ethical hacking

Post on 21-Aug-2015

699 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

ETHICAL HACKING

what8is8ETHICS8?888888888888888888888

EthicsMoral Responsibility to

do the correct thing

?

what8is8ETHICS8?888888888888888888888

“ETOS”

what8is8ETHICS8?888888888888888888888

Meta Ethics Normative Ethics Applied Ethics

what8is8ETHICS8?888888888888888888888

Why Ethics Make good people & make good actions Social Consideration Ethical Consideration

?

ETHICAL8HACKING88888888888888888888888

Art and science of determiningthe vulnerabilities of

your information infrastructure toBetter defend them

ETHICAL8HACKING88888888888888888888888

Performed by high skilledETHICAL

Security Professionals

ETHICAL8HACKING88888888888888888888888

White Box Testing

Types of Ethical Hacking

You have full knowledgeof the network

ETHICAL8HACKING88888888888888888888888

Black Box Testing

Types of Ethical Hacking

You have full knowledgeof the network

Code8of8ethics88888888888888888888888

Hands On Imperative Information Wants to Be Free Mistrust Authority No Bogus Criteria You can create truth and beauty on a computer

Original Hacker Ethics Found in Steven Levy's 1984 book Hackers:Heroes of the Computer Revolution

Code8of8ethics88888888888888888888888

Above all else, do no harm Protect Privacy Waste not, want not Exceed Limitations

New Hacker Ethics

Found in the article “Is there a Hacker Ethic for 90s Hackers?” written by Steven Mizrach

Advantages8of8ethical8hacking888888888

To take preventive measures against hackers

Advantages8of8ethical8hacking888888888

To fight against terrorism

Advantages8of8ethical8hacking888888888

A system that helps prevent entry by hackers to create

DISAdvantages8of8ethical8hacking888888

The ethical hacker using the knowledge they gain to do malicious hacking

activities

DISAdvantages8of8ethical8hacking888888

Allowing the company's financial and banking details to be seen

DISAdvantages8of8ethical8hacking888888

The possibility that the ethical hacker will send and/or place malicious code, viruses,

malware and other destructive and harmful things on a computer system

REFERENCES8of8ethical8hacking888888888

Steven Mizrach , Is there a Hacker Ethic for 90s Hackers , 2011

Steven Levy's,Heroes of the Computer Revolution,1984

BBC Organization , Ethics Guide , 2012 . [Online]. Available: BBC , http://www.bbc.co.uk/ethics/introduction/ [2012/03/25]

Geeknizer, Hacking as a Service, 2012. [Online]. Available: Security & Future, http://geeknizer.com/hacking-as-a-service-haas-the-security-future-beyond-saas/, [2012/03/25]

 H4xOrin' T3h World , What is hacking and cracking, 2011 Nov.[Online].Available :MaxOrin The World, http://kingofdkingz99.blogspot.com/2011/08/hacking-cracking-hacking-is-activity-of.html [2012/03/25]

top related