Home
Authors
Tags
App
Get QuoteDark Inspirational Quotes App
" I believe in having each device secured and monitoring each device, rather than just monitoring holistically on the network, and then responding in short enough time for damage control. "
Kevin Mitnick
Short
Enough
Control
Related Quotes:
" The best thing to do is always keep randomly generated passwords everywhere and use a password tool to manage it, and then you don't have to remember those passwords at all, just the master password that unlocks the database. "
Kevin Mitnick
Best
Remember
Master
" If I needed to know about a security exploit, I preferred to get the information by accessing the companies' security teams' files, rather than poring over lines of code to find it on my own. It's just more efficient. "
Kevin Mitnick
Own
Security
Know
" Most of the computer compromises that we hear about use a technique called spear phishing, which allows an attacker access to a key person's workstation. It's extremely difficult to defend against. "
Kevin Mitnick
Difficult
Key
Against
" Social engineering is using deception, manipulation and influence to convince a human who has access to a computer system to do something, like click on an attachment in an e-mail. "
Kevin Mitnick
Human
Engineering
Deception
" I saw myself as an electronic joy rider. "
Kevin Mitnick
Myself
Rider
Saw
" It's kind of interesting, because hacking is a skill that could be used for criminal purposes or legitimate purposes, and so even though in the past I was hacking for the curiosity, and the thrill, to get a bite of the forbidden fruit of knowledge, I'm now working in the security field as a public speaker. "
Kevin Mitnick
Knowledge
Past
Skill
" I was pretty much the government's poster boy for what I had done. "
Kevin Mitnick
Boy
Government
Much
" A hacker doesn't deliberately destroy data or profit from his activities. "
Kevin Mitnick
His
Data
Hacker
" I think it goes back to my high school days. In computer class, the first assignment was to write a program to print the first 100 Fibonacci numbers. Instead, I wrote a program that would steal passwords of students. My teacher gave me an A. "
Kevin Mitnick
School
Teacher
Think
" Nine out of every 10 large corporations and government agencies have been attacked by computer intruders. "
Kevin Mitnick
Been
Out
Corporations
" Our Constitution requires that the accused be presumed innocent before trial, thus granting all citizens the right to a bail hearing, where the accused has the opportunity to be represented by counsel, present evidence, and cross-examine witnesses. "
Kevin Mitnick
Opportunity
Innocent
Constitution
" Of course I'm sure half the people there hate me and half the people like me. "
Kevin Mitnick
Half
Hate
Sure
" My actions constituted pure hacking that resulted in relatively trivial expenses for the companies involved, despite the government's false claims. "
Kevin Mitnick
Actions
Pure
Government
" To have transactions made on your web site via credit card, you must be PCI compliant. Businesses make the mistake of thinking that because you passed the requirements and are PCI certified, you are immune to attacks. "
Kevin Mitnick
Mistake
Credit
Web
" Most people assume that once security software is installed, they're protected. This isn't the case. It's critical that companies be proactive in thinking about security on a long-term basis. "
Kevin Mitnick
Proactive
People
Thinking
" Steve Wozniak and Steve Jobs founded Apple Inc, which set the computing world on its ear with the Macintosh in 1984. "
Kevin Mitnick
Ear
Computers
Set
" So the ethic I was taught in school resulted in the path I chose in my life following school. "
Kevin Mitnick
Taught
Life
My Life
" The hacker mindset doesn't actually see what happens on the other side, to the victim. "
Kevin Mitnick
Hacker
Victim
Side
" Businesses should absolutely set aside funding in their budgets for security consultants. Unless there is an expert on staff, and there usually is not, it needs to be outsourced. "
Kevin Mitnick
Expert
Needs
Funding
" The government does things like insisting that all encryption programs should have a back door. But surely no one is stupid enough to think the terrorists are going to use encryption systems with a back door. The terrorists will simply hire a programmer to come up with a secure encryption scheme. "
Kevin Mitnick
Enough
Government
Stupid
" I trust online banking. You know why? Because if somebody hacks into my account and defrauds my credit card company, or my online bank account, guess who takes the loss? The bank, not me. "
Kevin Mitnick
Credit
Me
Trust
" Penetrating a company's security often starts with the bad guy obtaining some piece of information that seems so innocent, so everyday and unimportant, that most people in the organization don't see any reason why the item should be protected and restricted. "
Kevin Mitnick
Security
Innocent
Organization
" Both social engineering and technical attacks played a big part in what I was able to do. It was a hybrid. I used social engineering when it was appropriate, and exploited technical vulnerabilities when it was appropriate. "
Kevin Mitnick
Social
Used
Hybrid
" If you go to a coffee shop or at the airport, and you're using open wireless, I would use a VPN service that you could subscribe for 10 bucks a month. Everything is encrypted in an encryption tunnel, so a hacker cannot tamper with your connection. "
Kevin Mitnick
You
Service
Hacker
" So what I was essentially doing was, I compromised the confidentiality of their proprietary software to advance my agenda of becoming the best at breaking through the lock. "
Kevin Mitnick
Through
Lock
Software
" Back in my day, I would probe by hand. Now you can get commercial software that does the job for you. "
Kevin Mitnick
Now
Job
Back
" Back up everything! You are not invulnerable. Catastrophic data loss can happen to you - one worm or Trojan is all it takes. "
Kevin Mitnick
You
Data
Back
" My hacking was all about becoming the best at circumventing security. So when I was a fugitive, I worked systems administrator jobs to make money. I wasn't stealing money or using other people's credit cards. I was doing a 9-to-5 job. "
Kevin Mitnick
Money
People
Security
" Hackers are becoming more sophisticated in conjuring up new ways to hijack your system by exploiting technical vulnerabilities or human nature. Don't become the next victim of unscrupulous cyberspace intruders. "
Kevin Mitnick
Human
Human Nature
Nature
" My argument is not that I shouldn't have been punished, but that the punishment didn't fit the crime. "
Kevin Mitnick
Crime
Punishment
Argument