CHAPTER 1 Politics

Download Report

Transcript CHAPTER 1 Politics

CHAPTER 1
POLITICS
1
Definitions Of The Word Hacker
Hacker – someone who has achieved some
level of expertise with a computer
 Cracker – someone who breaks into systems
without permission
 Script Kiddie – someone who uses scripts or
programs from someone else to do his or
her cracking

– No skills, no knowledge, no ethics
– Depends on hackers and crackers
2
Definitions Of The Word Hacker
Phreak – hacker who specializes in
telephone systems
 White Hat – someone who professes to be
strictly a ‘good guy’

– Do right thing such as exposing security
problems

Black Hat – hacker that uses his or her skills
to commit crime
3
Definitions Of The Word Hacker

Grey Hat – someone who falls in between White
and Black Hat
– Hold some belief or want to perform some action that
some group of white hat condemn
– Doesn’t mean engage in any criminal activity
– Recognize that the world is not black or white

Hacktivism – hacking for political reason
– Hacker use his skills to forward political agenda
possibly breaking the law in the process but it will
justified because of the political cause
4
The Role of The Hacker
Important to realize hackers don’t care what
role they play
 They do for their own reason not to fulfill
someone else expectations
 Criminal

– Hackers who commit crimes
– Represent a certain amount of job security for
the information security professionals
– Keep secure
5
The Role of The Hacker

Magician
– Have tricks but using computer
– People believe hackers can break into anything
and do things that technically are not possible
– To be cautious
– There are risks with attaching insecure
machines to the internet
6
The Role of The Hacker

Security Professional
– Hackers, must be people that are capable of defeating
security measures
– Must know how to prevent by knowing how they
accomplished
– The way you test your security

Consumer Advocate
– White hat want to control or limit the disclosure of
security vulnerability info
– Only release to vendor
– But no accountability when public do not know
– That’s why hackers published the hole
– Vendors responding to the security issues
– Patch the software
7
The Role of The Hacker

Civil Rights Activist
– A lot of issues relate with technology
– The offending legislation / groups / lawsuits aimed at
the hackers
– Normally public doesn’t realize the thing was apply to
them

Cyber Warrior
– Final role that hackers may play and the most
disturbing
– Almost all types of infrastructure nowadays automated
and control remotely, so remote damaged can be done
– More effective war tactics, speed of attack and
bloodless battle
8
MOTIVATION



Why want to be hackers
Holes / bugs that want to publish it out
Recognition
– Aspire to be known for their skill

Admiration
– Admire other hacker or hackers



Curiosity
Power and gain
Revenge
– Mad at someone and want to teach them a lesson
9
LEGAL / MORAL ISSUES

What’s Illegal
–
–
–
–
–
–
–

Not a lawyer
Laws are specific to region
Laws changing constantly
Legality depend on your profession
Legality may depend on contractual agreements
Law enforcement is making up some of this as they go
Use your judgment and responsible for your action
Reasonably safe
– Keep a reasonable low profile and maintain a
reasonable minimum set of ethical standards
– Authorization
10
LEGAL / MORAL ISSUES

What’s Right
– Difficult to determine, depends on people moral values
and how people treat it
– Example port scanning, some take serious matter, some
don’t care and some just throw all the things into logs
for future use once need

Exceptions
– Depend on laws surrounding civil rights issues
– Cryptographic cannot send through email but can use
other way
11
LEGAL / MORAL ISSUES

The Hacker Code
– Ethics, some are written down some not
– Don’t damage system that break into
12
End Of Chapter 1
13