SlideShare a Scribd company logo
1 of 37
Hacking Tay’les of
  the 1 st Degree
    Doctor_Hacker @ twitter
 BSides London, 25th April 2012

(My opinions...not my employers).
Who he?
   Colin McLean (Dad)
    ◦ Lecturer at Abertay University, Dundee for
      213/4 years 7907 days – 28,465,200 secs
       Mech Eng, Mechatronics, Computing

      Developed the B Sc in Ethical Hacking at
       Abertay University, Dundee in 2006.

          The first undergraduate degree in the
           world with the word “Hacking” in the
           title.
The story…
 ◦   The idea
 ◦   The early days
 ◦   B Sc EH 2.0
 ◦   End Games.


 ◦ Quickly!
The idea..
       How did this come about?
2005 – KTP Project
   Two year government funded project with
    NCR R&D, Dundee.

   Risk analysis of an NCR ATM.
    ◦ “Identify all possible risks to an NCR
      ATM, their possible dangers and their
      mitigations”.
    ◦ Involved security staff at NCR and me identifying all
      the possible ways of hacking into an ATM.
Colin had a thought…
    We weren’t thinking like
     defenders.

    We were thinking like
     attackers.

    We MUST think like the
     opposition in order to
     know how to stop them.

The more devious we are the better we can
defend.
Security in Education
   Other degrees in “Computer Security” were
    looking mainly at the mitigations.

   They did not appear to examine the hacks.

   Graduates who think like hackers?

   Hence the world’s first undergraduate degree
    in “Ethical Hacking”.
Programme design
   Input to the content of the degree from NCR.




   Input and support from various other
    companies.

   Programme validation panel included Head of
    School @ Northumbria University.
In truth…
    The course was not as first imagined.

    “Internal” validation was difficult.

     ◦ Had to fight off “not enough ethics” and “more law
       modules”.

    It took some years before the course
     matured.
Hacking interests the
media we publicly released the degree….
In June 2006,

   BBC Reporting Scotland & STV News
   Polish TV, Brazilian TV.
   Live on Canadian Radio.
   Interviewed live on French TV

   Newspapers had a field day…
     “Doctor Hacker!” The Sun Newspaper.
     “Lord Voldemort” (PC1 News)
     “Les Pirates Ecosse”

   There was also resistance.
Academics comments
    “A title like that would be a catastrophe for
     the University.”

    “Crass programme names that bring our
     discipline into disrepute.”

    “I doubt it would look good to prospective
     employers.”




    http://www.ics.heacademy.ac.uk/resources/faqs/answers.php?id=56
The “establishment” had a
go
   If penetration testing is what is being taught,
    then that is how it should be labeled

   Rather than seeking to use marketing spin to
    gain credibility within an industry that is
    seeking to improve its professional image.


   “Ethical hacking should not be considered to be
    an accepted professional industry term.


           http://www.bcs.org/content/ConMediaFile/7266
A stolen slide.. Security, Social
            + Physical
                 Engineering, Educating
                 Staff etc.




link
And by the way…
   The BCS validated the Ethical hacking degree
    at Abertay University in 2010.

   This is the earliest that it could have been
    validated.
The early days….
Entry procedures
   Tried to mirror medical degrees.
    ◦   Interview.
    ◦   Ethical scenarios.
    ◦   Disclosure check.
    ◦   Sign on the dotted line.



   Also, legal issues are paramount in early
    stages.
Who is suitable for EH?
Cohort #0
   They could certainly think outside the box.

    ◦ Not the usual cohort.
 2 students over 50.
 1 student aged 16.

 2 female students.

 2 English students.



 Only 4 completed the
honours degree.
 3 completed degrees in
other subjects.
Within 18 months, 6
babies.



 Did I mention that this
isn’t a penetration testing
degree?
Taking a side step…
 A     troll had lived in the
      (alleged)


“Full Disclosure mailing list” (2002’ish).
   He was one of the earliest known   (alleged)


    trolls.
The people gasped..
   The troll was leaving….
Hurrah!
   The people waved him goodbye with hearty cheer.
Timeline…..

    (alleged)   Troll went missing 1st September 2006
    ◦ Abertay’s Ethical Hacking degree started around then.


    (alleged)   Troll went back to FD January 5th 2007.
    ◦ One of Abertay’s students did not return in January.

   He was welcomed back.
Some serious questions.
1.       What about hacking group members?
     ◦    Difficult to identify.
     ◦    Whistle-blowing would be a possibility.
     ◦    Abertay reserves the right to remove any student.
     ◦    We NEED to educate about hacking techniques.


