ethical hacking

18
ETHICAL HACKING

Upload: anuja-herath

Post on 21-Aug-2015

699 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Ethical Hacking

ETHICAL HACKING

Page 2: Ethical Hacking

what8is8ETHICS8?888888888888888888888

EthicsMoral Responsibility to

do the correct thing

?

Page 3: Ethical Hacking

what8is8ETHICS8?888888888888888888888

“ETOS”

Page 4: Ethical Hacking

what8is8ETHICS8?888888888888888888888

Meta Ethics Normative Ethics Applied Ethics

Page 5: Ethical Hacking

what8is8ETHICS8?888888888888888888888

Why Ethics Make good people & make good actions Social Consideration Ethical Consideration

?

Page 6: Ethical Hacking

ETHICAL8HACKING88888888888888888888888

Art and science of determiningthe vulnerabilities of

your information infrastructure toBetter defend them

Page 7: Ethical Hacking

ETHICAL8HACKING88888888888888888888888

Performed by high skilledETHICAL

Security Professionals

Page 8: Ethical Hacking

ETHICAL8HACKING88888888888888888888888

White Box Testing

Types of Ethical Hacking

You have full knowledgeof the network

Page 9: Ethical Hacking

ETHICAL8HACKING88888888888888888888888

Black Box Testing

Types of Ethical Hacking

You have full knowledgeof the network

Page 10: Ethical Hacking

Code8of8ethics88888888888888888888888

Hands On Imperative Information Wants to Be Free Mistrust Authority No Bogus Criteria You can create truth and beauty on a computer

Original Hacker Ethics Found in Steven Levy's 1984 book Hackers:Heroes of the Computer Revolution

Page 11: Ethical Hacking

Code8of8ethics88888888888888888888888

Above all else, do no harm Protect Privacy Waste not, want not Exceed Limitations

New Hacker Ethics

Found in the article “Is there a Hacker Ethic for 90s Hackers?” written by Steven Mizrach

Page 12: Ethical Hacking

Advantages8of8ethical8hacking888888888

To take preventive measures against hackers

Page 13: Ethical Hacking

Advantages8of8ethical8hacking888888888

To fight against terrorism

Page 14: Ethical Hacking

Advantages8of8ethical8hacking888888888

A system that helps prevent entry by hackers to create

Page 15: Ethical Hacking

DISAdvantages8of8ethical8hacking888888

The ethical hacker using the knowledge they gain to do malicious hacking

activities

Page 16: Ethical Hacking

DISAdvantages8of8ethical8hacking888888

Allowing the company's financial and banking details to be seen

Page 17: Ethical Hacking

DISAdvantages8of8ethical8hacking888888

The possibility that the ethical hacker will send and/or place malicious code, viruses,

malware and other destructive and harmful things on a computer system

Page 18: Ethical Hacking

REFERENCES8of8ethical8hacking888888888

Steven Mizrach , Is there a Hacker Ethic for 90s Hackers , 2011

Steven Levy's,Heroes of the Computer Revolution,1984

BBC Organization , Ethics Guide , 2012 . [Online]. Available: BBC , http://www.bbc.co.uk/ethics/introduction/ [2012/03/25]

Geeknizer, Hacking as a Service, 2012. [Online]. Available: Security & Future, http://geeknizer.com/hacking-as-a-service-haas-the-security-future-beyond-saas/, [2012/03/25]

 H4xOrin' T3h World , What is hacking and cracking, 2011 Nov.[Online].Available :MaxOrin The World, http://kingofdkingz99.blogspot.com/2011/08/hacking-cracking-hacking-is-activity-of.html [2012/03/25]