StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Hacker Gary McKinnon - Essay Example

Cite this document
Summary
Gary McKinnon, the systems administrator from Scotland, is the alleged hacker behind the US Military and NASA computer hacking between the years 2001 and 2002. This notorious hacker taught the world about the importance of security measures to be adopted to stop hackers from…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.7% of users find it useful
Hacker Gary McKinnon
Read Text Preview

Extract of sample "Hacker Gary McKinnon"

Hacker Gary McKinnon Gary McKinnon, the systems administrator from Scotland, is the alleged hacker behind the US Military and NASA computer hacking between the years 2001 and 2002. This notorious hacker taught the world about the importance of security measures to be adopted to stop hackers from accessing highly confidential data. Thesis statement: Tight security measures with the help of security programs, effective preventive measures, and regular security verification could have prevented Hacker Gary McKinnon from hacking US Military and NASA computers.

What could have been done to stop the hacker? First of all, Gary McKinnon’s hacking exposes the lack of effective security measures within highly confidential computer networks of the US Military and NASA. For instance, an adequate firewall of effective security program could have prevented the hacker from his attempt. He was able to hack the NASA and the Department of Defense computers so easily because he was so conscious about his presence in these networks. For instance, the security measures were lower than expected by him.

One cannot imagine blank passwords in computers with high ranking status. But within US Military and NASA computers, there were a number of computers with blank passwords. Besides, there were ‘Administer’ status computers with no password. In short, the lower than expected defensive measures attracted Gary McKinnon to be a regular presence within the US Military and NASA computer network. The following security measures could have been done to stop the hacker. First of all, installation of regularly updated Firewall or other security programs can keep hackers away from accessing computer networks.

Gary McKinnon’s regular presence within the US Military and NASA computer network proves the ineffective security system which is unable to detect and prevent hackers. So, the installation of effective Firewall and other security programs is most important. Entering the computer network, the hacker was able to access almost all the data without any restriction. Richard Gissel points out that Gary McKinnon the notorious hacker was able to have the privileges of a administrator within the computer network (Gissel, 171).

This fact proves the ineffectiveness of security measures within the network. Besides, the regular updating and changing the passwords could have prevented the hacker from re-entering the network with ease. The hacker made use of early morning and late night to hack the network. This proves that security verification in early morning and late night is not so effective to restrict the hacker’s access. Scott C. Waring states that Gary McKinnon used to utilize different time zones to access the the US Military and NASA computers, which helped him to be unnoticed by the security authorities (Waring, 102).

The network engineers were not vigilant. For instance, once a network engineer asked Gary McKinnon about his presence in the network. Then he replied that he was Military Computer Security staff. This proves the ineffectiveness of network engineering within the computer network. So, strict surveillance could have stopped the hacker. Besides, after hacking the computer network, the hacker installed an administration tool which helped him to access the network from remote places. Athina Karatzogianni states that Gary McKinnon installed a remote access utility named as ‘RemotelyAnywhere’ which helped him to access the network from remote places (Karatzogianni, 109).

Besides, he deleted some system files and user accounts within the network. This proves that regularly updated and effective security programs could have prevented the hacker from entering and re-accessing the computer network. Summing, Gary McKinnon’s unauthorized entry into the highly confidential computer networks which belongs to the US Military and NASA proves the ineffectiveness of outdated security systems and the preventive measures adopted by the authorities. Besides, regularly updated security programs, time bound preventive measures, and regular security checking with the help of network engineers could have prevented Hacker Gary McKinnon from his attempt.

References Gissel, R. (2005). Digital Underworld. USA: MacroTech Press.Karatzogianni, A. (2006). The politics of cyber conflict. New York, NY: Taylor & Francis. Waring, S. C. (2010). UFO Sightings of 2006-2009. Bloomington, IN: iUniverse.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Hacker Gary McKinnon Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1574830-hacker-gary-mckinnon
(Hacker Gary McKinnon Essay Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/miscellaneous/1574830-hacker-gary-mckinnon.
“Hacker Gary McKinnon Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1574830-hacker-gary-mckinnon.
  • Cited: 0 times

CHECK THESE SAMPLES OF Hacker Gary McKinnon

New Cultural Experience

Different countries in the world have different cultures and traditional backgrounds.... They follow different religious faiths and maintain different lifestyles.... In order to experience a new cultural experience and have an insight into the differences between my way of life and religious faith from a foreign culture, I visited India in the last year....
11 Pages (2750 words) Essay

The Leading International Financial Institutions of the World

The dissertation "Can the United States be said to be dominant within the international financial institutions of the IMF and the World Bank" explores the position of the USA.... Notably, for years, the USA has been accused of employing all its efforts to gain economic dominance over the entire world....
26 Pages (6500 words) Dissertation

Procedure for Extradition of Fugitive Offenders in the UK

Extradition within the United Kingdom is governed both by EU and UK based law.... The general provisions are covered in the Extradition Act and the rest are covered through treaties between the US and others.... The essay shall focus on the Act, cases that have applied to it and opinion on overall matters shall be made. … Extradition is defined as the process by which a person accused in one state is transferred to another country that was seeking to place the accused person under trial....
20 Pages (5000 words) Essay

Who Are the Hackers and What Do They Do

Being a hacker is a one-way ticket to being an outcast, both socially and morally.... Even the Encarta dictionary tells about the difference between them: “cracker is someone who is a computer user, and who gains unauthorized access, to a computer or system data, belonging to someone else, and the hacker is somebody who is interested or skilled in computer technology and programming.... rdquo; Hackers first got recognition in the 19060s by the hacker culture around TMRC and the MIT labs....
8 Pages (2000 words) Case Study

Compromising Digital Devices

In the late 1990s, the biggest hacking cases were reported such as gary Mackinnon who was convicted of military crimes in US, Albert Gonzalez got the biggest jail sentence for stealing about two hundred million debit and credit numbers that cost losses of about £200 million (Ward, 2011).... The word ‘hacker' was coined by John Nash in 1980s who was a famous mathematician on the international level.... In 1981, Ian Murphy hacked data of AT&T and changed the clocks so that people could avail late night discounts and he was the first hacker to be convicted of felony charges....
12 Pages (3000 words) Essay

Capital Markets Effects on the New Economy Bubble

Barely 20 years since the end of the Cold War and 30 years since the achievement of neo-liberalism, free-market fundamentalism, excessive greed and extreme capitalism has become the economic orthodoxy of our time.... The agent for this change is referred as global financial crisis… This crisis has become one of the most significant assaults on global economic stability....
9 Pages (2250 words) Essay

Analysis of Gary McKinnon - UK Hacker Case

"Analysis of gary mckinnon - UK Hacker Case" paper is based on the severity of crime McKinnon committed and the risks involved in cybercrime.... The famous hacker of the United Kingdom, gary mckinnon was accused of one of the biggest cybercrimes in the year 2002.... The criminal activity of gary mckinnon shows that the chances of national threat and terrorism are very high for any country in the world.... nbsp;gary mckinnon is accused of penetrating more than 90 Pentagon systems that were unclassified....
5 Pages (1250 words) Case Study

The Use of Hacking

They point out that the motives of the hacker are to the betterment of the computer industry.... He adds that although elements of commercial grounds are present in all the generations, the first, second, and third generations maintained their “positive connotations of the hacker sobriquet” due to the pioneering qualities and ground breaking technological advances that they work held (24)....
10 Pages (2500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us