3.       Many people have proved not to be
         suitable for an EH degree.
     ◦    How does the industry effectively make use of the
          talents of these people?
BSc EH 2.0

       What it’s become…

  PS The students still volatile!
New facilities   (Sep 2010)
The syllabus (briefly!)
   Themed:-
    ◦ Programming.
    ◦ Networking.
    ◦ Ethical Hacking.

   Four year honours degree in Scotland.
    ◦ Year 1 and 2 still geared towards “basics”.
    ◦ Year 3 and 4 much more research and self-
      learn.
“You should teach us X”
   Culture of project work as assessments:-

    ◦ Year 1 Ethical Hacking         – Mini project

    ◦ Year 2 Ethical Hacking         – Project
    ◦ Year 2 Smart Programming       – Project

    ◦   Year   3   Ethical hacking   - Web security project
    ◦   Year   3   Ethical Hacking   – Mini-project
    ◦   Year   3   Ethical Hacking   – Exploit development
    ◦   Year   3   Group Project     - Student chosen

    ◦ Year 4 Network Management – Network Security project
    ◦ Year 4 Honours project
Student Centred Learning
   Students encouraged to create their own
    CV’s, mould their own careers.

   In many cases, students can learn what THEY
    think is important.

   Documentation skills (& feedback on this) are
    more prominent.
E-Hacking modules.
      General security        Internal & External Pen testing
                                - Firstbase techies (2 staff)
      Penetration testing
      Web Application testing
                                       Exploitlab 5.0
      Exploit Development             - Saumil Shah & SK Chong 2011
      Reverse Engineering
      Password security               CEH (3 members of staff)
                                       NCR work
      Malware analysis                “Other” companies
      Etc.

Staff training & company involvement essential.
End games


    Random ramblings.
Students talking @cons
   BruCon Security Conference 2011
    ◦ “Smart Phones – The Weak Link in the Security Chain,
      Hacking a network through an Android device” by Nick
      Walker and Werner Nel

   BruCon Security Conference 2011
    ◦ “Script Kiddie Hacking Techniques by Ellen Moar

   BSides London Security Conference 2011
    ◦ “DNS Tunnelling: It's all in the name!”, Arron "finux"
      Finnon

   BSides Berlin Security Conference 2011
    ◦ A Salesman's Guide to Social Engineering by Gavin Ewan
A question
   So are there jobs?
    ◦ We are a vocational University.
    ◦ Companies are coming to us (e.g. NGS).
    ◦ Qinetiq interested after 3 summer
      placements.
    ◦ PwC stole(!) two of our students this year!

    ◦ Current grads are out there.
    ◦ Current hons year are easily getting jobs.
Finally..
   Is the sensationalistic title necessary?
    ◦ Security mindset, culture is VERY
      important.
    ◦ All aspects of security are important.
    ◦ Ethical Hacking is what we are doing.

   The future?
    ◦ Graduates are now out there.
    ◦ Summary – course has been a success.
   Questions?

More Related Content

Viewers also liked

Learning from failure: The Blackboard Perspective
 Learning from failure: The Blackboard Perspective Learning from failure: The Blackboard Perspective
Learning from failure: The Blackboard PerspectiveBlackboardEMEA
 
Soil experiment
Soil experimentSoil experiment
Soil experimentnewham5-6
 
When Should You Retain a Forensic Accountant?
When Should You Retain a Forensic Accountant?When Should You Retain a Forensic Accountant?
When Should You Retain a Forensic Accountant?Jeff Moore
 
Apuntes y aproximaciones culturales
Apuntes y aproximaciones culturalesApuntes y aproximaciones culturales
Apuntes y aproximaciones culturalesRobert Estanga
 
людина
людиналюдина
людинаLenka2410
 
Devoxx 2014 : Sparky guide to bug free JavaScirpt
Devoxx 2014 : Sparky guide to bug free JavaScirptDevoxx 2014 : Sparky guide to bug free JavaScirpt
Devoxx 2014 : Sparky guide to bug free JavaScirptMite Mitreski
 
Our M&M project Juliette and Georgia
Our M&M project Juliette and GeorgiaOur M&M project Juliette and Georgia
Our M&M project Juliette and Georgianewham5-6
 
Top500 June 2013
Top500 June 2013 Top500 June 2013
Top500 June 2013 top500
 
Rohde EDUC 5611 Module 3
Rohde EDUC 5611 Module 3Rohde EDUC 5611 Module 3
Rohde EDUC 5611 Module 3serohde
 
relajemonos un poco
relajemonos un poco relajemonos un poco
relajemonos un poco diegousme
 
