SlideShare a Scribd company logo
1 of 37
Hacking Tay’les of
  the 1 st Degree
    Doctor_Hacker @ twitter
 BSides London, 25th April 2012

(My opinions...not my employers).
Who he?
   Colin McLean (Dad)
    ◦ Lecturer at Abertay University, Dundee for
      213/4 years 7907 days – 28,465,200 secs
       Mech Eng, Mechatronics, Computing

      Developed the B Sc in Ethical Hacking at
       Abertay University, Dundee in 2006.

          The first undergraduate degree in the
           world with the word “Hacking” in the
           title.
The story…
 ◦   The idea
 ◦   The early days
 ◦   B Sc EH 2.0
 ◦   End Games.


 ◦ Quickly!
The idea..
       How did this come about?
2005 – KTP Project
   Two year government funded project with
    NCR R&D, Dundee.

   Risk analysis of an NCR ATM.
    ◦ “Identify all possible risks to an NCR
      ATM, their possible dangers and their
      mitigations”.
    ◦ Involved security staff at NCR and me identifying all
      the possible ways of hacking into an ATM.
Colin had a thought…
    We weren’t thinking like
     defenders.

    We were thinking like
     attackers.

    We MUST think like the
     opposition in order to
     know how to stop them.

The more devious we are the better we can
defend.
Security in Education
   Other degrees in “Computer Security” were
    looking mainly at the mitigations.

   They did not appear to examine the hacks.

   Graduates who think like hackers?

   Hence the world’s first undergraduate degree
    in “Ethical Hacking”.
Programme design
   Input to the content of the degree from NCR.




   Input and support from various other
    companies.

   Programme validation panel included Head of
    School @ Northumbria University.
In truth…
    The course was not as first imagined.

    “Internal” validation was difficult.

     ◦ Had to fight off “not enough ethics” and “more law
       modules”.

    It took some years before the course
     matured.
Hacking interests the
media we publicly released the degree….
In June 2006,

   BBC Reporting Scotland & STV News
   Polish TV, Brazilian TV.
   Live on Canadian Radio.
   Interviewed live on French TV

   Newspapers had a field day…
     “Doctor Hacker!” The Sun Newspaper.
     “Lord Voldemort” (PC1 News)
     “Les Pirates Ecosse”

   There was also resistance.
Academics comments
    “A title like that would be a catastrophe for
     the University.”

    “Crass programme names that bring our
     discipline into disrepute.”

    “I doubt it would look good to prospective
     employers.”




    http://www.ics.heacademy.ac.uk/resources/faqs/answers.php?id=56
The “establishment” had a
go
   If penetration testing is what is being taught,
    then that is how it should be labeled

   Rather than seeking to use marketing spin to
    gain credibility within an industry that is
    seeking to improve its professional image.


   “Ethical hacking should not be considered to be
    an accepted professional industry term.


           http://www.bcs.org/content/ConMediaFile/7266
A stolen slide.. Security, Social
            + Physical
                 Engineering, Educating
                 Staff etc.




link
And by the way…
   The BCS validated the Ethical hacking degree
    at Abertay University in 2010.

   This is the earliest that it could have been
    validated.
The early days….
Entry procedures
   Tried to mirror medical degrees.
    ◦   Interview.
    ◦   Ethical scenarios.
    ◦   Disclosure check.
    ◦   Sign on the dotted line.



   Also, legal issues are paramount in early
    stages.
Who is suitable for EH?
Cohort #0
   They could certainly think outside the box.

    ◦ Not the usual cohort.
 2 students over 50.
 1 student aged 16.

 2 female students.

 2 English students.



 Only 4 completed the
honours degree.
 3 completed degrees in
other subjects.
Within 18 months, 6
babies.



 Did I mention that this
isn’t a penetration testing
degree?
Taking a side step…
 A     troll had lived in the
      (alleged)


“Full Disclosure mailing list” (2002’ish).
   He was one of the earliest known   (alleged)


    trolls.
The people gasped..
   The troll was leaving….
Hurrah!
   The people waved him goodbye with hearty cheer.
Timeline…..

    (alleged)   Troll went missing 1st September 2006
    ◦ Abertay’s Ethical Hacking degree started around then.


    (alleged)   Troll went back to FD January 5th 2007.
    ◦ One of Abertay’s students did not return in January.

   He was welcomed back.
Some serious questions.
1.       What about hacking group members?
     ◦    Difficult to identify.
     ◦    Whistle-blowing would be a possibility.
     ◦    Abertay reserves the right to remove any student.
     ◦    We NEED to educate about hacking techniques.


