service. With Stoll at the Tymnet, he succeeded in using it to track the hacker’s disruption to a call center at MITRE, a defense contractor in Virginia.  ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Stalking the Wily Hacker Case Study Example | Topics and Well Written Essays - 2250 words, n.d.)
Stalking the Wily Hacker Case Study Example | Topics and Well Written Essays - 2250 words. https://studentshare.org/information-technology/1778466-internet-security
(Stalking the Wily Hacker Case Study Example | Topics and Well Written Essays - 2250 Words)
Stalking the Wily Hacker Case Study Example | Topics and Well Written Essays - 2250 Words. https://studentshare.org/information-technology/1778466-internet-security.
“Stalking the Wily Hacker Case Study Example | Topics and Well Written Essays - 2250 Words”. https://studentshare.org/information-technology/1778466-internet-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Stalking the Wily Hacker

Hacker Culture

...Stalking the Wily Hacker... Stalking the Wily Hacker... According to Sterling (1993) definition, “The Hacker Crackdown”, the term “hacking” is the act of intruding into computer systems by stealth and without permission.” The word hacker is highly used by computer programmers because hackers are able to crack the codes in the programming language. They seek to exploit the weaknesses in a computer system or a network to be able to access confidential documents and files. The most targeted systems are online businesses, organizations websites, and government websites, among others. For example, in the case of Wisconsin department of revenue, hackers try to change some figures on revenue by finding access to information hence giving false...
11 Pages (2750 words) Research Paper

Computer Hacker

...Stalking the Wily Hacker... Stalking the Wily Hacker... Computer Hacker By The present era is characterized by advanced technological developments. The society today therefore, relies heavily on technology. Among the different types of technology, computer technology has become widely used today, and this controls important processes and functions in society. However, despite the fact that technology is of great benefit to humans today, the same technology exposes the human race to considerable danger, especially if used in the wrong manner, and with the wrong motives. Nonetheless, with regard to computer technology, this will benefit and serve people in the most appropriate manner, if it is used with the right motives. This paper focuses on the...
6 Pages (1500 words) Research Paper

Stalking

...Stalking the Wily Hacker... Stalking the Wily Hacker... is the right of one and all. It is taught be all the cultures, all the religions, all the civilizations that privacy should be respected. However, as a matter of fact, we find many instances around us where people are being harassed, watched out, sent unwanted mails, or their privacy is intervened in one way or other. However, it becomes more problematic, both physically and emotionally, when such vile acts are being done by someone who had relations with you in the past. Usually, harassing in such cases is a response to the emotional set back emerged in the person as result of being hurt by the break up. This intake form is thus intended to gather some required information so as to make...
3 Pages (750 words) Essay

Stalking Behavior

...Stalking the Wily Hacker... Stalking the Wily Hacker... Behavior: Categories of Incidence, Mortality and Nursing implication Stalking behavior: categories of incidence, mortality and nursing implication Abstract Stalking behavior is not a phenomenon of the modern society and it has been there even in the ancient times. Stalking behavior can vary widely. The underlining characteristics of stalking behavior the personality traits, motivation for stalking, duration of stalking vary widely. While stalking behavior may not be gender specific it is more prevalent among men and women are more vulnerable targets. Stalking behavior is likely to assume more dangerous proportion especially if it persists for a long time. Contrary to normal assumptions stalki...
4 Pages (1000 words) Essay

Stalking

...Stalking the Wily Hacker... Stalking the Wily Hacker... Stalking has only recently been defined as criminal in the late 20th century. This criminal behavior can be understood better through the learning/social-learning perspective. Most individuals are not born with a tendency to be a stalker. Stalking a a learned behavior through social interaction and observation. The exception is individuals that are delusional, or diagnosed as paranoid schizophrenics. These individuals cannot be held accountable for their actions due to a mental illness. However, only a small number of stalkers fall into this category. Most stalkers have been exposed, through social interaction or observation, to factors like violence. B Turvey (2002: 509) defines stal...
2 Pages (500 words) Essay

Hacker Hunters

...Stalking the Wily Hacker... Stalking the Wily Hacker... STUDY---HACKER HUNTERS Answer The contemporary era is the era of information technology, where fast and speedy flow of information is the keyto success for the great brands and multinational organizations carrying vast business volume and sound corporate reputation at global level. The most meaningful way, Gates observes, to differentiate your company from your competitor, the best way to put distance between you and the crowd is to do an outstanding job with information and management. How you gather, manage, and use information will determine whether you win or loose. (1999: 2) Fast information technology provides the retailers a comprehensive, an accurate and detailed picture of the...
4 Pages (1000 words) Essay

Cyber Stalking

...Stalking the Wily Hacker... Stalking the Wily Hacker... Stalking Introduction Cyber-stalking is a new crime which has the same basic concepts as the traditional crime of stalking. The difference between these two crimes is in the method or perpetuation. It used to be just plain stalking-following and watching a person doing his or her routine activities. But in the new age of cyber technology, stalking has evolved into a more sophisticated crime. The Working to Halt Online Abuse (WHOA) released their latest statistics on cyber-stalking and their figures indicate that females are still the most common victims of stalking and males are the main harassers (Hitchcock, 2009). The trends in cyber-stalking based on 2008 figures also indicate that...
5 Pages (1250 words) Research Paper

Stalking

...Stalking the Wily Hacker... Stalking the Wily Hacker... s have anti-stalking statutes. Although different s have different laws, most agree on the following definition of stalking by Privacy Rights (2013) “Stalking refers to harassing or threatening behavior that is engaged in repeatedly. Such harassment can be either physical stalking or cyberstalking.” Men can be stalked. Victims should be given an intake based on incident, not gender. Intake Form 1. Do you feel that your stalker could hurt you? 2. Has your stalker ever harmed you physically? 3. Has your stalker ever destroyed your property? 4. Has your stalker ever threatened you? 5. Do you know your stalker? 6. What do you know about your stalker? 7. Does interacting or agreeing with your stal...
2 Pages (500 words) Research Paper

Wily Technology

...Stalking the Wily Hacker... Stalking the Wily Hacker... Technology Case Question Lew Cirne, as a CEO of Wily Technology made significant efforts for building the skills which were essential to establish the company. After working for Apple and Hummingbird, Cirne made efforts to build the first core technology of Wily. Cirne had sleepless nights, excitement and fear while developing the Wily first ever product. Cirne employed fifty employees for helping him construct the company and successfully lead a strategic revolution of the company. Cirne was able to make the interest of Peninsula Capital and the investor of small institution to invest in Wily. It was decided that total of $2million would be invested by the two parties for 33% of Wily and...
2 Pages (500 words) Article

Stalking

...Stalking the Wily Hacker... Stalking the Wily Hacker... Psychology Introduction According to McCue (2008), domestic violence is aggressive behavior at home and psychological mistreatment practices utilized by one individual towards the other partner in a relationship in order to control them. This can apply to individuals who are either wedded or un-wedded, those living together, divorced or dating. Domestic violence can either be criminal or no-criminal. Criminal conduct incorporates uninvited physical contact, for example, striking, kicking, gnawing, sexual compulsion and ill-use, conjugal assault, harassing the other by stalking, PC hacking, and criminal seclusion. Non-criminal conduct consists of being denied access to companions or other...
4 Pages (1000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Stalking the Wily Hacker for FREE!

Contact Us