TOP500 List November 2014
TOP500 List November 2014TOP500 List November 2014
TOP500 List November 2014top500
 

Viewers also liked (20)

Learning from failure: The Blackboard Perspective
 Learning from failure: The Blackboard Perspective Learning from failure: The Blackboard Perspective
Learning from failure: The Blackboard Perspective
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Soil experiment
Soil experimentSoil experiment
Soil experiment
 
When Should You Retain a Forensic Accountant?
When Should You Retain a Forensic Accountant?When Should You Retain a Forensic Accountant?
When Should You Retain a Forensic Accountant?
 
김민경
김민경김민경
김민경
 
Apuntes y aproximaciones culturales
Apuntes y aproximaciones culturalesApuntes y aproximaciones culturales
Apuntes y aproximaciones culturales
 
людина
людиналюдина
людина
 
Devoxx 2014 : Sparky guide to bug free JavaScirpt
Devoxx 2014 : Sparky guide to bug free JavaScirptDevoxx 2014 : Sparky guide to bug free JavaScirpt
Devoxx 2014 : Sparky guide to bug free JavaScirpt
 
Lcf beautiful
Lcf beautifulLcf beautiful
Lcf beautiful
 
Halifax march82011
Halifax march82011Halifax march82011
Halifax march82011
 
Tecnologiaeducacion
TecnologiaeducacionTecnologiaeducacion
Tecnologiaeducacion
 
Our M&M project Juliette and Georgia
Our M&M project Juliette and GeorgiaOur M&M project Juliette and Georgia
Our M&M project Juliette and Georgia
 
Top500 June 2013
Top500 June 2013 Top500 June 2013
Top500 June 2013
 
Raasay 2011 Inverness Royal Academy
Raasay 2011 Inverness Royal AcademyRaasay 2011 Inverness Royal Academy
Raasay 2011 Inverness Royal Academy
 
Rohde EDUC 5611 Module 3
Rohde EDUC 5611 Module 3Rohde EDUC 5611 Module 3
Rohde EDUC 5611 Module 3
 
Studid
StudidStudid
Studid
 
relajemonos un poco
relajemonos un poco relajemonos un poco
relajemonos un poco
 
Gestión pública
Gestión públicaGestión pública
Gestión pública
 
TOP500 List November 2014
TOP500 List November 2014TOP500 List November 2014
TOP500 List November 2014
 
Canjs
CanjsCanjs
Canjs
 

Similar to Hacking Tay’les of the 1st Degree

Deep sec talk - Addressing the skills gap
Deep sec talk - Addressing the skills gapDeep sec talk - Addressing the skills gap
Deep sec talk - Addressing the skills gapColin McLean
 
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...sam lessin
 
2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class OneFRSecure
 
Why not use ict in sudan
Why not use ict in sudanWhy not use ict in sudan
Why not use ict in sudanHala Nur
 
Emerging practices 2019 week 1
Emerging practices 2019 week 1Emerging practices 2019 week 1
Emerging practices 2019 week 1R. Sosa
 
cyber security | What Is Cyber Security | Hello World Session
cyber security | What Is Cyber Security | Hello World Sessioncyber security | What Is Cyber Security | Hello World Session
cyber security | What Is Cyber Security | Hello World SessionYasserElsnbary
 
Education to cyber security
Education to cyber securityEducation to cyber security
Education to cyber securityzapp0
 
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity laurieannwilliams
 
Practical Machine Ethics @ SXSW2019
Practical Machine Ethics @ SXSW2019Practical Machine Ethics @ SXSW2019
Practical Machine Ethics @ SXSW2019Jesus Ramos
 
Talks submitted
Talks submittedTalks submitted
Talks submittedKim Minh
 
EDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action ResearchEDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action Researcheckchela
 
Trustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade PerspectiveTrustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade PerspectiveVon Welch
 
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdfAngela Baxter
 
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdfBrooke Lord
 
PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...
PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...
PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...CS, NcState
 
Emerging practices 2019 week 2
Emerging practices 2019 week 2Emerging practices 2019 week 2
Emerging practices 2019 week 2R. Sosa
 
CSR Plan for National Celular Operator - Award Winning CSR
CSR Plan for National Celular Operator - Award Winning CSRCSR Plan for National Celular Operator - Award Winning CSR
CSR Plan for National Celular Operator - Award Winning CSRChristofer Felix
 