3.       Many people have proved not to be
         suitable for an EH degree.
     ◦    How does the industry effectively make use of the
          talents of these people?
BSc EH 2.0

       What it’s become…

  PS The students still volatile!
New facilities   (Sep 2010)
The syllabus (briefly!)
   Themed:-
    ◦ Programming.
    ◦ Networking.
    ◦ Ethical Hacking.

   Four year honours degree in Scotland.
    ◦ Year 1 and 2 still geared towards “basics”.
    ◦ Year 3 and 4 much more research and self-
      learn.
“You should teach us X”
   Culture of project work as assessments:-

    ◦ Year 1 Ethical Hacking         – Mini project

    ◦ Year 2 Ethical Hacking         – Project
    ◦ Year 2 Smart Programming       – Project

    ◦   Year   3   Ethical hacking   - Web security project
    ◦   Year   3   Ethical Hacking   – Mini-project
    ◦   Year   3   Ethical Hacking   – Exploit development
    ◦   Year   3   Group Project     - Student chosen

    ◦ Year 4 Network Management – Network Security project
    ◦ Year 4 Honours project
Student Centred Learning
   Students encouraged to create their own
    CV’s, mould their own careers.

   In many cases, students can learn what THEY
    think is important.

   Documentation skills (& feedback on this) are
    more prominent.
E-Hacking modules.
      General security        Internal & External Pen testing
                                - Firstbase techies (2 staff)
      Penetration testing
      Web Application testing
                                       Exploitlab 5.0
      Exploit Development             - Saumil Shah & SK Chong 2011
      Reverse Engineering
      Password security               CEH (3 members of staff)
                                       NCR work
      Malware analysis                “Other” companies
      Etc.

Staff training & company involvement essential.
End games


    Random ramblings.
Students talking @cons
   BruCon Security Conference 2011
    ◦ “Smart Phones – The Weak Link in the Security Chain,
      Hacking a network through an Android device” by Nick
      Walker and Werner Nel

   BruCon Security Conference 2011
    ◦ “Script Kiddie Hacking Techniques by Ellen Moar

   BSides London Security Conference 2011
    ◦ “DNS Tunnelling: It's all in the name!”, Arron "finux"
      Finnon

   BSides Berlin Security Conference 2011
    ◦ A Salesman's Guide to Social Engineering by Gavin Ewan
A question
   So are there jobs?
    ◦ We are a vocational University.
    ◦ Companies are coming to us (e.g. NGS).
    ◦ Qinetiq interested after 3 summer
      placements.
    ◦ PwC stole(!) two of our students this year!

    ◦ Current grads are out there.
    ◦ Current hons year are easily getting jobs.
Finally..
   Is the sensationalistic title necessary?
    ◦ Security mindset, culture is VERY
      important.
    ◦ All aspects of security are important.
    ◦ Ethical Hacking is what we are doing.

   The future?
    ◦ Graduates are now out there.
    ◦ Summary – course has been a success.
   Questions?

More Related Content

Viewers also liked

Learning from failure: The Blackboard Perspective
 Learning from failure: The Blackboard Perspective Learning from failure: The Blackboard Perspective
Learning from failure: The Blackboard PerspectiveBlackboardEMEA
 
Soil experiment
Soil experimentSoil experiment
Soil experimentnewham5-6
 
When Should You Retain a Forensic Accountant?
When Should You Retain a Forensic Accountant?When Should You Retain a Forensic Accountant?
When Should You Retain a Forensic Accountant?Jeff Moore
 
Apuntes y aproximaciones culturales
Apuntes y aproximaciones culturalesApuntes y aproximaciones culturales
Apuntes y aproximaciones culturalesRobert Estanga
 
людина
людиналюдина
людинаLenka2410
 
Devoxx 2014 : Sparky guide to bug free JavaScirpt
Devoxx 2014 : Sparky guide to bug free JavaScirptDevoxx 2014 : Sparky guide to bug free JavaScirpt
Devoxx 2014 : Sparky guide to bug free JavaScirptMite Mitreski
 
Our M&M project Juliette and Georgia
Our M&M project Juliette and GeorgiaOur M&M project Juliette and Georgia
Our M&M project Juliette and Georgianewham5-6
 
Top500 June 2013
Top500 June 2013 Top500 June 2013
Top500 June 2013 top500
 
Rohde EDUC 5611 Module 3
Rohde EDUC 5611 Module 3Rohde EDUC 5611 Module 3
Rohde EDUC 5611 Module 3serohde
 
relajemonos un poco
relajemonos un poco relajemonos un poco
relajemonos un poco diegousme
 
