Jump to content

The Art of Intrusion

From Wikipedia, the free encyclopedia

GloudSim has an article by Sheng Di and Franck Capello that offers in-depth information about virtual machines. This connects to The Art of Intrusion because it talks about how "1200 jobs can be done simultaneously over 112 virtual machines" (Di & Capello, 2015).[1] This is important because this book talks about how the hackers at the casino were able to figure out the random number generator and use multiple virtual drives. These virtual machines would be similar because you could perform many tasks with multiple virtual machines anywhere you go to keep the instructions of their hacking or just important data without it being on your main computer screen for others to see. This is related to how multiple virtual drives and virtual machines are very similar in being able to hold a lot of data and offer easy accessibility.[1][2]

The Art of Intrusion also talks about how corporations could have a vulnerability in their cybersecurity section and that could increase the likelihood of hacking until it has been patched with fixes to the problem. The article I found evaluates how vulnerability assessments are done and how they relate to hacking. "These include, active threat detection, such as phishing simulations and scanning of computers for data misuse, as well as the covert monitoring of email, social media, network traffic, and even productivity tools such as Word" (Pienta, 2024).[3] This relates to the book because they have that vulnerability and these actions for assessment would help their process of not getting hacked and diminish the chances of a hacker getting into their company's data or information.[2][3]

In an article by IEEE Software, it talks about the basic functions of Linux. They mention how "high-level scripting is a very important part of using Linux systems" (Bollinger, 1999-2001).[4] The Art of Intrusion also mentions how they use "encrypted scripting for secret files in Linux that gave no trace of where they came from and made it quite difficult to get a hold of if you were a hacker" (Mitnick & Simon, 2005).[2] Both the book and article are compatible because they show you the basic functions of scripting and connect with the security side of information. Ultimately, both resources value high-level scripting to inform the user whether that is beginner, intermediate, or advanced but also give a layer of protection on the security side as well to make it not as easy to get ahold of your information.[2][4]

The Art of Intrusion talks about a "hacker got into a bank with a virtual personal network that gives them a single IP address connected to the internal system of the bank" (Bollinger, 1999-2001).[4] I was able to find another article on virtual machines but this connects differently to the virtual personal network. The article Designing Adaptive Virtual Worlds talks about how "the design of virtual worlds allows us to extend our physical world" (Gu & Maher, 2014).[5] This is important because it is very similar to how a VPN can be discrete with what you are doing and the location, but also how virtual worlds allow you to be discrete with many virtual machines not just in one place where you can do many things. Finally, the VPN and virtual worlds allow hackers to do their job and get into important things that are within any company or industry that they are hacking into because of the security and privacy both of these technology applications can do.[4][5]

The Art of Intrusion
AuthorKevin D. Mitnick
William L. Simon
LanguageEnglish
GenreComputer security, computer hackers
PublisherJohn Wiley & Sons
Publication date
March 4, 2005
Pages270
ISBN0-7645-6959-7
OCLC224374215
005.8 22
LC ClassQA76.9.A25 M587 2005
Preceded byThe Art of Deception 

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers is a book by Kevin Mitnick that is a collection of stories about social engineering as performed by other hackers. Each story ends by summarizing insight into the attack as well as measures to defend against it. The book was published after Mitnick's first book, The Art of Deception, and explores the same themes introduced in the first book.[6][7][8]

References

[edit]
  1. ^ a b Di, Sheng; Cappello, Franck (2015). "GloudSim: Google trace based cloud simulator with virtual machines". Software: Practice and Experience. 45 (11): 1571–1590. doi:10.1002/spe.2303. ISSN 1097-024X.
  2. ^ a b c d Mitnick, Kevin D.; Simon, William L. (2005). The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers. Hoboken: John Wiley & Sons, Inc. ISBN 978-0-471-78266-7.
  3. ^ a b Pienta, Daniel; University of Tennessee, Knoxville; Thatcher, Jason Bennett; University of Colorado Boulder; Wright, Ryan T.; University of Virginia; Roth, Philip L.; Clemson University (2024). "An Empirical Investigation of The Unintended Consequences of Vulnerability Assessments Leading to Betrayal". Journal of the Association for Information Systems. 25 (4): 1079–1116. doi:10.17705/1jais.00875.
  4. ^ a b c d Bollinger, T. (1999–2001). "Linux in practice: an overview of applications". IEEE Software. 16 (1): 72–79. doi:10.1109/52.744572.
  5. ^ a b Gu, Ning; Maher, Mary Lou (2014-05-21). Designing Adaptive Virtual Worlds. DE GRUYTER OPEN. doi:10.2478/9783110367669. ISBN 978-3-11-036765-2.
  6. ^ "The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers". Library Journal. Vol. 130, no. 1. p. 139.
  7. ^ Johnson, Cecil; Star-Telegram, Fort Worth (2005-05-06). "Giving praise for the Robin Hoods of hacking". St. Louis Post - Dispatch. St. Louis. pp. –5. ISSN 1930-9600.
  8. ^ Johnson, Cecil (2005-06-12). "When it comes to hackers, it takes one to know one". Orlando Sentinel. Orlando. pp. –6.