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdfTdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdfRamithaDevi
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Kimberley Dray
 

Similar to Hacking Tay’les of the 1st Degree (20)

Deep sec talk - Addressing the skills gap
Deep sec talk - Addressing the skills gapDeep sec talk - Addressing the skills gap
Deep sec talk - Addressing the skills gap
 
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
 
2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One
 
Why not use ict in sudan
Why not use ict in sudanWhy not use ict in sudan
Why not use ict in sudan
 
Emerging practices 2019 week 1
Emerging practices 2019 week 1Emerging practices 2019 week 1
Emerging practices 2019 week 1
 
cyber security | What Is Cyber Security | Hello World Session
cyber security | What Is Cyber Security | Hello World Sessioncyber security | What Is Cyber Security | Hello World Session
cyber security | What Is Cyber Security | Hello World Session
 
Education to cyber security
Education to cyber securityEducation to cyber security
Education to cyber security
 
Issue4
Issue4Issue4
Issue4
 
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
 
Practical Machine Ethics @ SXSW2019
Practical Machine Ethics @ SXSW2019Practical Machine Ethics @ SXSW2019
Practical Machine Ethics @ SXSW2019
 
Talks submitted
Talks submittedTalks submitted
Talks submitted
 
EDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action ResearchEDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action Research
 
Trustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade PerspectiveTrustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade Perspective
 
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
 
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
 
PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...
PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...
PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...
 
Emerging practices 2019 week 2
Emerging practices 2019 week 2Emerging practices 2019 week 2
Emerging practices 2019 week 2
 
CSR Plan for National Celular Operator - Award Winning CSR
CSR Plan for National Celular Operator - Award Winning CSRCSR Plan for National Celular Operator - Award Winning CSR
CSR Plan for National Celular Operator - Award Winning CSR
 
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdfTdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
 

Recently uploaded

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Hacking Tay’les of the 1st Degree