TOP500 List November 2014
TOP500 List November 2014TOP500 List November 2014
TOP500 List November 2014top500
 

Viewers also liked (20)

Learning from failure: The Blackboard Perspective
 Learning from failure: The Blackboard Perspective Learning from failure: The Blackboard Perspective
Learning from failure: The Blackboard Perspective
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Soil experiment
Soil experimentSoil experiment
Soil experiment
 
When Should You Retain a Forensic Accountant?
When Should You Retain a Forensic Accountant?When Should You Retain a Forensic Accountant?
When Should You Retain a Forensic Accountant?
 
김민경
김민경김민경
김민경
 
Apuntes y aproximaciones culturales
Apuntes y aproximaciones culturalesApuntes y aproximaciones culturales
Apuntes y aproximaciones culturales
 
людина
людиналюдина
людина
 
Devoxx 2014 : Sparky guide to bug free JavaScirpt
Devoxx 2014 : Sparky guide to bug free JavaScirptDevoxx 2014 : Sparky guide to bug free JavaScirpt
Devoxx 2014 : Sparky guide to bug free JavaScirpt
 
Lcf beautiful
Lcf beautifulLcf beautiful
Lcf beautiful
 
Halifax march82011
Halifax march82011Halifax march82011
Halifax march82011
 
Tecnologiaeducacion
TecnologiaeducacionTecnologiaeducacion
Tecnologiaeducacion
 
Our M&M project Juliette and Georgia
Our M&M project Juliette and GeorgiaOur M&M project Juliette and Georgia
Our M&M project Juliette and Georgia
 
Top500 June 2013
Top500 June 2013 Top500 June 2013
Top500 June 2013
 
Raasay 2011 Inverness Royal Academy
Raasay 2011 Inverness Royal AcademyRaasay 2011 Inverness Royal Academy
Raasay 2011 Inverness Royal Academy
 
Rohde EDUC 5611 Module 3
Rohde EDUC 5611 Module 3Rohde EDUC 5611 Module 3
Rohde EDUC 5611 Module 3
 
Studid
StudidStudid
Studid
 
relajemonos un poco
relajemonos un poco relajemonos un poco
relajemonos un poco
 
Gestión pública
Gestión públicaGestión pública
Gestión pública
 
TOP500 List November 2014
TOP500 List November 2014TOP500 List November 2014
TOP500 List November 2014
 
Canjs
CanjsCanjs
Canjs
 

Similar to Presentation

Deep sec talk - Addressing the skills gap
Deep sec talk - Addressing the skills gapDeep sec talk - Addressing the skills gap
Deep sec talk - Addressing the skills gapColin McLean
 
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...sam lessin
 
2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class OneFRSecure
 
Why not use ict in sudan
Why not use ict in sudanWhy not use ict in sudan
Why not use ict in sudanHala Nur
 
Emerging practices 2019 week 1
Emerging practices 2019 week 1Emerging practices 2019 week 1
Emerging practices 2019 week 1R. Sosa
 
cyber security | What Is Cyber Security | Hello World Session
cyber security | What Is Cyber Security | Hello World Sessioncyber security | What Is Cyber Security | Hello World Session
cyber security | What Is Cyber Security | Hello World SessionYasserElsnbary
 
Education to cyber security
Education to cyber securityEducation to cyber security
Education to cyber securityzapp0
 
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity laurieannwilliams
 
Practical Machine Ethics @ SXSW2019
Practical Machine Ethics @ SXSW2019Practical Machine Ethics @ SXSW2019
Practical Machine Ethics @ SXSW2019Jesus Ramos
 
Talks submitted
Talks submittedTalks submitted
Talks submittedKim Minh
 
EDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action ResearchEDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action Researcheckchela
 
Trustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade PerspectiveTrustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade PerspectiveVon Welch
 
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdfAngela Baxter
 
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdfBrooke Lord
 
PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...
PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...
PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...CS, NcState
 
Emerging practices 2019 week 2
Emerging practices 2019 week 2Emerging practices 2019 week 2
Emerging practices 2019 week 2R. Sosa
 
CSR Plan for National Celular Operator - Award Winning CSR
CSR Plan for National Celular Operator - Award Winning CSRCSR Plan for National Celular Operator - Award Winning CSR
CSR Plan for National Celular Operator - Award Winning CSRChristofer Felix
 
