Hacking has become a major issue in today s world of technology. Even software giant Microsoft has been affected. Recently hackers broke into Microsoft s computer system. The hacker or hackers created new accounts so that they could gain access to parts of the software giant s computer network. Some accounts were being created that did not match or normal audit logs, Mr. Schmidt the corporate security office for the Microsoft Corporation, said (Schwartz, 2000).
According to The New York Times, the attacker did not directly enter Microsoft s network. The point of entry was an employee s home computer, connected to the company s network. The intruder sent the Microsoft employee a rogue program called QAZ Trojan hidden within another program. This type of program makes it s way through the person s defenses through trickery, and once inside releases a potent hidden payload. The program opened a back door on the machine, and this allowed the intruder to search for other computer s on Microsoft s network and commandeer those machines as well, sending the network addresses and passwords of each infected machine to a designated Internet location.
Microsoft s network is protected by a firewall. Those security systems prevent unauthorized users from getting into the network, but a firewall alone cannot prevent a connection from an unauthorized user s machine that has been taken over by an unauthorized third party (Schwartz 2000).
Howard Schmidt, corporate security officer for the Microsoft Corporation monitored the activities of the hackers over the next several days, and watched the intruders pop in and out of the system, creating new accounts with different permissions, or access to the Microsoft Corporation network. Microsoft said, the intruder came across the source code for a product being prepared for future release but not part of the company s core products (Schwartz 2000).
Mr. Schmidt stated that they monitored the intruder quietly, instead of shutting down the attacker right away. Initially, Microsoft denied access to the intruder, and shut down the created accounts on Friday October 20th. Over the weekend, no new attacks or intrusions were detected. The following Monday, the intruder was back attempting to access the network through the same route. The following day, Microsoft officials shut down the accounts and notified law enforcement.
Microsoft officials stated that although the intruders might have seen the code for the new product, there was no record of any attempt to download or transfer any files.
Hacking is affecting corporations at an alarming rate, more and more people and interested and intrigued with the idea of stealing people s information. It is imperative that corporations take appropriate precautions to protect their networks from these types of attacks. Most people would think that software giant Microsoft would be immune to these types of attacks by hackers.
I work in an industry where security cannot be compromised. I work for an Internet Health Care portal. Daily highly sensitive medical documents and records are transmitted via our networks. Any hint of a break or breach of our security could literally bring down our business. Recently, an employee was checking his personal web mail account via our network. He unknowingly opened a version of the Melissa virus and it got into our network, and into several clients machines because they were in the corporate address book. Unfortunately, this employee was terminated for this incident. Our security was breached, and if we cannot protect our own network from a virus, a client s impression would be, how are we going to protect their sensitive data from hackers? The unfortunate incident brought into the company a written policy on utilizing company equipment for personal use (web surfing, reading e-mail, etc.). If the company had a security policy for employees in place, such an incident may not have occurred. Unfortunately, it took an innocent mistake of an employee and the loss of someone s job for such a policy to be put in effect. u
Schwartz, John (2000, October 29). Irregular New Accounts Alerted Microsoft to Network Intruder. The New York Times. [Online reprint]. Available. nytimes/2000/10/29/technology/29SOFT.html
Другие работы по теме:
Laheys Teaching Technique Essay Research Paper Essay
Laheys Teaching Technique Essay, Research Paper Essay on Lahey? Introductory Notes After reading the introductory notes, I believe that the most important point that was presented in the notes was the definition of psychology. In order to understand the different causes and effects of psychology, you must first be able to know and understand the definition of it.
Sexual Abuse Essay Research Paper I have
Sexual Abuse Essay, Research Paper I have decided to do my paper on the repression of sexual abuse in adults. In my research though I came across a lot of things that I didn?t agree on.
