U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption

NCJ Number
195335
Author(s)
Winn Schwartau
Date Published
2000
Length
495 pages
Annotation
This book provides a guide to the average Internet user on hackers, phreakers, identity thieves, and Internet terrorists.
Abstract
Security awareness by corporate employees is a key ingredient to successful protection against on-line espionage. Hackers spend months and years learning about computers, operating systems, networks, programming, and software. This dedication is required to get inside the mind of the computer, know the nuances of the network, and have the personal stamina to continue despite failure after failure. Ethical hackers are generally people who are hired to test the security of companies. Crackers are criminal hackers. Phreakers are telephone hackers. Other forms of hacking are described in Part I, including cybergraffiti, political hacking, and hacking through customs. Part II describes how to protect the privacy of the individual, children and families. Part of the problem is that the government has no standards for protecting private information. Companies are not required by law to protect confidential records that contain private information. Spam on the Internet means millions of annoying emails being sent without consent or permission. Scam spam is fraud over the Internet. Part III describes how hackers hack, including password hacking, war dialing, Trojan hacking, and viruses. Part IV discusses denial of Internet service and weapons of mass disruption. The United States military and civilian authorities are properly worried about the use of computers by terrorists, extreme hackers, and other non-government organizations. Part V provides anti-hacking tips and tricks, including hiring and catching hackers. Part VI presents information on law enforcement and hacking, vigilantism, and national security. Part VII discusses the future of hacking, the future of Microsoft, and the extreme hacking. Appendix