Do a research on the top 10 most notorious hackers in the world. You may put a picture on each one you find with the same specifications. (please put references before starting item #2.)
This people are the most notorious hacker in the world.

1. Gary McKinnon
must’ve been an inquisitive, anxious kid, for to pick up data on UFOs, he thought it better to get an immediate access into the channels of NASA. He penetrated 97 US military and NASA PCs, by introducing infection and erasing a couple of records. Every one of the endeavors to fulfill his interest, at the same time, oh dear, snooping around can lead to unexpected trouble.

2. LulzSec or Lulz
Security, a prominent, Black Hat programmer gathering, picked up qualifications for hacking into Sony, News International, CIA, FBI, Scotland Yard, and a few significant records. So famous was the gathering that when it hacked into News Corporations account, they put over a bogus report of Rupert Murdoch having passed away.

3. Adrian Lamo
chosen to switch vocations when he understood the possibilities of his aptitudes. He turned into a news when he hacked into Yahoo!, Microsoft, Google, and The New York Times. This, in spite of the fact that finished into his capture, it later helped him gain the group of an American Threat Analyst. A person who would hack into choice records sitting in the roomy and consoling cafeterias, libraries, web bistros, before long turned Wikileaks suspect Bradley Manning over to FBI.

4. Mathew Bevan and Richard Pryce
Focusing on the over-touchy nerves, what Mathew Bevan alongside his supposed accomplice Richard Pryce did, could have activated extraordinary numerous issues among USA and North Korea. The pair hacked the US military PCs and utilized it as a way to invade the remote frameworks. The essential substance of Korean Atomic Research Institute were dumped into USAF framework.

5. Jonathan James
The primary adolescent to be detained for a digital wrongdoing at 16 years old, Jonathan James or also called c0mrade, hacked into Defense Threat Reduction Agency of US division. Further, he introduced a sniffer that investigated the messages passed on between the DTRA workers. In addition to the fact that he kept a mind the messages being passed around, all the while, he gathered the passwords and usernames and other such crucial subtleties of the representatives, and further even stole fundamental programming.

6. Kevin Poulsen
Poulsen invaded a radio shows bring in challenge to make sure he could win a Porsche. Dim Dante, as he was better known, went underground after FBI began seeking after him. He, later, was discovered liable of seven tallies of mail, wire and PC misrepresentation, tax evasion and the preferences. What ended up being remunerating in Dark Dante’s case is – his past created his future. Poulsen now fills in as a Senior Editor at Wired.

7. Kevin Mitnick
Kevin, who is currently a security advisor, was sentenced for hacking Nokia, Motorola and Pentagon. He conceded to seven checks of misrepresentation that included wire extortion, PC misrepresentation and of unlawfully capture a wire correspondence.

8. Anonymous
The idea of being an “advanced Robin Hood” was a long way from being imagined, however in the PC age, all things considered, somebody some place has packed away this title. A “hacktivist gathering” called Anonymous are known with the penname of being the “computerized Robin Hood” among its supporters.

9. Astra
A 58-year-old Greek Mathematician hacked into the frameworks of France’s Dassault Group, stole helpless weapons innovation information and sold it to various nations for five long years. While the genuine character of the ASTRA remains untraced, authorities have said that he had been needed since 2002. Astra sold the information to roughly 250 individuals from around the world, which cost Dassault $360 a huge number of harm.

10 Albert Gonzalez
Stole from Visas of the netizens. This was recorded to be the greatest charge card burglary ever of. He exchanged roughly 170 million Visas and ATM numbers. He did as such by introducing a sniffer and sniffing out the PC information from inside corporate systems. Whenever captured, Gonzalez was condemned to 20 years in Federal jail
https://thoughtcatalog.com/siddhi-palande/2014/06/10-best-hackers-the-world-has-ever-known/
2. Explain why the cost to identify and remove a defect in the early stages of software development might be 100 times less than the cost of removing a defect in the software that has been distributed to hundreds of costumers.
In the event that the expense isn’t distinguished in the beginning times, some improve of the expectations produced in the former stages must be finished. Additionally, the later the mistake is discovered, the more people are influenced by the blunder. At late stages, it will cost cash to impart the details of an imperfection, convey and apply programming fixes, retrain end-clients for an item that has been sold to many clients.
https://www.coursehero.com/file/15135990/9507-3-Discussion-Sheet/
3. Identify the three criteria you can consider to be most important in a quality system. Briefly discuss your rationale for selecting these criteria.
Security
is a critical issue on programming advancement, particularly for web or versatile based ones which may have a large number of clients with the capacity of remote getting to framework. You should develop a security arrangement and apply it effectively by leaving no section focuses. This may incorporate approval and confirmation methods, organize assault insurances, information encryption, etc. every single conceivable sort of security holes ought to be considered, else one day just a single assault may crash your entire applicaion and entire organization.
Functionality and Correctness
Functionality (or correctness) is the conformity of the software program with actual requirements and specifications. In fact this is the precendition attribute of an application, and maybe no longer a great aspect however we desired to factor that as the ultimate first-rate factor, for taking attention: Quality elements are not significant when we are speaking about unfunctional software. First, perform desired performance and produce right software, then observe quality elements on it. If you can perform both paralelly, it is the best.
Maintainability and Readability
Maintainability is a touch similar with flexibility but it makes a speciality of changes about mistakes corrections and minor characteristic adjustments, not most important functional extensibilities. it could be supported with useful interface definitions, documentation, and self-documenting code and/or code documentation. The more correct and beneficial documentation exists, the extra maintainability can be carried out.
https://dzone.com/articles/10-groups-software-quality