Monday, January 25, 2010

CS507 Ass

Q1.  Deference’s between hacking and cracking.          
They are both the same thing...Sort of.
A hacker is a person who is proficient with computers and/or programming to an elite level where they know all of the in and out's of a system. Hacker means unauthorized access to the computer. Hackers are normally skilled programmers, and have been known to crack system passwords, with quite an ease.  There is NO illegality involved with being a hacker. A person making an intrusion is generally termed as intruder. Its very common for hackers to misuse passwords and Personal identification number, in order to gain unauthorized access.

What the hacker does with their knowledge of systems within the definition of the law is what defines them as a hacker vs. a cracker. It's then safe to say that all crackers are hackers, but not all hackers are crackers. This is an important distinction. Hackers on the Internet could break into the corporate network and do harm in a number of ways: steal or damage important data, damage individual computers or the entire network, use the corporate computer’s resources, or use the corporate network and resources as a way of posing as a corporate employee. Hackers easily penetrate the most secure facilities of the military and financial institutions

 The term cracker and hacker are used interchangeably (albeit incorrectly) largely due to the ignorance of the general populace, especially the media. There are hackers who are more malicious in nature whose primary purpose or intent is to commit a crime through their actions for some level of personal gain or satisfaction. The terms hack and crack are often used interchangeably.

A cracker is a hacker who uses their proficiency for personal gains outside of the law. EX: stealing data, changing bank accounts, distributing viruses etc.


Sr #
Column A
Column B
Column C
1
Logical
Active Monitor
Virus & Worms
2
Beta Version
Biometrics
In Testing Phase
3
Spikes
Technical Controls
Sudden Increase in Power Supply
4
Triggered on Event
Behavior Blockers
Logic Bomb
5
Guard against Virus
Virus & Worms
Active Monitor
6
Hardware based Antivirus
Sudden Increase in Power Supply
Behavior Blockers
7
Encryption
Logic Bomb
Science of Coded writing
8
Voice Print
In Testing Phase
Biometrics
9
Firmware based Virus protection
Effective Back up Plan
Technical Controls
10
Management Procedural Controls
Science of Coded writing
Effective Back up Plan







Thanks to those students those send me Assignments and quizzes. If you have any Assignment and quiz kindly send at jamilbookcenter@yahoo.com

No comments:

Post a Comment