  • 1. Hacking Tay’les of the 1 st Degree Doctor_Hacker @ twitter BSides London, 25th April 2012 (My opinions...not my employers).
  • 2. Who he?  Colin McLean (Dad) ◦ Lecturer at Abertay University, Dundee for 213/4 years 7907 days – 28,465,200 secs  Mech Eng, Mechatronics, Computing  Developed the B Sc in Ethical Hacking at Abertay University, Dundee in 2006.  The first undergraduate degree in the world with the word “Hacking” in the title.
  • 3. The story… ◦ The idea ◦ The early days ◦ B Sc EH 2.0 ◦ End Games. ◦ Quickly!
  • 4. The idea.. How did this come about?
  • 5. 2005 – KTP Project  Two year government funded project with NCR R&D, Dundee.  Risk analysis of an NCR ATM. ◦ “Identify all possible risks to an NCR ATM, their possible dangers and their mitigations”. ◦ Involved security staff at NCR and me identifying all the possible ways of hacking into an ATM.
  • 6. Colin had a thought…  We weren’t thinking like defenders.  We were thinking like attackers.  We MUST think like the opposition in order to know how to stop them. The more devious we are the better we can defend.
  • 7. Security in Education  Other degrees in “Computer Security” were looking mainly at the mitigations.  They did not appear to examine the hacks.  Graduates who think like hackers?  Hence the world’s first undergraduate degree in “Ethical Hacking”.
  • 8. Programme design  Input to the content of the degree from NCR.  Input and support from various other companies.  Programme validation panel included Head of School @ Northumbria University.
  • 9. In truth…  The course was not as first imagined.  “Internal” validation was difficult. ◦ Had to fight off “not enough ethics” and “more law modules”.  It took some years before the course matured.
  • 10. Hacking interests the media we publicly released the degree…. In June 2006,  BBC Reporting Scotland & STV News  Polish TV, Brazilian TV.  Live on Canadian Radio.  Interviewed live on French TV  Newspapers had a field day… “Doctor Hacker!” The Sun Newspaper. “Lord Voldemort” (PC1 News) “Les Pirates Ecosse”  There was also resistance.
  • 11. Academics comments  “A title like that would be a catastrophe for the University.”  “Crass programme names that bring our discipline into disrepute.”  “I doubt it would look good to prospective employers.” http://www.ics.heacademy.ac.uk/resources/faqs/answers.php?id=56
  • 12. The “establishment” had a go  If penetration testing is what is being taught, then that is how it should be labeled  Rather than seeking to use marketing spin to gain credibility within an industry that is seeking to improve its professional image.  “Ethical hacking should not be considered to be an accepted professional industry term. http://www.bcs.org/content/ConMediaFile/7266
  • 13. A stolen slide.. Security, Social + Physical Engineering, Educating Staff etc. link
  • 14. And by the way…  The BCS validated the Ethical hacking degree at Abertay University in 2010.  This is the earliest that it could have been validated.
  • 16. Entry procedures  Tried to mirror medical degrees. ◦ Interview. ◦ Ethical scenarios. ◦ Disclosure check. ◦ Sign on the dotted line.  Also, legal issues are paramount in early stages.
  • 17. Who is suitable for EH?
  • 18. Cohort #0  They could certainly think outside the box. ◦ Not the usual cohort.
  • 19.  2 students over 50.  1 student aged 16.  2 female students.  2 English students.  Only 4 completed the honours degree.  3 completed degrees in other subjects.
  • 20. Within 18 months, 6 babies.  Did I mention that this isn’t a penetration testing degree?
  • 21. Taking a side step…  A troll had lived in the (alleged) “Full Disclosure mailing list” (2002’ish).  He was one of the earliest known (alleged) trolls.
  • 22.
  • 23. The people gasped..  The troll was leaving….
  • 24. Hurrah!  The people waved him goodbye with hearty cheer.
  • 25. Timeline…..  (alleged) Troll went missing 1st September 2006 ◦ Abertay’s Ethical Hacking degree started around then.  (alleged) Troll went back to FD January 5th 2007. ◦ One of Abertay’s students did not return in January.  He was welcomed back.
  • 26. Some serious questions. 1. What about hacking group members? ◦ Difficult to identify. ◦ Whistle-blowing would be a possibility. ◦ Abertay reserves the right to remove any student. ◦ We NEED to educate about hacking techniques. 3. Many people have proved not to be suitable for an EH degree. ◦ How does the industry effectively make use of the talents of these people?
  • 27. BSc EH 2.0 What it’s become… PS The students still volatile!
  • 28. New facilities (Sep 2010)
  • 29. The syllabus (briefly!)  Themed:- ◦ Programming. ◦ Networking. ◦ Ethical Hacking.  Four year honours degree in Scotland. ◦ Year 1 and 2 still geared towards “basics”. ◦ Year 3 and 4 much more research and self- learn.
  • 30. “You should teach us X”  Culture of project work as assessments:- ◦ Year 1 Ethical Hacking – Mini project ◦ Year 2 Ethical Hacking – Project ◦ Year 2 Smart Programming – Project ◦ Year 3 Ethical hacking - Web security project ◦ Year 3 Ethical Hacking – Mini-project ◦ Year 3 Ethical Hacking – Exploit development ◦ Year 3 Group Project - Student chosen ◦ Year 4 Network Management – Network Security project ◦ Year 4 Honours project
  • 31. Student Centred Learning  Students encouraged to create their own CV’s, mould their own careers.  In many cases, students can learn what THEY think is important.  Documentation skills (& feedback on this) are more prominent.
  • 32. E-Hacking modules.  General security Internal & External Pen testing - Firstbase techies (2 staff)  Penetration testing  Web Application testing Exploitlab 5.0  Exploit Development - Saumil Shah & SK Chong 2011  Reverse Engineering  Password security CEH (3 members of staff) NCR work  Malware analysis “Other” companies  Etc. Staff training & company involvement essential.
  • 33. End games Random ramblings.
  • 34. Students talking @cons  BruCon Security Conference 2011 ◦ “Smart Phones – The Weak Link in the Security Chain, Hacking a network through an Android device” by Nick Walker and Werner Nel  BruCon Security Conference 2011 ◦ “Script Kiddie Hacking Techniques by Ellen Moar  BSides London Security Conference 2011 ◦ “DNS Tunnelling: It's all in the name!”, Arron "finux" Finnon  BSides Berlin Security Conference 2011 ◦ A Salesman's Guide to Social Engineering by Gavin Ewan
  • 35. A question  So are there jobs? ◦ We are a vocational University. ◦ Companies are coming to us (e.g. NGS). ◦ Qinetiq interested after 3 summer placements. ◦ PwC stole(!) two of our students this year! ◦ Current grads are out there. ◦ Current hons year are easily getting jobs.
  • 36. Finally..  Is the sensationalistic title necessary? ◦ Security mindset, culture is VERY important. ◦ All aspects of security are important. ◦ Ethical Hacking is what we are doing.  The future? ◦ Graduates are now out there. ◦ Summary – course has been a success.
  • 37. Questions?