html5-img
1 / 9

Ethical hacking Is all hacking created equal?

Ethical hacking Is all hacking created equal?. Craig Rimando Luke White. Introduction. “hacking” - negative connotation Not always that way Originally a compliment Not all hacking necessarily bad “Good” hacking? Ethical hacking?. The dark side. “Bad” hacking groups Anonymous

ayame
Download Presentation

Ethical hacking Is all hacking created equal?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Ethical hacking Is all hacking created equal? Craig Rimando Luke White

  2. Introduction • “hacking” - negative connotation • Not always that way • Originally a compliment • Not all hacking necessarily bad • “Good” hacking? Ethical hacking?

  3. The dark side • “Bad” hacking groups • Anonymous • Lulzsec • Black hat hackers • DoS /DDoS • Identity Theft • Website Defacement • Leaking Incriminating or Personal Information • Viruses / Worms

  4. Is all hacking bad? • Is there a grey area? • Honorable or benign motivations • Protect computer networks • Deter hackers from hacking in the future • Should any form of hacking be permitted? • Counter hacking • Certified ethical hacking • Clipper chip

  5. Counter hacking • Pre-emptive or reactionary response to a hacking attack • Ethical Worms • Sovereignty over own computer but not the Internet • For the greater good • Self-Defense • Innocent Third Party • Who is in control • Identify other victims • Find the origin or next hop point • Jerome Heckenkamp case

  6. Certified ethical hackers • Some company’s are founded on beneficial hacking • Security Explorations • “providing various services in the area of security and vulnerability research” • Discovered and reported numerous Java bugs • Billions of users at risk • EC-Council • Offers a professional certification – Certified Ethical Hacker • Employed by company, penetrate networks like a hacker • Purpose: find & fix security vulnerabilities

  7. Clipper Chip • Discussed and developed 1990’s government plan • Installed in electronic communication with unique government encryption • Only government could decrypt • Valid warrant needed for each tap • Same longstanding law as for wire taps • Downside: Some people feared government would abuse its power • Upside: monitor known criminals and terrorists • Decrease the amount of crime – deter criminal activity • Increase the government’s ability to fight crime

  8. Conclusion • Not all hacking is necessarily bad. • Some can be ethically justified • Intended to protect users / public • Deter future attacks • Find security flaws/ Code innovations • Infringe on privacy rights?

  9. Questions

More Related