From Security Infrastructure fo Electronic Commerce and Internet CPS714 Computational Science Information Track -- June 2 and June 7 99. byRoman Markowski
Computer crimes
First network attack: 1988 (Worm; Robert Morris, Cornell)
Attackers: hackers vs. crackers ( vandals, spies)
hacker are proud of what they are doing and publish their achievements; crackers-hacking for profit
US companies lose $7.5 billion annually
Attacks
Social engineering method (obtaining username and password from another person)
Trojan Horses and system modifications (modified login, su, telnet, in.telnetd, ftp, ls, ps, netstat, ifconfig, find, du, df, libc, sync, inetd, and syslogd)