Kevin Mitnick - Discussion

  In February 1995 Kevin Mitnick was arrested due to what Assistant U.S. Attorney Christopher Painter called "a countrywide hacking spree" that earned Mitnick a spot on the FBI's Most Wanted list, as well as the reason to increase his sentence. Furthermore, he was believed to have been held longer without a trial than any other prisoner in the United States. Additionally, it is been said that he was held unfairly because the government wanted to make him be an example(Christensen,1999). Therefore, I could say one of the findings of my case study is he was punished and he took a rough punishment more than he deserved. 


(BERSAMA,2018)



Moreover, the damage and losses caused by Kevin Mitnick were slight and the companies had not suffered meaningful losses. That is because he was driven by pride in his technical ability, not profit. We cannot consider him as a fraudster, as he had a radical change to exploit his skills in helping other companies built and protect their systems from cyber-attacks(SJOUWERMAN,2020).



According to research about Kevin Mitnick that was done by McMillan (2008) he stated that Computer security experts need to gain and learn from the exploits that have occurred and study the manners in which the hackers acquired unapproved access. This way the security expert can be ready to combat these or similar style attacks in the real world. The Chief Technology Officer (CTO) at White Hat Security said he actually utilizes Calce's Yahoo that done by Kevin as a point of reference when he needs to discuss what sort of bandwidth it takes to knock a site offline.


(factrepublic,2005)


In addition, research was done by Mason (2008) he confirmed that arresting Kevin Mitnick gain the federal authorities experience on how to deal with and arrest veteran criminals. As they consider his arrest was unreasonable.



(NURIEL,2017)


Kevin Mitnick is considered as one of the most influential people in the field of cybersecurity. His experience in hacking and his attacks has been studied, thus it made the defensive level of many companies to be difficult to penetrate. Besides, his contributions to raising the awareness of protecting the system from attacks, and that by publishing his book on that subject.











The limitation and suggestions of this case study:

This case study has covered the main aspects of Kevin Mitnick accomplishments and his contributions to the cybersecurity aspect. However, due to the limited time, I could not cover his followed approach to improve the system immunity or to make a sturdy cyber attack. Additionally, his books could be read to comprehension and learn from his skill.

(funwhichuwant,2012)






References:

MASON, A (2008) A crime by any other name [Online] FREEDOMMAG. Available from: A Crime By Any Other Name... - Freedom Magazine Published by Church of Scientology [Accessed 08/06/21].

SJOUWERMAN, S (2020) I hired an infamous hacker—and it was the best decision I ever made [Online] FASTCOMPANY. Available from:I hired an infamous hacker—here's how he helped us succeed (fastcompany.com)[Accessed 08/06/21].

CHRISTENSEN, J (1999) The trials of Kevin Mitnick [Online] CCN. Available from:CNN - The trials of Kevin Mitnick - March 18, 1999 [Accessed 08/06/21].

BERSAMA, B (2018) Kevin Mitnick: America's Most Wanted Hacker
 [Online] BLOGSPOT. Available from:3 Idiots STIKOM (3idiots-stikom.blogspot.com) [Accessed 08/06/21].

MCMILLAN, S (2008) Kevin Mitnick Research Paper [Online] FREEONLINERESEARCHPAPERS. Available from: Kevin Mitnick Research Paper (freeonlineresearchpapers.com) [Accessed 08/06/21].

FACTREPUBLIC (2005) Kevin Mitnick [Online] FACTREPUBLIC. Available from:Kevin Mitnick | Fact# 56 | FactRepublic.com [Accessed 08/06/21].

FUNWHICHUWANT (2012) Free Download Hardware Hacking: Have Fun While Voiding Your Warranty [Online] FUNWHICHUWANT. Available from: Learn Ethical Hacking: Free Download Hardware Hacking: Have Fun While Voiding Your Warranty (funwhichuwant.blogspot.com) [Accessed 08/06/21].

NURIEL, D (2017) Mediaplanet Joins the NSA, Robert Herjavec and More on the Frontlines of the Battle for Cyber Security [Online] PRWEB. Available from: Mediaplanet Joins the NSA, Robert Herjavec and More on the Frontlines of the Battle for Cyber Security (prweb.com) [Accessed 08/06/21].

0 Comments