Presentation is loading. Please wait.

Presentation is loading. Please wait.

(and mythbusting the stereotype)

Similar presentations


Presentation on theme: "(and mythbusting the stereotype)"— Presentation transcript:

1 (and mythbusting the stereotype)
The history of hacking (and mythbusting the stereotype) Solomon Gilbert - CEO and Head of Security Division Ferox Security LTD @feroxsecurity | facebook.com/FeroxLTD

2 What are hackers? Break down a process Find weaknesses in the process
Whitehat VS Blackhat Improve the process to irradicate the weaknesses use the weaknesses found to advantage the hacker

3 Kinds of hackers Script kiddies – 'skiddies' Hacktivists
Unexperienced, stereotypically young pseudo-hackers. So called because of their tendancy to use premade and preconfigured 'once size fits all' scripts to exploit systems. Using the instruction booklet when they put the jigsaw together. Hacktivists This term is not specific to skill, but to cause. These hackers may target systems with a specific viewpoint, in order to forward their own ideology. The popular hacktivit group Anonymous use freely available DDoS tools to temporarily take down websites that conflict with their belief system.

4 Kinds of hackers (cont)
White hat Professional and ethical hackers, who find weaknesses in systems in order to improve them. Ferox Security does this. Black hat Individuals or groups who hack for their own benefit, be it monetary or as a thrill.

5 Are politicians hacktivists?

6 Hackers are puzzle breakers and makers

7 What isn't a hacker? Given what we know, it becomes clear just how misrepresented the term 'hacker' is. So what isn't a hacker? Someone who uses premade programs or scripts Someone with no interest in analysing a process Someone who runs a premade program to discover vulnerabilities in the TalkTalk website, exploits those vulnerabilities with premade tools, sells the information to ISIS and then gets caught.

8 In the beginning, God created puzzles.
Even in the earliest stages of humanity, problems and puzzles critical to our survival have been overcome. Warmth → Creating fire Food → Hunting tools

9 Hacking through the ages
Weapons systems → swords/shields, guns/bulletproofing Health → measles/vaccines, organ failure/transplant Food → water/wells, meat/cultivation of livestock Shelter → flooding/barriers, earthquakes/resistant buildings

10 Hackers today In this current day and age, hacking is the word used to describe the battlefield in the world of technology, where both sides fight to improve their systems.

11 Who can be a hacker? No system is impenetrable to someone with enough time and motivation. (the only prerequisites.)

12 Live hacking demonstration
The fun bit


Download ppt "(and mythbusting the stereotype)"

Similar presentations


Ads by Google