Computer Security and Penetration Testing. Chapter 1 Ethics of Hacking and Cracking



Similar documents
1 Hack-x-crypt UJJWAL SAHAY

Hackers: Detection and Prevention

Introduction to Ethical Hacking and Network Defense. Objectives. Hackers

Computer Networks & Computer Security

Hands-On Ethical Hacking and Network Defense - Second Edition Chapter 1. After reading this chapter and completing the exercises, you will be able to:

Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking

Institute of Southern Punjab, Multan

Information Security Principles and Practices

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

Ethical Hacking

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

Certification and Training

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

Topic 1 Lesson 1: Importance of network security

Cracking and Computer Security

Forensic Certifications

EC-Council. Certified Ethical Hacker. Program Brochure

Penetration Testing Service. By Comsec Information Security Consulting

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Viruses, Worms, and Trojan Horses

Certified Ethical Hacker (CEH)

Penetration Testing in Romania

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

Security Certifications. A Short Survey. Welcome. Stan Reichardt stan2007@sluug.org

Top 5 Data Breaches in 2014

QUESTION: 1 What is the essential difference between an Ethical Hacker and a Cracker?

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

Hacking, Viruses and Firewall

Access FedVTE online at: fedvte.usalearning.gov

CompTIA Certification Renewal Policy and Continuing Education (CE) Program. Kyle Gingrich Senior Director, Product Management

Attack Methodology Analysis: Emerging Trends in Computer- Based Attack Methodologies and Their Applicability to Control System Networks

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

CHAPTER 10: COMPUTER SECURITY AND RISKS

Security Transcends Technology

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

About Effective Penetration Testing Methodology

Loophole+ with Ethical Hacking and Penetration Testing

Presented by Frederick J. Santarsiere

Field of Study Area of Expertise Certification Vendor Course

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

IT Security Management 100 Success Secrets

COB 302 Management Information System (Lesson 8)

Evolutionism of Intrusion Detection

Innovative Defense Strategies for Securing SCADA & Control Systems

The Information Security Problem

Penetration Testing Getting the Most out of Your Assessment. Chris Wilkinson Crowe Horwath LLP September 22, 2010

Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them

Brandman University. School of CCNA

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Student Tech Security Training. ITS Security Office

ETHICAL HACKING CYBER SECURITY

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Cyber R &D Research Roundtable

FORBIDDEN - Ethical Hacking Workshop Duration

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Penetration testing & Ethical Hacking. Security Week 2014

Is Penetration Testing recommended for Industrial Control Systems?

A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014

Cybercrime in Canadian Criminal Law

Cisco Security Optimization Service

Accounting Ethics: The Moral of the Story

EC Council Certified Ethical Hacker V8

Principles of Information Assurance Syllabus

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Information Security Threat Trends

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs)

Scene of the Cybercrime Second Edition. Michael Cross

of Highly Effective Security Professionals By Sondra Schneider CEO Security University

Careers in Computers and Certification

Computer System Security Updates

Do you constantly get hammered by pop up ads that come from nowhere and interfere with using your computer?

EC-Council. Program Brochure. EC-Council. Page 1

THE WARFARE OF PRAYER EPHESIANS 6:10-18

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

The Self-Hack Audit Stephen James Payoff

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

InfoSec Academy Pen Testing & Hacking Track

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Transcription:

Computer Security and Penetration Testing Chapter 1 Ethics of Hacking and Cracking

Objectives Understand how the act of unethical computer hacking is a crime Classify and identify groups and classes of hackers Distinguish the rationale for various types of hackers 2

Objectives (continued) Understand and determine differences in information warfare Understand how computer hacking originated and its evolution Recognize the importance of ethical hacking and the issues involved in hacker ethics 3

The Impact of Unethical Hacking Computer cracking Term for illegally hacking into a computer system without the permission of the system s owner Despite the motivations of computer crackers Cracking a system is a crime 4

