Access "Your're caught: Examining punsihment for cybercrime"
This article is part of the March 2003 issue of Dollars and sense: Getting the security budget you need -- and spending it wisely
No Quarter For Hackers It's said that tragedies bring out the best and worst in people. The space shuttle Columbia tragedy brought out the worst in Trippin Smurfs. The hacker gang that boasts owning scores of NASA boxes chose the day of the Columbia crash--Feb. 1--to hit at least 10 Jet Propulsion Lab servers and deface numerous NASA Web sites with protests about the looming war with Iraq. The incident had nothing to do with the shuttle disaster, but, as one security observer noted, there will be little sympathy for this crew if they're ever brought to justice. What can the Trippin Smurfs gang expect if they ever see the inside of a courtroom? They could try asking Brian T. Ferguson. The 43-year-old Pittsburgh man expects no quarter from a federal court when he's sentenced next month for hacking the AOL account of New York Common Pleas Court Judge Kim D. Eaton. Observers expect Ferguson will receive the maximum three-year sentence from a federal judge who will likely show sympathy toward his robed colleague. Need another example? Try William Grace and ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Roundtable: Advice on IT security budget management
by Andrew Briney
Four CISOs discuss practical strategies for getting the security budget you need, and spending it wisely.
-
Vulnerability scanners: Not the best tools for network perimeter defense
by Joel Snyder, contributor
Sidebar: Vulnerability scanners prove mediocre tools for helping IDSes protect the network perimeter.
-
IT security auditing: Best practices for conducting audits
by Carole Fennelly, Contributor
Even if you hate security audits, it's in your best interest to make sure they're done right.
-
Security spending on a tight information security budget
by Andrew Briney
Infosecurity budgets are increasing at a far slower rate than many people assume.
-
Roundtable: Advice on IT security budget management
by Andrew Briney
-
-
Testing and comparing vulnerability analysis tools
by Joel Snyder, Contributor
We tested five VA scanners to see how well they illuminate holes in your systems.
-
Beefing up security with BIG-IP load balancer
by Scott Sidel, Contributor
F5 Networks beefs up its BIG-IP load balancer to take on a greater security role.
-
Security audit tools: Vendors every auditor should use
by Caroline Fennelly, Contributor
Sidebar: An auditor should be familiar with a variety of tools and utilities, not just a single packaged scanner. They include utilities and power tools, both open source and commercial.
-
Testing and comparing vulnerability analysis tools
by Joel Snyder, Contributor
-
Columns
-
IT security spending: How to spend less
by Andrew Briney
To get the budget you need, think like a CFO: How do we make more, or how do we spend less?
-
IT security and ethical hacking: Does it do more harm than good?
by William H. Murray, Contributor
SQL Slammer was a new worm, but it's an old problem.
-
Your're caught: Examining punsihment for cybercrime
by Lawrence Walsh
The Trippin Smurfs hacker gang chose the wrong day to deface NASA.
-
The growth of information security acronyms
by Jay Heiser, Contributor
As more security certifications become available, there's an even greater opportunity for acronym abuse.
-
Six steps for security patch management best practices
by Fred Avolio, Contributor
Six steps to help decide when you must patch...and when it's OK to wait.
-
Protect Active Directory traffic with a VPN
by Russ Cooper, Contributor
Active Directory network traffic is mission critical and highly sensitive, and must be protected by a VPN.
-
Security for the virtual enterprise
by John Taylor, Contributor
When everything's "outside," how do you secure the "inside"?
-
IT security spending: How to spend less
by Andrew Briney
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO