Computable.nl
  • Thema’s
    • Carrière
    • Innovatie & Transformatie
    • Cloud & Infrastructuur
    • Data & AI
    • Governance & Privacy
    • Security & Awareness
    • Software & Development
    • Werkplek & Beheer
  • Sectoren
    • Channel
    • Financiële dienstverlening
    • Logistiek
    • Onderwijs
    • Overheid
    • Zorg
  • Awards
    • Computable Awards
    • Nieuws
    • Winnaars
    • Partner worden
  • Vacatures
    • Vacatures bekijken
    • Vacatures plaatsen
  • Bedrijven
    • Profielen
    • Producten & Diensten
  • Kennisbank
  • Magazine
  • Nieuwsbrief

(Un)organised crime

07 maart 2002 - 23:004 minuten leestijdOpinieCloud & Infrastructuur
Martin Healey
Martin Healey

I have no time for hackers. To me they are vandals and thieves. They contribute nothing and cause a lot of agro for other people. They think they are very clever, and in a technical sense they are, but why should all that talent be so maliciously misdirected? It is a sad commentary on our society today that young, clever people can misuse their abilities and opportunities so badly.

There is of cause two different themes to hacking, distributing viruses and accessing private data. The former is pure vandalism, giving twisted pleasure but no gain to the offender. The latter is far more serious in the long term. There are two reasons to hack into private data, either to steal or to disrupt. In the current climate the fear of disruptive intervention by terrorists is a real threat, but theft has always been a human frailty and it will continue to be so.
I have no access to quantifiable figures to determine just how much theft takes place over the Internet. I suspect that there is quite a large body of evidence available in some sources, but there is a lot of secrecy surrounding it all. Financial institutions don’t want any problems of security publically exposed. In fact the Internet is only one place where theft through IT systems takes place. There has always been illegal access to data from employees of companies, which in fact is a lot more difficult to police than external Internet access. There is a strong possibility that companies are spending money on Internet security and under appreciating the problems of intranet security.
Credit card related theft over the Internet gained the biggest exposure in the early days, but this was probably far lower than theft related to telephone or other uses of cards, it was just that the Internet had such a concentrated exposure. In any case some good came of this in that secure transaction services were quickly developed and implemented, so that today the Internet is just as secure as a telephone transaction, possibly more so.
Recently however I have for the first time been exposed to software theft and the frightening scale of it. In the past, and when we eventually return to centralised systems, it was and will be easier to monitor and check the validity of licences for the use of software. I am sure that there is a big business in pirating mainframe software for installation in countries where they have the skills to implement it, but no official monitoring. But it is the PC that causes the most obvious problems. PC software is licenced to users (not sold to them), generally on a one fee per user basis. This software can be installed on servers in a corporate environment, where it can easier be monitored. But there is a vast number of individual PCs in use, the software for which is installed directly to the integral hard disc. Typically today this is distributed on a CD ROM. These are supplied either in an "OEM" form for distribution with a PC, or they are available individually packaged as a "retail" version. Normally only the packaging (and price) varies, not the actual software. The same CD can be used to instal the software on multiple PCs, but that is theft, because the licence is for use per PC, not per CD! This I am afraid to say is a very common practice among friends and a not uncommon one in business. It is policed by organisations such as BSA, but there is a limit to what they can achieve outside large and medium sized organisations. There are telephone hotline services provided to encourage responsible people to report any misuse they may notice, but human nature limits the success of these services.
The worst example however that I have recently encountered is the mass production of counterfeit CDs. These look like the real Microsoft product, including the printed material such as jewel case inserts. They are good enough copies to fool anyone except an expert in CD manufacture. To produce CDs of this quality requires a professional mastering and stamping facility, an investment on $100,000 or more, which must be sited somewhere in the world as to be difficult to trace. It is organised crime. Remember that it is illegal to use illegal products, so users should be careful about sourcing software, and in particular be very suspicious of cut-price offerings!

Deel

    Inschrijven nieuwsbrief Computable

    Door te klikken op inschrijven geef je toestemming aan Jaarbeurs B.V. om je naam en e-mailadres te verwerken voor het verzenden van een of meer mailings namens Computable. Je kunt je toestemming te allen tijde intrekken via de af­meld­func­tie in de nieuwsbrief.
    Wil je weten hoe Jaarbeurs B.V. omgaat met jouw per­soons­ge­ge­vens? Klik dan hier voor ons privacy statement.

    Whitepapers

    Computable.nl

    Ontdek hoe je de kracht van private cloud kunt ontgrendelen

    De toekomst van serverbeheer. Nieuwe eisen aan prestaties en beveiliging.

    Computable.nl

    Ontdek hoe je de kracht van private cloud kunt ontgrendelen

    Nieuwe eisen aan prestaties en beveiliging. De toekomst van serverbeheer.

    Computable.nl

    Grip op de soevereine cloud

    Van bewustwording naar daadwerkelijke controle. Sleutelrol voor CIO en CFO.

    Geef een reactie Reactie annuleren

    Je moet ingelogd zijn op om een reactie te plaatsen.

    Populaire berichten

    Meer artikelen

    Uitgelicht

    Partnerartikel
    Innovatie & Transformatie

    Barco introduceert nieuw vergadersyste...

    Videoconferencing is volledig ingeburgerd in de vergaderzaal. Met ClickShare heeft Barco een oplossing om gemakkelijk en draadloos videovergaderingen te starten...

    Meer persberichten

    Meer lezen

    Software & Development

    Vibe coding en het lot van de developer

    Cloud & Infrastructuur

    Eurofiber en Open Dutch Fiber slaan handen verder ineen

    EU digitale
    Cloud & Infrastructuur

    Nederland in Europees consortium voor digitale gemeenschapsgoederen

    Software & Development

    Verkeerde configuratie bij Azure leidt tot veel storingen

    Nexperia
    Cloud & Infrastructuur

    Nexperia-topman wilde 40 procent personeel in Europa ontslaan

    Overheid

    VVD: wij willen een ‘AcICT on steroids’

    ...

    Footer

    Direct naar

    • Carrièretests
    • Kennisbank
    • Planning
    • Computable Awards
    • Magazine
    • Ontvang Computable e-Magazine
    • Cybersec e-Magazine
    • Topics
    • Phishing
    • Ransomware
    • NEN 7510

    Producten

    • Adverteren en meer…
    • Jouw Producten en Bedrijfsprofiel
    • Whitepapers & Leads
    • Vacatures & Employer Branding
    • Persberichten

    Contact

    • Colofon
    • Computable en de AVG
    • Service & contact
    • Inschrijven nieuwsbrief
    • Inlog

    Social

    • Facebook
    • X
    • LinkedIn
    • YouTube
    • Instagram
    © 2025 Jaarbeurs
    • Disclaimer
    • Gebruikersvoorwaarden
    • Privacy statement
    Computable.nl is een product van Jaarbeurs