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdfTdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdfRamithaDevi
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Kimberley Dray
 

Similar to Presentation (20)

Deep sec talk - Addressing the skills gap
Deep sec talk - Addressing the skills gapDeep sec talk - Addressing the skills gap
Deep sec talk - Addressing the skills gap
 
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
 
2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One
 
Why not use ict in sudan
Why not use ict in sudanWhy not use ict in sudan
Why not use ict in sudan
 
Emerging practices 2019 week 1
Emerging practices 2019 week 1Emerging practices 2019 week 1
Emerging practices 2019 week 1
 
cyber security | What Is Cyber Security | Hello World Session
cyber security | What Is Cyber Security | Hello World Sessioncyber security | What Is Cyber Security | Hello World Session
cyber security | What Is Cyber Security | Hello World Session
 
Education to cyber security
Education to cyber securityEducation to cyber security
Education to cyber security
 
Issue4
Issue4Issue4
Issue4
 
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
 
Practical Machine Ethics @ SXSW2019
Practical Machine Ethics @ SXSW2019Practical Machine Ethics @ SXSW2019
Practical Machine Ethics @ SXSW2019
 
Talks submitted
Talks submittedTalks submitted
Talks submitted
 
EDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action ResearchEDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action Research
 
Trustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade PerspectiveTrustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade Perspective
 
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
 
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
 
PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...
PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...
PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...
 
Emerging practices 2019 week 2
Emerging practices 2019 week 2Emerging practices 2019 week 2
Emerging practices 2019 week 2
 
CSR Plan for National Celular Operator - Award Winning CSR
CSR Plan for National Celular Operator - Award Winning CSRCSR Plan for National Celular Operator - Award Winning CSR
CSR Plan for National Celular Operator - Award Winning CSR
 
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdfTdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
 

