The Mind of a Hacker A broad look at the motivation of hackers and the hacking community By Tyler Herrington and Marlo Hume.

Slides:



Advertisements
Similar presentations
UNIT 20 The ex-hacker.
Advertisements

ETHICAL HACKING.
Chapter 1  Introduction 1 Chapter 1: Introduction.
Computer Security Ethics
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
INTERNET SAFETY.
HACKING. Contents (1)  VARIOUS DEFINITIONS OF HACKING.  Who is hacker? (various definitions).  What does he do?.  Why does he do?  Who is a cracker?
Using Your Knowledge – Security Threats
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Hackers and other kinds of piracy 2005/2006 Daniela Alves, n.º 6019 Claudia Francisco, n.º 6016 Bruno Martins, n.º 6018.
Rootkit Definition A rootkit is a collection of tools (programs) that enable administrator-level access to a computer or computer network. Typically, a.
Computer Security and Penetration Testing
Prepared by: Nahed Al-Salah
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
Computers in Society Week 8: Computer Security and Hacking.
Hazards of Hacking. Hacking Originally, hacking was used to describe a programmer who was very skilled at his/her profession Often, this person knew programming.
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
1 UNIT 20 The ex-hacker Lecturer: Ghadah Aldehim.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Hands-On Ethical Hacking and Network Defense
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
Computer Hacking Cybercrime (1).
Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally.
ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Computer Ethics.
Introduction Computers and English Matt Barton. What is this course all about? This course is designed to introduce you to the field of Computers and.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and.
PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD NUR’ ARINA ATIQAH BT ASRAR
By zeeShan Yaqoob. What’s the Internet? The Internet is built on a chaotic mishmash of hardware, governed by minimal standards and even fewer rules. Thousands.
Copyright © 2016 Pearson Education, Inc.
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
Lecture 21 Computer Security Ethics
First Look at Security and Privacy Jeremiah Burleson.
CSCI EXTRA CREDIT ASSIGNMENT ASHLEY R. BROADNAX TUESDAY 3:30 CLASS MARCH 11, 2008.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Welcome Topic : Security.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
CONTROLLING INFORMATION SYSTEMS
Security Debate Why cracking should be criminalized.
HACKERS: HEROES OF THE COMPUTER REVOLUTION 25 TH ANNIVERSARY By: Brett Delaney Living in a Networked World: The Good, the Bad, and the Ugly CS 408 Section.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
1 TMK 264: COMPUTER SECURITY CHAPTER ONE: AN OVERVIEW OF COMPUTER SECURITY.
PREPARED BY : Harsh patel dhruv patel sreejit sundaram.
Hackers: Heroes of the Computer Revolution By: Steven Levy.
Computer and Network Security Brendan Duncombe Bahein Maung.
Logan Wojcik COSC 101. Overview ~ Both are hackers ~White hats help computer systems become more secure ~Black hats attack and exploit breaches in systems.
Denial of Service Attack Pornography Phising Spoofing Salami Attack Forgery Hackers: enjoy intellectual challenges of overcoming software limitations.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Seminar On Ethical Hacking Submitted To: Submitted By:
HACKING VS PENTESTING NURUL HAFIZAH HAZWNI BINTI HASHIM (MCS151019)
Hackers and Crackers iJacsn.
The Impact Of ICT “Hacking”
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
“Hacking” and Computer System Security
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Chapter 1 Key Security Terms.
Presentation transcript:

The Mind of a Hacker A broad look at the motivation of hackers and the hacking community By Tyler Herrington and Marlo Hume

Agenda  What is a hacker  What motivates a hacker  The hacking community  Who belongs?  The “rules” of the game (aka Hacker Ethic)  Conclusions

What is a hacker? Many ways to describe hackers: 1.Creates and modifies. -computer software and computer hardware 2.Exploits systems and gains unauthorized access. -through clever tactics and detailed knowledge. 3.Computer enthusiast/person who enjoys learning programming languages. 4.Someone who breaks into computers. 5.Can make a computer do what they want 6.Anyone who ‘breaks open’ code and manipulates it in a clever or original -Not necessarily illegal.

