ETHICAL HACKING Daniel Cloherty CAN HACKING BE ETHICAL? What makes - - PowerPoint PPT Presentation

ethical hacking
SMART_READER_LITE
LIVE PREVIEW

ETHICAL HACKING Daniel Cloherty CAN HACKING BE ETHICAL? What makes - - PowerPoint PPT Presentation

ETHICAL HACKING Daniel Cloherty CAN HACKING BE ETHICAL? What makes hacking ethical? Legality VS Ethics State Sanctioned hacking BLACK HAT - Stereotypical Hacker -Stealing data for personal gain -Obviously not ethical -Using


slide-1
SLIDE 1

ETHICAL HACKING

Daniel Cloherty

slide-2
SLIDE 2

CAN HACKING BE ETHICAL?

  • What makes hacking ethical?
  • Legality VS Ethics
  • State Sanctioned hacking
slide-3
SLIDE 3

BLACK HAT

  • Stereotypical ‘Hacker’
  • Stealing data for personal gain
  • Obviously not ethical
  • Using others as a means to and

end

slide-4
SLIDE 4

WHITE HAT

  • Umbrella term for a variety of

ethical hacking

  • Security Researchers, Penetration

testers

  • Red Teams, Tiger Teams
slide-5
SLIDE 5

SECURITY RESEARCH

  • Research into a variety of different

computer vulnerabilities.

  • Attempting to bring vulnerabilities

to light.

  • File CVE reports
slide-6
SLIDE 6

PENETRATION TESTING

  • Explicit permission to conduct an

attack on device.

  • Used to find possible

vulnerabilities.

slide-7
SLIDE 7

BUG BOUNTIES

https://blog.cobalt.io/the-history-of-bug-bounty-programs-50def4dcaab3 https://insights.dice.com/2019/03/12/bug-bounty-teen-millionaire- hacker/

slide-8
SLIDE 8

LEGALITY VS ETHICS

  • People prosecuted for ‘crimes’

that are ethically sound.

  • Some laws make it hard to

illegal to do security research

https://nationalpost.com/news/politics/a-nova-scotia-teen-found-a-big- security-hole-on-a-government-server-should-he-be-jailed-or-rewarded

https://www.wired.com/story/wannacry- malwaretech-arrest/

slide-9
SLIDE 9

COMPUTER FRAUD AND ABUSE ACT

  • Current laws have come under

some criticism as being

  • ppressive.
  • Makes parts of security research

illegal even without intent.

slide-10
SLIDE 10

STUXNET

  • Ethics of state sanctioned

hacking