The Computer Age Essay Research Paper Ben
The Computer Age Essay, Research Paper Ben Purdue 8/24/01 It is my prediction that the biggest issue we will face in the coming century not only as a nation but also as a planet is finding a blind between security of protected information and freedom of information. I say this because as a computer security consultant I understand the need for security of important information, however I as a programmer I understand such issues as the battle for open source code and freedom of information as a hole.
Vdg Essay Research Paper Raintree
Vdg Essay, Research Paper Raintree’s website is dedicated to providing information and education on the important plants of the Amazon Rainforest, therefore this section is the most extensive. The Plant Database section is continuously under construction as we continue to add more rainforest plants which are under research.
Computer Essay Research Paper Computer is useful
Computer Essay, Research Paper Computer is useful for finding the information. As long as the Internet is installed in the computer, the people can be able to what they want to find. Of course, they have to waste the time for doing. Acquiring the information, they feel that it is valuable. Renctly years, the number of people is increased by using computer.
The Cookie Controversy Essay Research Paper The
The Cookie Controversy Essay, Research Paper The Cookie Controversy Most of us know cookies as tasty treats that are baked in the oven but now there is a new kind of cookie and it is stirring up privacy issues with Internet users. A cookie is a text-only file that gets entered into the memory of a web browser. Various web sights use cookies to help with on-line sales and services, tracking popular links, and demographics.
Space Report Essay Research Paper Space and
Space Report Essay, Research Paper Space and the technology to study space have improved rapidly over the years. Space travel also is a big deal in the way we get our sources for galaxies and nebulas. The Hubble Space Telescope has been the best way to get our information for everything from millions of light years away from Earth.
The Internet Vs The Library Essay Research
Paper The Internet vs. the Library Overall, when one compares the Internet vs. the Library, the Library is superior. This is because, though it takes a bit longer to use, the Library has a standard information research tool; the Dewey decimal system. This organized system makes finding books simple, and with the added assistance of a librarian, finding information can be easy.
Getting Paid To Hack Essay Research Paper
GETTING PAID TO HACK Hackers can get paid to hack codes. Hackers have to be careful on what jobs to take. If hackers break the law, they have to be imprisoned. But there are legal hacks.
Computer Hackers Essay Research Paper The meaning
Computer Hackers Essay, Research Paper The meaning of Hacker is one who accesses a computer which is supposably not able to be accessed to non authorised people of the community. Hackers may use any type of system to access this information
Another Computer Essay Essay Research Paper The
Another Computer Essay Essay, Research Paper The Computer Underground. The beginning of the electronic communication revolution that started with the public use of telephones to the emergence
Computers Essay Research Paper Why We StartedInternet
Computers! Essay, Research Paper Why We Started Internet Mental Health is a free encyclopedia of mental health information. It was designed by a Canadian psychiatrist, Dr. Phillip Long, and programmed by his colleague, Brian Chow.
Landscaping Essay Research Paper Computer Hacking BasicsComputer
Landscaping Essay, Research Paper Computer Hacking Basics Computer hacking is very popular. With every thing on the Internet having to cost something. Someone will try to hack that database and retrieve free information. As every on knows but doesn?t take very seriously is that hacking is illegal. Hacking is anywhere from hacking in to the school data base and change your grades to make a stop light change with a special clicker.
Hacking Essay Research Paper Hacking has been
Hacking Essay, Research Paper Hacking has been developed over the years to be unstoppable. Newcomers to the hacking community learn the rules by associating with established hackers. Hackers like to hack in order to impress each other.
Crypt Essay Research Paper Cryptography Cryptography is
Crypt Essay, Research Paper Cryptography Cryptography is way you can keep information secure. A person who does not know the method used to change the information to keep it secure cannot copy the method used or reverse the change. The basic components of cryptographic systems are used to encipher (scramble) information so that it is difficult to determine the meaning without the appropriate key or key(s) to decipher (unscramble) the information.
Microwaves Essay Research Paper WARNING
Microwaves Essay, Research Paper WARNING ! ! ! ****** BE CAREFUL Microwaving Water To Heat it Up!!! ****** Please be aware of the following information if you or someone you know, is a person that uses a microwave oven to heat water.