Types of Hackers- white hat “White Hat”- hired by large corporations, or governments “White Hat”- hired by large corporations, or governments Usually as a “Tiger Team” Usually as a “Tiger Team” Tiger Team is a team that is hired to test the security of networks/find flaws or loopholes Tiger Team is a team that is hired to test the security of networks/find flaws or loopholes Will snoop around networks, trying to find loopholes Will snoop around networks, trying to find loopholes If such loophole(s) is/are found – report created explaining how hack was achieved If such loophole(s) is/are found – report created explaining how hack was achieved

Types of Hackers- grey hat “Grey Hat” Unhired People who break into networks for fun Usually don’t intentionally cause harm (following hacker ethic) Enjoy doing this Perceived as challenge Want kudos from hacker peers Want to “test security to prevent such attacks in future”

Types of Hackers- black hat “Black hat”/crackers Stereotypical hacker you hear about in the media Break into systems and damage them May write things like “you just got served by X group” May delete files, erase portions of code, etc. “Crackers” fall under this category Use reverse engineering of assembly code to make it open source, or to customize it to their liking Also known as pirates, or “warez writers”

What motivates a hacker To help others To help others ‘Hooliganism’ ‘Hooliganism’ Criminal intent Criminal intent Financial gain Financial gain Most hacker activity is of a nature where money is rarely involved Most hacker activity is of a nature where money is rarely involved Curiosity Curiosity Intellectual Challenge Intellectual Challenge Security heads-up! Security heads-up!

The hacking community- who belongs To join, have to be recognized To join, have to be recognized Sharing your creations (time, creativity, open source programs) Sharing your creations (time, creativity, open source programs) Learn to code efficiently Learn to code efficiently Hackers like “well-coded” programs Hackers like “well-coded” programs Better the program- more kudos Better the program- more kudos Become recognized when top hackers recognize you Become recognized when top hackers recognize you

1. reject hierarchies 2. mistrust authority 3. promote decentralization 4. share information 5. serve your community (i.e. the hacker community) The hacking community- the Hacker Ethic

Reject Hierarchies User no less important than author User no less important than author User may be able to improve product User may be able to improve product Authors are also users of other’s products Authors are also users of other’s products People are only judged on skill People are only judged on skill No social class, age, gender, race restrictions No social class, age, gender, race restrictions Open source programs Open source programs Hacking into secure networks Hacking into secure networks Hackers ignore what society says about class Hackers ignore what society says about class Have their own community Have their own community Have their own system Have their own system

Mistrust Authority Believe in libertarian environment Believe in libertarian environment Everyman for himself Everyman for himself Government shouldn’t dictate our boundaries Government shouldn’t dictate our boundaries A rule is meant to be broken A rule is meant to be broken If said can’t be done; green light to do it If said can’t be done; green light to do it Increased security= better “problem to solve” Increased security= better “problem to solve” Increased security is better reason to find loopholes Increased security is better reason to find loopholes

Hacker Joke of the day!! Not your typical hacker

Promote Decentralization Every man for himself mentality Every man for himself mentality Segregation from society good Segregation from society good Keeps your identity more secure Keeps your identity more secure More efficient work can be done More efficient work can be done Cooperation can occur over internet Cooperation can occur over internet Don’t need to be physically near each other Don’t need to be physically near each other Communities operate worldwide Communities operate worldwide

Share Information Believe all info should be free Believe all info should be free no restricted info no restricted info no “top secret” files no “top secret” files Governments should NOT hide things Governments should NOT hide things software should be “open source” software should be “open source” Open source= free/no copyrights Open source= free/no copyrights Increases awareness of software “out there” Increases awareness of software “out there” Value of info increases when shared Value of info increases when shared Data can be basis for learning Data can be basis for learning software can be improved collectively software can be improved collectively

Serve Your Community Contribute to open source projects Contribute to open source projects Become beta tester Become beta tester Code new projects to share Code new projects to share Make improvements to existing ones Make improvements to existing ones Keep Hacker infrastructure intact Keep Hacker infrastructure intact Make FAQ’s on how to be a hacker Make FAQ’s on how to be a hacker Establish websites/meeting places for hackers Establish websites/meeting places for hackers “Boring” jobs: maintain mailing lists, project databases/archives, moderate hacker news groups “Boring” jobs: maintain mailing lists, project databases/archives, moderate hacker news groups

