02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Hacking: A Short History 3<br />

things they can do. Since the early days things have evolved dramatically: Individuals are<br />

more advanced and innovative and have access to newer and more powerful tools.<br />

<strong>Hacker</strong>s or enthusiasts were always working with the best technology available at the<br />

time. In the 1970s it was the mainframes that were present on college campuses and corporate<br />

environments. Later, in the 1980s the PC became the newest piece of technology, with<br />

hackers moving to this environment. The 1980s saw hackers moving to more mischievous<br />

and later malicious activities; their attacks could now be used against many more systems<br />

because more people had access to PCs. In the 1990s the Internet was made accessible to<br />

the public and systems became interconnected; as a result, curiosity and mischief could<br />

easily spread beyond a small collection of systems and go worldwide. Since 2000, smartphones,<br />

tablets, Bluetooth, and other technologies have been added to the devices and technologies<br />

that hackers target. As hackers evolved, so did their attacks.<br />

When the Internet became available to the public at large, hacking and hackers weren’t<br />

too far behind. When the first generations of browsers became available in the early 1990s,<br />

attacks grew in the form of website defacements and other types of mischief. The first forays<br />

of hacking in cyberspace resulted in some humorous or interesting pranks, but later<br />

more aggressive attacks started to emerge. Incidents such as the hacking of movie and government<br />

websites were some of the first examples. Until the early 2000s, website defacing<br />

was so common that many incidents were no longer reported.<br />

Current Developments<br />

In the early 2000s, more malicious activity started to appear in the form of more advanced<br />

attacks. In fact, in the first few years of the new millennium the aggressiveness of attacks<br />

increased, with many attacks criminally motivated. Malicious attacks that have occurred<br />

include the following, among many more:<br />

■ Denial-of-service attacks<br />

■ Manipulation of stock prices<br />

■ Identity theft<br />

■ Vandalism<br />

■ Credit card theft<br />

■ Piracy<br />

■ Theft of service<br />

One of the many situations that have contributed to the increase in hacking and cybercrime<br />

is the amount of information being passed and the overall dependency on the Internet<br />

and digital devices. Over the last decade the number of financial transactions has increased,<br />

creating a tempting target for crooks. Also, the openness of modern devices such as smartphones<br />

and technologies such as Bluetooth has made hacking and stealing information<br />

easier. Lastly, we could also point to the number of Internet-connected devices such as tablets<br />

and other gadgets that individuals carry around in increasing numbers. Each of these<br />

examples has attracted the attention of criminals with the temptation of stealing never

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!