9
ETHICAL HACKING IS ALL HACKING CREATED EQUAL? Craig Rimando Luke White

Ethical hacking Is all hacking created equal?

  • Upload
    ezhno

  • View
    140

  • Download
    0

Embed Size (px)

DESCRIPTION

Ethical hacking Is all hacking created equal?. Craig Rimando Luke White. Introduction. “hacking” - negative connotation Not always that way Originally a compliment Not all hacking necessarily bad “Good” hacking? Ethical hacking?. The dark side. “Bad” hacking groups Anonymous - PowerPoint PPT Presentation

Citation preview

Page 1: Ethical  hacking Is all hacking created equal?

ETHICAL HACKINGIS ALL HACKING CREATED EQUAL?

Craig RimandoLuke White

Page 2: Ethical  hacking Is all hacking created equal?

“hacking” - negative connotation

Not always that way Originally a compliment

Not all hacking necessarily bad “Good” hacking? Ethical hacking?

INTRODUCTION

Page 3: Ethical  hacking Is all hacking created equal?

“Bad” hacking groups Anonymous Lulzsec

Black hat hackers DoS / DDoS Identity Theft Website Defacement Leaking Incriminating or Personal Information Viruses / Worms

THE DARK SIDE

Page 4: Ethical  hacking Is all hacking created equal?

Is there a grey area? Honorable or benign motivations Protect computer networks Deter hackers from hacking in the future

Should any form of hacking be permitted? Counter hacking Certified ethical hacking Clipper chip

IS ALL HACKING BAD?

Page 5: Ethical  hacking Is all hacking created equal?

Pre-emptive or reactionary response to a hacking attack

Ethical Worms Sovereignty over own computer but not the Internet For the greater good

Self-Defense

Innocent Third Party Who is in control Identify other victims Find the origin or next hop point

Jerome Heckenkamp case

COUNTER HACKING

Page 6: Ethical  hacking Is all hacking created equal?

Some company’s are founded on beneficial hacking Security Explorations “providing various services in the area of

security and vulnerability research” Discovered and reported numerous Java

bugs Billions of users at risk

EC-Council Offers a professional certification – Certified Ethical Hacker Employed by company, penetrate networks like a hacker Purpose: find & fix security vulnerabilities

CERTIFIED ETHICAL HACKERS

Page 7: Ethical  hacking Is all hacking created equal?

Discussed and developed 1990’s government plan Installed in electronic communication with unique

government encryption Only government could decrypt Valid warrant needed for each tap

Same longstanding law as for wire taps Downside: Some people feared government would

abuse its power Upside: monitor known criminals and terrorists

Decrease the amount of crime – deter criminal activity Increase the government’s ability to fight crime

CLIPPER CHIP

Page 8: Ethical  hacking Is all hacking created equal?

Not all hacking is necessarily bad.

Some can be ethically justified Intended to protect users / public Deter future attacks Find security flaws / Code innovations

Infringe on privacy rights?

CONCLUSION

Page 9: Ethical  hacking Is all hacking created equal?

QUESTIONS