Functions Of Memory Essay Research Paper THE
Functions Of Memory Essay, Research Paper THE FUNCTIONS OF MEMORY Memory is the ability to remember past events, images, ideas, or previously learned information or skills. Memory is also the storage system that allows a person to retain and retrieve previously learned information.
Geographical Information System Essay Research Paper GIS
Geographical Information System Essay, Research Paper GIS Geographical Information System originated in the 1960s. During the early days of the technology the use was limited to a small group of practicioners. It is a information technology which analizes, stores, and displays both spatial and non-spatial data.
The Childhood Essay Research Paper It has
The Childhood Essay, Research Paper It has been noted that people consider their childhood as a nostalgic period. The childhood is one of the three main stages of life: childhood, adolescence, and adult age. Childhood might be the nostalgic period but is it the happiest? In this paper we shall demonstrate that childhood could be considered as the happiest period.
Human Papillomavirus Virus Essay Research Paper Human
Human Papillomavirus Virus Essay, Research Paper Human Papillomavirus, or HPV, is probably one of the most common STDs. HPV is the virus that causes both genital warts and/or cervical dysplasia (this means an abnormal pap smear). If you’ve just been diagnosed with HPV and are desperately seeking information, or if your boyfriend or girlfriend or best friend just got told they have it, then this is the site for you.
New Employee Essay Research Paper Dear New
New Employee Essay, Research Paper Dear New Employee, Welcome to your new job! The position you have decided to undertake is one, which welcomes great variety on a day-to-day basis. The following information is meant to help you as you learn more about Best Buy and the things that make it run.
Myths Essay Research Paper Is Information Technology
Myths Essay, Research Paper Is Information Technology a good thing? With the invention of the silicon chip, fiber optic cable and satellite communications the information superhighway is real. This global network of computers makes it possible to move massive amounts of information virtually anyplace.
Computer Privacy Essay Research Paper Computer PrivacyIn
Computer Privacy Essay, Research Paper Computer Privacy In the information technology world today there is a problem that can ruin a company. Bad publicity and finger pointing usually precede the problem. After this the federal government steps in and regulates things. The problem I am referring to is computer privacy.
Thomas Edison Essay Research Paper BibliographyThomas A
Thomas Edison Essay, Research Paper Bibliography Thomas A. Edison and his Kinetographic Motion Pictures. Rutgers University Press. 1995. This book gave me a lot of the information I needed on the basic history of Thomas Edison?s work in the motion picture industry. There were also pictures
Information Technology Essay Research Paper Information TechnologyThe
Information Technology Essay, Research Paper Information Technology The purpose of my article is to study the impact of information technology and artificial intelligence on the organization, privacy and control, research and instructional practices and ethics. Evolution of information technology has affected all these practices, and has helped them in improving their performance in some way.
The Randle Report Essay Research Paper The
The Randle Report Essay, Research Paper The Randle Report, by Kevin D. Randle explores UFO research in the1990’s. In reading his book I have gained much knowledge of how to determine whether
How To Writing A Research Essay Essay
, Research Paper How To Writing A Research Essay The toughest part of the essay, for me, was taking all the information I had gained and reduce it to a mere few pages essay. After all, quality is better
Cover Letter Essay Research Paper February 14
Cover Letter Essay, Research Paper February 14, 2001 XXX Inc PO Box 827 Angola, IN-46703 Dear Ms XXX: I am applying for the summer internship in information systems, which we discussed during the Career Exposition at Tri-State University in Fort Wayne on (02/12/01). My bachelor’s degree in Information Systems and academic record are my strongest qualifications for this position.
Aids In Africa Essay Research Paper Dear
Aids In Africa Essay, Research Paper Dear, Dr. Feedlebom of ?Conspiracies and Cover ups? magazine. I would like to share with you some information concerning the Aids epidemic in Africa. HIV, which causes