Suche innerhalb des Archivs / Search the Archive All words Any words

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[] "Matrix Reloaded" als Hackerschulung?,

In der einen Szene, wo Trinity sich in einen Rechner hackt, ist
tatsächlich nmap auf dem Bildschirm zu sehen. Das trägt sicherlich zur
Street-Credibility des Films bei, reicht aber sicher nicht als
Ausbildungshilfe für Hacker. 
Eins muss man John Kavanagh aber lassen: Einen guten Aufhänger für einen
Artikel zum Thema IT-Sicherheit hat er da gefunden. ;-)
BCS ist übrigens die British Computer Society.

Experts fear hacking scenes in Matrix Reloaded are too accurate

by John Kavanagh 
17 June 2003 

Expert BCS members have warned movie fans not to try to emulate the 
realistic depiction of computer hacking seen in hit film The Matrix 

The society said many experts were sufficiently concerned about the 
accuracy of some of the computing scenes that they have alerted young 
enthusiasts about the illegality of hacking and the tough prison 
sentences handed out to perpetrators of this crime.

"Hacking is a criminal offence and the Metropolitan Police is 
targeting those who gain unauthorised access to computer systems. 
Courts are increasingly handing out stiffer sentences to those 
convicted," said detective constable Andy Cookson of the Scotland Yard 
Computer Crime Unit, whose members all recently joined the BCS.

Cookson said organisations had to be proactive in securing their 
networks. "Although Hollywood likes to glamorise hacking, and this 
movie would appear to be more accurate than many in its portrayal of 
network mapping software, it is not as simple as it appears. Effective 
monitoring of all applications and ensuring they are all patched to 
the latest version should deny easy entry."

Some forms of hacking are almost impossible to prevent but 
organisations can employ simple security methods, said Phil Phillips, 
spokesman for the BCS Information Security Specialist Group. 

"Hackers seek to exploit weaknesses in systems, operational procedures 
and user awareness. Suppliers offer updates that can minimise many 
common methods, but these have to be applied correctly, tested and 
maintained. This can often be a difficult business challenge. 
Operational procedures should also be tested and maintained as 
business and technology evolves," he said.

"In the face of the rising tide of assaults on systems, it is 
essential to recognise how and where risks can occur and to address 
measures to prevent, detect and minimise the impact on your business 
and your customers.

"A regular, thoughtful review of your business risks, coupled with the 
adoption of simple and obvious protective measures, mean you can go 
home comforted by the thought that any risk of hackers has been 

Charlotte Walker-Osborn, IT lawyer for the BCS Information Security 
Specialist Group, said, "The Computer Misuse Act has always had teeth, 
as was shown when a hacker was recently sentenced for two years - the 
strictest sentence yet. Legislation currently being debated seeks to 
further strengthen this law.

"In the past, there has not been a high number of prosecutions under 
the Computer Misuse Act and this has generally been attributed to 
insufficient resources for investigations and a lack of reporting. The 
lack of resources is currently being addressed and prosecutions in 
this area are becoming more common."

Liste verlassen: 
Mail an infowar -
 de-request -!
- infopeace -
 de mit "unsubscribe" im Text.