Monday, February 25, 2019

Cuckoo’s Egg Analysis Paper Essay

The zanys Egg book is puff up written by drop curtain Stoll. It was something like reading a evil story book. It was creepy, suspense, curiosity and scary too. The drudge e truly sentence breaks into a military system seemed to be like a ghost first appearance into the house and non like a thief. We dwell thief pull up stakes unquestionably when he attacks a home he will for authoritative grab all things possible for him to steal. But this ward-heeler was not doing simply that, he was wandering in the system and making some creepy moves and disappe ared. Many a times he would just come and go just to show that he was still there. Something like a ghosts act. drop curtain clearly briefs e real days situations, thoughts and re follow through of the sight around him. As we are reading this book and try to pretend the description given by drop, we can understand how things were in those days. The FBI, NSA, NCSC and CIA reacted and helped for such(prenominal) case. It was definitely very fractious for Cliff to hairgrip the pressure of his top dog and the unsupportive FBI.It was definitely a challenging case. An astronomer, who was least interested in electronic computer computer programmeming lands up tracking a spy which leads him to be a professional net and in strainingation security provider. This journey of Cliff is an example to many who loose hope on their current jobs, or sight who lost and dont know where they are destruction up.See more how to write an analysis paperFrom this book I take back lot of things related to computers, networks, the government, information security and its importance, and how to handle things under pressure and stress. There are many characters who teach us how to look at situations which real shows us a way to cypher the problem.Luis Alvarez is one such example who real showed Cliff another inspect of handling this case. I think it was because of him Cliff took this case as a research and not as part of his job.IMPORTANT ASPECTS OF THE BOOKThe very elicit part of this book is the way author relates all the problems to astronomy and physics. Most of the time it was his physicist friends who helped him crack the puzzle and find shadows related to the cuter.The referee must be good at computer security or astronomy in order to understand the relations made surrounded by them by the author. reason also analyzes masses relating to physics and planet study. Cliff describes his new boss Marv Atchley and his division head Roy Kerth in physics aspect. Roy who was a college professor teaching rough collisions, protons and anti-protons. He related his students and staff to his subatomic particles keep them in their orbits, energize them and then shoot them into static positions. Roy was provide up of the year long delays and excuses given by computer professionals.Author analyzed Roy and always made sure to start of a converse something about relativistic physics onwards he cou ld move on to computer related issues. That way author expected some frame of support for his tracking business, except Roy was a person who believed everything that had been be or had some proof.This made the author to maintain a logbook, in which he entered every single word related to this case. He even had stippled down the conversations made with every person whom he contacted for help. This logbook concept actually helped him to analyze the hacker and his activities, sometimes saved him from getting screwed by his higher(prenominal) authorities and also helped him to write his paper titled Stalking the mystifyy Hacker.Though the proficiencys used by the author to trace the hacker is out dated now, but his way of approach is definitely amazing. How he relates this case to astronomy and physics is a very unique way. other physics aspect applied for detection is When the hacker fires a common file transfer program called Kermit. The hacker also used the Kermit program on h is system, because the Kermit program checks each of its files after it has copied it from one computer to another. This proved the author that the hacker was obviously having all the sessions printed out and also copied on to a floppy disk.Here author calculates the distance between his computer and the hackers by the concept of sound travelled and its skirt heard. This way he arrives at a result of 279,000 miles but since his technician Lloyd was very good at communications beg offs him about the delays which occurred during communication between satellites and the earth, the hacker using a slow computer and the data transferred in the form of packets. Thus they land up with a result of 6000 miles.Another interesting way Maggie Morley cracked the word puzzle which led to a hint of hackers location. Though this is not physics approach, but definitely it is a different way of approach to solve a problem. Maggie gives the inwardness of Jaeger, in German it meant Hunter and it was a name of a run bird. Hunter and Jaeger were the passwords used by the hacker. Hedgers and Benson were the name Cigars. So this lead to a death that hacker must be somewhere in Germany and that he smoked.Dave Cleveland also gives a clue, which the hacker is not from the west coast. He comes to this conclusion by seeing the hacker type ps-eafg Unix command. This meant to Dave that the hacker didnt know Berkeley Unix.The outperform way to learn new things is to make mistakes and learn from your mistakes and the best way to understand others is to put your legs in their shoes. Cliff uses aforesaid(prenominal) technique he tries to be hacker himself to break into Mitre systems. He was thriving in logging into Mitre and finding out holes in its essential networks. He tried to log in to Mitre through Tymnet union as the hacker had done. This proved that it was possible for anyone to break into the most secured network systems and also helped to find the holes in the system.Cliffs a stronomer friends Jerry Nelson and terry Mast play an important role in helping cracking a couple of(prenominal) codes and puzzles related to the hacker. Jerry analyzed the codes and numbers given by the phone technician opus tracing out the hackers line. He said that 703 was area code to Virginia and C and P meant Chesapeake and Potomac. The next time they help to crack KH-11. It was a inscrutable spy satellite, KH stands for Key Hole and 11 was the series number.We should also be aware that in many countries hacking is not considered as illegal or crime. Some countries actually support hackers and maintain secret group of hackers to hack painful information of other countries. In this case it is very difficult to trace the hackers and punish them.The author not just keeps an eye on the hackers activities and trying to trace him but also tries to explain it to other authorities who could help him with this case. So he begins to talk to throng at FBI, Teejay at CIA, Zeke at NC SC, some spies and spooks. That way he actually becomes a spy himself trying in his own way to catch the hacker. This experience teaches him how to talk and explain things to such people and also very well understands that every department was not interested or were not ready to take up the case. This way he understands what importance people gave to the information and network security.CONCLUSIONThis book tells us how the government tempered a security issue. It is really pity that they were just bothered about the loss in figures and not the sensitive information that was stolen. The FBI, CIA, NCSC, NSA all of them had the same idea. They were worried about their reputation or about the loss in figures. They did not realize that the hacker was stealing some very sensitive information related to the U.S army, navy, and military.If they had been co-operative to Cliff they could have caught the hacker mush before and did not need a year. But now the FBI is very touch about the Cyber crime and identity theft. I learnt that they would take serious action in investigating such cases. This is definitely very important in todays world. As the number of users and systems are increasing, technology is advanced, people are connected not just through telephone lines, wires and cables but also they are connected wirelessly through Wi-Fi and Bluetooth connections which make them more unguarded to security threats.As number of users and system and technology is rising, number of cyber crimes and hackers are also increasing. Now the hackers are very intelligent unlike our Cuckoo in the book. Markus Hess could have been easily caught with the help of the FBI and NSA as he was leaving his traces everywhere. For example the passwords and the connections used were easily predictable.Today the hacker may be sitting next to you but it is very difficult to trace them. because complicated and advanced techniques and technologies must be implemented. At the same time it is every bodys responsibility to make sure that the information related to them in person or professionally must be secured.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.