ethical hacking
TRANSCRIPT
ETHICAL HACKING
what8is8ETHICS8?888888888888888888888
EthicsMoral Responsibility to
do the correct thing
?
what8is8ETHICS8?888888888888888888888
“ETOS”
what8is8ETHICS8?888888888888888888888
Meta Ethics Normative Ethics Applied Ethics
what8is8ETHICS8?888888888888888888888
Why Ethics Make good people & make good actions Social Consideration Ethical Consideration
?
ETHICAL8HACKING88888888888888888888888
Art and science of determiningthe vulnerabilities of
your information infrastructure toBetter defend them
ETHICAL8HACKING88888888888888888888888
Performed by high skilledETHICAL
Security Professionals
ETHICAL8HACKING88888888888888888888888
White Box Testing
Types of Ethical Hacking
You have full knowledgeof the network
ETHICAL8HACKING88888888888888888888888
Black Box Testing
Types of Ethical Hacking
You have full knowledgeof the network
Code8of8ethics88888888888888888888888
Hands On Imperative Information Wants to Be Free Mistrust Authority No Bogus Criteria You can create truth and beauty on a computer
Original Hacker Ethics Found in Steven Levy's 1984 book Hackers:Heroes of the Computer Revolution
Code8of8ethics88888888888888888888888
Above all else, do no harm Protect Privacy Waste not, want not Exceed Limitations
New Hacker Ethics
Found in the article “Is there a Hacker Ethic for 90s Hackers?” written by Steven Mizrach
Advantages8of8ethical8hacking888888888
To take preventive measures against hackers
Advantages8of8ethical8hacking888888888
To fight against terrorism
Advantages8of8ethical8hacking888888888
A system that helps prevent entry by hackers to create
DISAdvantages8of8ethical8hacking888888
The ethical hacker using the knowledge they gain to do malicious hacking
activities
DISAdvantages8of8ethical8hacking888888
Allowing the company's financial and banking details to be seen
DISAdvantages8of8ethical8hacking888888
The possibility that the ethical hacker will send and/or place malicious code, viruses,
malware and other destructive and harmful things on a computer system
REFERENCES8of8ethical8hacking888888888
Steven Mizrach , Is there a Hacker Ethic for 90s Hackers , 2011
Steven Levy's,Heroes of the Computer Revolution,1984
BBC Organization , Ethics Guide , 2012 . [Online]. Available: BBC , http://www.bbc.co.uk/ethics/introduction/ [2012/03/25]
Geeknizer, Hacking as a Service, 2012. [Online]. Available: Security & Future, http://geeknizer.com/hacking-as-a-service-haas-the-security-future-beyond-saas/, [2012/03/25]
H4xOrin' T3h World , What is hacking and cracking, 2011 Nov.[Online].Available :MaxOrin The World, http://kingofdkingz99.blogspot.com/2011/08/hacking-cracking-hacking-is-activity-of.html [2012/03/25]