Hacker Communities Two ways commonly used to categorize hackers White Hat good hackers vs. Black Hat bad hackers Based loosely on psychological profiling 5

Hat Categories White Hat/Black Hat model White hats represent the good guys Black hats represent the bad guys Everything the good guys do is right, legal, and justified Gray Hat hackers Evidence that the dichotomy of good and evil is NOT a very good fit to the real world 6

Hat Categories (continued) Figure 1-1 White Hat/Black Hat model 7

Hacker Profiling Hacking requires that the practitioner be intimately familiar with the techniques of the perpetrator Or opponent Reading and techniques used by both ethical and malicious hackers are identical Profile of a hacker is multifaceted Black Hat Briefings convention Highlights breaking security research submitted by leading corporate professionals, government experts, and members of the underground hacking community 8

Figure 1-2 Hacker profiles 9

Hacker Motivations Curiosity Love of puzzles Desire for recognition or fame Revenge Financial gain Patriotism or politics 10

Ethical Hacking Ethics are the principles of conduct that govern individuals, groups, and professions Without a published code of ethics, it is difficult to gain public trust for a profession Network security is emerging from a chaotic set of conflicting ethics Separating the ethical hacker from the unethical cracker Will allow security professionals to present the benefits of their profession 11

Evolution of Hacking The modern concept of hacking began in the late 1950s Students at the Massachusetts Institute of Technology started using their access to the MIT mainframe To work on new languages First password hacks were a response to the Compatible Time Sharing System (CTSS) Developed in the early 1960s 12

Evolution of Hacking (continued) In the 1970s phone phreaks used phreaking to access telephone networks To make free calls from payphones In the 1980s War dialers were developed to search for open modems Personal computer prices dropped and users became more common Hacker communities also grew Viruses, worms, and Trojans started appearing in 1988 13

Evolution of Hacking (continued) Antisocial actions of crackers and script kiddies made it difficult to defend the original concept of hacking Computer hacker describes computer experts with malicious intent 14

Vendor-Neutral Security Certifications Security certificates and issuing bodies CompTIA Security+ Certification Global Information Assurance Certification (GIAC), Security Administration Certifications ISC2 Certifications Associate of (ISC) 2 SSCP Examination 15

Vendor-Neutral Security Certifications (continued) Security certificates and issuing bodies (continued) CAP Examination CISSP Examination CISSP Concentrations EC-Council Certifications 16

Vendor-Specific Security Certificates There are almost as many vendor-specific certificates as there are network vendors Cisco s CCNA, and Microsoft s MSCE Useful to newcomers to the network security industry 17

What Needs to Be Secured Protection of data provided to organizations or stored on personal computers is a high priority Some crackers break into systems to utilize what they consider wasted computer energy Using bandwidth without permission may seem harmless But it is a crime, in addition to being unethical Many hackers find it tempting to copy, download, and use proprietary software and other copyrighted works 18

What Needs to Be Secured Ethical Issues of Hacking (continued) Professional hackers have a responsibility to society Their activities should help to build and improve upon existing technology They should use their skills and interests as opportunities to learn and to teach Ethical hacker A security professional who applies his or her hacking skills for defensive purposes 19

What Needs to Be Secured (continued) Ethical Hacking and System Security Some companies prefer to pay an ethical hacker to discover their systems weaknesses and security gaps Ethical hackers work to protect all areas of information technology Hackers must have experience in software engineering, network engineering, and system security 20

Summary Computer cracking is illegally hacking into a computer system without the permission of the system s owner Hackers are commonly thought of in two groups: White Hat and Black Hat Nine major profiles of hackers The techniques used by ethical and malicious hackers are similar Hackers may be motivated by curiosity, puzzles, fame, revenge, money, or patriotism 21

Summary (continued) The modern concept of hacking began in the late 1950s While there are several vendor-neutral and vendorspecific certifications available to computer security professionals, there is no national certification standard Professional security experts, technologists, and hackers must develop a public code of ethics An ethical hacker is a security professional who applies hacking skills for defensive purposes 22