0% found this document useful (0 votes)
60 views1 page

Rescue

Mike Lynn exposed a vulnerability in Cisco's Internet operating system at the Black Hat hacker conference to inform Cisco and help protect networks from worms, engaging with Cisco and the conference organizers on the details of his presentation. Those interested in exploiting such vulnerabilities could include hackers and crackers seeking to break into systems maliciously. When addressing such issues, government and industry must consider factors like the need to balance security against cooperation with the hacker community.

Uploaded by

Cymon Daz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views1 page

Rescue

Mike Lynn exposed a vulnerability in Cisco's Internet operating system at the Black Hat hacker conference to inform Cisco and help protect networks from worms, engaging with Cisco and the conference organizers on the details of his presentation. Those interested in exploiting such vulnerabilities could include hackers and crackers seeking to break into systems maliciously. When addressing such issues, government and industry must consider factors like the need to balance security against cooperation with the hacker community.

Uploaded by

Cymon Daz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 1

Question:

1. How did Mike Lynn explain his purpose in exposing the vulnerability in the Cisco Internet operating
system? What other purpose might Lynn have had in making his presentation?
Answer:
Mike Lynn and explain his purpose in exposing the vulnerability in the CISCO Internet operating system informing
the ISS and CISCO of his intentions to talk at the Black Hat Conference, a popular meeting of computer hackers,
and three parties enter discussions weighed in the conference managers to decide what information Lynn would be
allowed to convey. His purposes are to protect the country and the nation from network worm.
2. What types of perpetrators might be interested in exploiting the vulnerability of CISCO Internet operating
system?
Answer:
Possible perpetrators that are interested in exploiting the vulnerability in the CISCO Internet operating system
operates are hackers and crackers who break into systems with malicious intent.
3. What factors do the government and industry have to consider in dealing with the hacker and cracker
community?
Answer:
That hackers and crackers are dangerous to the public and can steal identities of known people. They should do
something about it.

You might also like