Conclusion Gave broad overview of hackers/hacker culture Gave broad overview of hackers/hacker culture what is a hacker? what is a hacker? White hat White hat Grey hat Grey hat Black hat/cracker Black hat/cracker Hacker motivations Hacker motivations Hacker Community Hacker Community Who belongs Who belongs The “rules” of the game (aka Hacker Ethic) The “rules” of the game (aka Hacker Ethic)

Bibliography ABC. (2004). Platform 6. Retrieved 04/06, 2006 from ABC. (2004). Platform 6. Retrieved 04/06, 2006 from Cagle, D. (2006). Hacker attacks! Retrieved 04/06, 2006 from Cagle, D. (2006). Hacker attacks! Retrieved 04/06, 2006 from Chance, T. (2005). The hacker ethic and meaningful work. Retrieved 04/06, 2066 from Chance, T. (2005). The hacker ethic and meaningful work. Retrieved 04/06, 2066 from Graham, P. (2004). The word "hacker". Retrieved April, 6, 2006, 2006 from Graham, P. (2004). The word "hacker". Retrieved April, 6, 2006, 2006 from Hannemyr, G. (2005). Considering hacking constructive. Retrieved 04/06, 2006 from Hannemyr, G. (2005). Considering hacking constructive. Retrieved 04/06, 2006 from Hannemyr, G. (1997). Technology and pleasure: HACKING CONSIDERED CONSTRUCTIVE. Retrieved 04/06, 2006 from Hannemyr, G. (1997). Technology and pleasure: HACKING CONSIDERED CONSTRUCTIVE. Retrieved 04/06, 2006 from Jordan, T., & Taylor, P. (1998). A sociology of hackers. Retrieved 04/06, 2006 from 954X Jordan, T., & Taylor, P. (1998). A sociology of hackers. Retrieved 04/06, 2006 from 954X.00139http:// 954X.00139http:// 954X.00139

Bibliography Cont. Jupitermedia Corporation. (2006). What is a hacker? Retrieved April, 6, 2006, 2006 from Jupitermedia Corporation. (2006). What is a hacker? Retrieved April, 6, 2006, 2006 from Levy, S. (Undisclosed). Hackers, heroes of thecomputer revolution. Retrieved 04/06, 2006 from html/biblioteca_virtual/criptografia/Hackers_Heroes%20of%20the%20com puter%20revolution.pdf Levy, S. (Undisclosed). Hackers, heroes of thecomputer revolution. Retrieved 04/06, 2006 from html/biblioteca_virtual/criptografia/Hackers_Heroes%20of%20the%20com puter%20revolution.pdfhttp://quetzal.uis.edu.co/ciee- html/biblioteca_virtual/criptografia/Hackers_Heroes%20of%20the%20com puter%20revolution.pdfhttp://quetzal.uis.edu.co/ciee- html/biblioteca_virtual/criptografia/Hackers_Heroes%20of%20the%20com puter%20revolution.pdf Lowgren, J. (2000). Hacker culture(s). Retrieved 04/06, 2006 from Lowgren, J. (2000). Hacker culture(s). Retrieved 04/06, 2006 from Mizrach, S. (2006). Is there a hacker ethic for 90s hackers? Retrieved 04/06, 2006 from Mizrach, S. (2006). Is there a hacker ethic for 90s hackers? Retrieved 04/06, 2006 from Raikow, D. (2000). Is hacking healthy? Retrieved 04/06, 2006 from Raikow, D. (2000). Is hacking healthy? Retrieved 04/06, 2006 from Steven Raymond, E. (2001). How to become A hacker. Retrieved April, 6, 2006, 2006 from Steven Raymond, E. (2001). How to become A hacker. Retrieved April, 6, 2006, 2006 from Wikipedia. (2006). Hacker. Retrieved April, 6, 2006, 2006 from Wikipedia. (2006). Hacker. Retrieved April, 6, 2006, 2006 from