Brad Motley CSCI392 Spring 2010. Thesis  “With our dependence on computers & computing systems growing stronger every day, and the rapidly quickening.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Craig Rimando Luke White. “hacking” - negative connotation Not always that way Originally a compliment Not all hacking necessarily bad “Good” hacking?
1 No Silver Bullet : Inherent Limitations of Computer Security Technologies Jeffrey W. Humphries Texas A&M University.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
The Uses of White Hat Hacking Tyler Schumacher
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
HACKER NOT CRACKER. HACKER IS  A person who enjoys exploring the details of programmable systems and how to stretch their capabilities  Most often programmers.
Security, Privacy, and Ethics Online Computer Crimes.
Ethical Hacking by Shivam.
Bruce Schneier Lanette Dowell November 25, Introduction  “It is insufficient to protect ourselves with laws; we need to protect ourselves with.
Chapter 1 Introduction to Security
Protecting People and Information Threats and Safeguards
Presented By: Vinay Kumar.  At the time of invention, Internet was just accessible to a small group of pioneers who wanted to make the network work.
CS 239: Advanced Security Spring 04 Security in Pervasive and Ubiquitous Environments Sam Irvine
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Comp 8130 Presentation Security Testing Group Members: U Hui Chen U Ming Chen U Xiaobin Wang.
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Computer Hacking Cybercrime (1).
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally.
[Name / Title] [Date] Effective Threat Protection Strategies.
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
PART THREE E-commerce in Action Norton University E-commerce in Action.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Free Trade in the Cyber Underground Malware Outsourcing Marita Fowler Farrah Patterson CAP 6135 – Term Project Proposal.
Joseph Kummer Terri Berry Brad White.  1. Specific instances of employee hacking and the consequences which resulted therefrom.  2. How employees utilize.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Computer & Network Security
Ethical Hacking
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Chapter 4 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
CONDUCTING CYBERSECURITY RESEARCH LEGALLY AND ETHICALLY By Aaron J. Burstein; Presented by David Muchene.
Chap1: Is there a Security Problem in Computing?.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Computer Security By Duncan Hall.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Safe’n’Sec IT security solutions for enterprises of any size.
UNDER THE GUIDENCE OF: Mr.M.JAYANTHI RAO,M.Tech HOD OF IT. BY: I.ADITHYA(09511A1212) HONEYPOTS.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
KASPERSKY INTERNET SECURITY multi-device  Average number of devices in households: 4.5  Consumer device diversity will continue to expand.
Exploitation Development and Implementation PRESENTER: BRADLEY GREEN.
Logan Wojcik COSC 101. Overview ~ Both are hackers ~White hats help computer systems become more secure ~Black hats attack and exploit breaches in systems.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
 Define hacking  Types of hackers  History  Intentions  Statistics  Facts  How to Protect yourself.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Seminar On Ethical Hacking Submitted To: Submitted By:
Port Knocking Benjamin DiYanni.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Understand Core Security Principles
Year 10 ICT ECDL/ICDL IT Security.
Computer Security Elaine Munn Introduction to Computer Security.
Unit 7 – Organisational Systems Security
CIS 333Competitive Success/tutorialrank.com
CIS 333 Education for Service-- tutorialrank.com.
Home Internet Vulnerabilities
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Laws Against Computer Hacking
Information Technology and E-Commerce
Presentation transcript:

Brad Motley CSCI392 Spring 2010

Thesis  “With our dependence on computers & computing systems growing stronger every day, and the rapidly quickening pace of software and device capabilities, I will explain why ethical hacking is a necessary must-have that needs to be understood and applied, for the good of the community.”

Problems  Knowledge About the Topic of Ethical Hacking  Advancements in Computing Technology  Availability of Computer/Information Systems  Increase in Malware Production  Poor Decision Making

Hacking  “The act of circumventing computer security.”  Black-Hat Unauthorized break-ins (malicious intent)  White-Hat Debug or correct security vulnerabilities  Gray-Hat Morally Ambiguous. Black-Hat skills, White- Hat tasks?

3:10 to Yuma

Ethical Hacking  “Fixing the system by compromising it” Often through destructive testing  White-Hat Main focus: secure/protect IT systems

Why is Ethical Hacking Significant?  To ensure the protection and privacy of personally identifiable and/or sensitive information.  The state of security on the internet is poor and the progress toward increased protection is slow.  Ex: Defender’s Dilemma

Defender’s Dilemma

How to Utilize Ethical Hacking?  Employ ethical hackers to assist in insuring network integrity  But who do we hire and how do we know what to look for?

Who to Hire?  Trainees? Clean slate Record of knowledge  Reformed Ex Black-Hats? Skills Real world experience (Insider Knowledge) Moral Issue?

Potential Consequences  Vulnerabilities Exploited Malware Infection Hackers gain access Network Downtime  Sensitive Information Loss Lawsuits Bad Reputation Loss of Capital

Conclusion  “The Best Defense is a Good Offense”  Employing ethical hackers to assist in Network Security is a great counter- measure. Their insider knowledge gives outsiders less of an “edge”.

Other Facts  Estimated that 90% of all Internet attacks would be deterred with current versions/updates.  In 2008, 1 website hacked every 5 seconds.

Other Facts  Over the last 3-4 years, China has become the leading source of malware. In 2009 alone, Kaspersky Lab detected 73,619,767 network attacks, of which 52.7% originated from Internet resources in China. – Kaspersky Labs

Interesting Links  Noah Schiffman: y/blog/5035 Noah Schiffman: y/blog/5035   /module.htm /module.htm  module/module.htm module/module.htm

References  Kaspersky Labs  Noah Schiffman, M.D., reformed black-hat, turned gray- hat, now white-hat.  Simpson, Michael. Hands on ethical hacking and network defense. 1st ed. Course Technology, Print.  Rockenbach, Barbara, Mendina Tom, and Almagno Stephen. "Ethical Hacking: The Security Justification."Ethics and Electronic Information. Jefferson, NC: MacFarland & Company, Inc. Publishers, Print.  Norfolk, David. "Understanding Ethical Hacking." PC Network Advisor: Management & Strategy Overview 128 (2001): Web. 29 Mar

The End