Recently uploaded

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Presentation

  • 1. Hacking Tay’les of the 1 st Degree Doctor_Hacker @ twitter BSides London, 25th April 2012 (My opinions...not my employers).
  • 2. Who he?  Colin McLean (Dad) ◦ Lecturer at Abertay University, Dundee for 213/4 years 7907 days – 28,465,200 secs  Mech Eng, Mechatronics, Computing  Developed the B Sc in Ethical Hacking at Abertay University, Dundee in 2006.  The first undergraduate degree in the world with the word “Hacking” in the title.
  • 3. The story… ◦ The idea ◦ The early days ◦ B Sc EH 2.0 ◦ End Games. ◦ Quickly!
  • 4. The idea.. How did this come about?
  • 5. 2005 – KTP Project  Two year government funded project with NCR R&D, Dundee.  Risk analysis of an NCR ATM. ◦ “Identify all possible risks to an NCR ATM, their possible dangers and their mitigations”. ◦ Involved security staff at NCR and me identifying all the possible ways of hacking into an ATM.
  • 6. Colin had a thought…  We weren’t thinking like defenders.  We were thinking like attackers.  We MUST think like the opposition in order to know how to stop them. The more devious we are the better we can defend.
  • 7. Security in Education  Other degrees in “Computer Security” were looking mainly at the mitigations.  They did not appear to examine the hacks.  Graduates who think like hackers?  Hence the world’s first undergraduate degree in “Ethical Hacking”.
  • 8. Programme design  Input to the content of the degree from NCR.  Input and support from various other companies.  Programme validation panel included Head of School @ Northumbria University.
  • 9. In truth…  The course was not as first imagined.  “Internal” validation was difficult. ◦ Had to fight off “not enough ethics” and “more law modules”.  It took some years before the course matured.
  • 10. Hacking interests the media we publicly released the degree…. In June 2006,  BBC Reporting Scotland & STV News  Polish TV, Brazilian TV.  Live on Canadian Radio.  Interviewed live on French TV  Newspapers had a field day… “Doctor Hacker!” The Sun Newspaper. “Lord Voldemort” (PC1 News) “Les Pirates Ecosse”  There was also resistance.
  • 11. Academics comments  “A title like that would be a catastrophe for the University.”  “Crass programme names that bring our discipline into disrepute.”  “I doubt it would look good to prospective employers.” http://www.ics.heacademy.ac.uk/resources/faqs/answers.php?id=56
  • 12. The “establishment” had a go  If penetration testing is what is being taught, then that is how it should be labeled  Rather than seeking to use marketing spin to gain credibility within an industry that is seeking to improve its professional image.  “Ethical hacking should not be considered to be an accepted professional industry term. http://www.bcs.org/content/ConMediaFile/7266
  • 13. A stolen slide.. Security, Social + Physical Engineering, Educating Staff etc. link
  • 14. And by the way…  The BCS validated the Ethical hacking degree at Abertay University in 2010.  This is the earliest that it could have been validated.
  • 16. Entry procedures  Tried to mirror medical degrees. ◦ Interview. ◦ Ethical scenarios. ◦ Disclosure check. ◦ Sign on the dotted line.  Also, legal issues are paramount in early stages.
  • 17. Who is suitable for EH?
  • 18. Cohort #0  They could certainly think outside the box. ◦ Not the usual cohort.
  • 19.  2 students over 50.  1 student aged 16.  2 female students.  2 English students.  Only 4 completed the honours degree.  3 completed degrees in other subjects.
  • 20. Within 18 months, 6 babies.  Did I mention that this isn’t a penetration testing degree?
  • 21. Taking a side step…  A troll had lived in the (alleged) “Full Disclosure mailing list” (2002’ish).  He was one of the earliest known (alleged) trolls.
  • 22.
  • 23. The people gasped..  The troll was leaving….
  • 24. Hurrah!  The people waved him goodbye with hearty cheer.
  • 25. Timeline…..  (alleged) Troll went missing 1st September 2006 ◦ Abertay’s Ethical Hacking degree started around then.  (alleged) Troll went back to FD January 5th 2007. ◦ One of Abertay’s students did not return in January.  He was welcomed back.
  • 26. Some serious questions. 1. What about hacking group members? ◦ Difficult to identify. ◦ Whistle-blowing would be a possibility. ◦ Abertay reserves the right to remove any student. ◦ We NEED to educate about hacking techniques. 3. Many people have proved not to be suitable for an EH degree. ◦ How does the industry effectively make use of the talents of these people?
  • 27. BSc EH 2.0 What it’s become… PS The students still volatile!
  • 28. New facilities (Sep 2010)
  • 29. The syllabus (briefly!)  Themed:- ◦ Programming. ◦ Networking. ◦ Ethical Hacking.  Four year honours degree in Scotland. ◦ Year 1 and 2 still geared towards “basics”. ◦ Year 3 and 4 much more research and self- learn.
  • 30. “You should teach us X”  Culture of project work as assessments:- ◦ Year 1 Ethical Hacking – Mini project ◦ Year 2 Ethical Hacking – Project ◦ Year 2 Smart Programming – Project ◦ Year 3 Ethical hacking - Web security project ◦ Year 3 Ethical Hacking – Mini-project ◦ Year 3 Ethical Hacking – Exploit development ◦ Year 3 Group Project - Student chosen ◦ Year 4 Network Management – Network Security project ◦ Year 4 Honours project
  • 31. Student Centred Learning  Students encouraged to create their own CV’s, mould their own careers.  In many cases, students can learn what THEY think is important.  Documentation skills (& feedback on this) are more prominent.
  • 32. E-Hacking modules.  General security Internal & External Pen testing - Firstbase techies (2 staff)  Penetration testing  Web Application testing Exploitlab 5.0  Exploit Development - Saumil Shah & SK Chong 2011  Reverse Engineering  Password security CEH (3 members of staff) NCR work  Malware analysis “Other” companies  Etc. Staff training & company involvement essential.
  • 33. End games Random ramblings.
  • 34. Students talking @cons  BruCon Security Conference 2011 ◦ “Smart Phones – The Weak Link in the Security Chain, Hacking a network through an Android device” by Nick Walker and Werner Nel  BruCon Security Conference 2011 ◦ “Script Kiddie Hacking Techniques by Ellen Moar  BSides London Security Conference 2011 ◦ “DNS Tunnelling: It's all in the name!”, Arron "finux" Finnon  BSides Berlin Security Conference 2011 ◦ A Salesman's Guide to Social Engineering by Gavin Ewan
  • 35. A question  So are there jobs? ◦ We are a vocational University. ◦ Companies are coming to us (e.g. NGS). ◦ Qinetiq interested after 3 summer placements. ◦ PwC stole(!) two of our students this year! ◦ Current grads are out there. ◦ Current hons year are easily getting jobs.
  • 36. Finally..  Is the sensationalistic title necessary? ◦ Security mindset, culture is VERY important. ◦ All aspects of security are important. ◦ Ethical Hacking is what we are doing.  The future? ◦ Graduates are now out there. ◦ Summary – course has been a success.
  • 37. Questions?