Chapter #2 - jude-lindale/Wiki GitHub Wiki

Summary

  • Security issues from the days of telephony and discussed how a class of people known as the “phreakers” tried to exploit the weaknesses in telephone systems.
  • How the telephonic lines allowed the computers to be connected with each other and how those who could exploit the telephone lines continued to hack into computers with this knowledge.
  • How bulletin boards and the information on these bulletin boards were misused.
  • Reference to some of the legendary hackers and how the increasing threats to computer security led to the CERT initiative.
  • Verbal communication and non-verbal communication.
  • How secret communications were being conveyed through a coded language using Caesar cipher from the days of Julius Caesar. How, with the advent of telegraphs and radio, the need for coding these messages was necessary to protect the confidentiality of these messages.
  • How the world wars necessitated the securing of messages being relayed and mentioned that most of the current security practices have had their base on the security practices commenced during the world wars.
  • How the Enigma cipher machine helped Germans in World War II to encode their military messages securely and how the breaking of the Enigma code led to the shortening of World War II.
  • Introduced the code breakers and discussed how a great Polish mathematician by the name of Alan M. Turing broke the Enigma code, thus shortening World War II.
  • Two famous categories of computer hackers: the “phreakers” and the “hackers”.
  • Introduced one of history’s famous phreakers, John Draper, who was an expert at hacking and misusing telephone lines.
  • One of the most famous hackers, Kevin Mitnick, who could break into almost any computer, including those of big names like DEC, Motorola, and SUN. Additionally, WikiLeaks, which is a recent phenomenon in the field of computer security and we explained how WikiLeaks brought to the forefront many political secrets.