SlideShare a Scribd company logo
Ethics of Ethical Hacking Source: Grey Hat Hacking: The Ethical Hacker’s Handbook By Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Michael Lester
Ethics of Ethical Hacking ,[object Object],[object Object],[object Object],[object Object],[object Object]
Motivation ,[object Object],[object Object]
CERT 2002 Study
Vulnerability Assessment versus Penetration Testing ,[object Object],[object Object]
Controversy of Hacking Books and Classes ,[object Object],[object Object]
What is Network Security? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Common Steps for Attackers ,[object Object],[object Object],[object Object],[object Object],[object Object]
Common Steps for Attackers ,[object Object],[object Object],[object Object]
Common Steps for Attackers ,[object Object],[object Object],[object Object]
Common Steps for Attackers ,[object Object],[object Object],[object Object]
Common Steps for Attackers ,[object Object],[object Object],[object Object]
Where do Attackers get the Most Traction? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enough Blame to Go Around ,[object Object],[object Object],[object Object],[object Object]
Novice versus Advanced ,[object Object],[object Object]
Ethical Hacking and the Legal System ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
USA Laws ,[object Object],[object Object],[object Object],[object Object],[object Object]
18 USC 1029: Fraud And Related Activity In Connection With Access Devices ,[object Object],[object Object],[object Object]
Example “Access Device” Crime ,[object Object],[object Object],[object Object],[object Object]
18 USC 1029: Fraud And Related Activity In Connection With Access Devices
18 USC 1029: Fraud And Related Activity In Connection With Access Devices
18 USC 1030: Fraud And Related Activity In Connection With Computers ,[object Object]
18 USC 1030: Fraud And Related Activity In Connection With Computers
18 USC 1030: Fraud And Related Activity In Connection With Computers
18 USC 1030: Fraud And Related Activity In Connection With Computers ,[object Object],[object Object],[object Object],[object Object],[object Object]
18 USC 1030: Fraud And Related Activity In Connection With Computers ,[object Object],[object Object],[object Object],[object Object]
18 USC Sections 2510 and 2701 ,[object Object],[object Object],[object Object],[object Object],[object Object]
18 USC Sections 2510 and 2701 ,[object Object],[object Object],[object Object]
18 USC Sections 2510 and 2701 ,[object Object],[object Object],[object Object],[object Object]
Digital Millennium Copyright Act (DMCA) ,[object Object],[object Object],[object Object],[object Object]
Cyber Security Enhancement Act of 2002 ,[object Object],[object Object],[object Object],[object Object]
Georgia Institute of Technology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
4.6. Attempts to circumvent security  Users are prohibited from attempting to circumvent or subvert any system’s security measures. This section does not prohibit use of security tools by personnel authorized by OIT or their unit.  4.6.1. Decoding access control information  Users are prohibited from using any computer program or device to intercept or decode passwords or similar access control information.  4.6.2. Denial of service  Deliberate attempts to degrade the performance of a computer system or network or to deprive authorized personnel of resources or access to any Institute computer system or network are prohibited.  4.6.3. Harmful activities  Harmful activities are prohibited. Examples include IP spoofing; creating and propagating viruses; port scanning; disrupting services; damaging files; or intentional destruction of or damage to equipment, software, or data.  GIT Computer and Network Usage Policy
What if? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Proper and Ethical Disclosure ,[object Object],[object Object],[object Object],[object Object],[object Object]
Black Hat versus Grey Hat ,[object Object],[object Object],[object Object]
Public Disclosure ,[object Object],[object Object],[object Object],[object Object]
History of Disclosure ,[object Object],[object Object]
CERT Disclosure Policy ,[object Object],[object Object],[object Object],[object Object],[object Object]
Full Disclosure Policy (Rain Forest Puppy Policy) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Organization for Internet Safety (OIS) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

presentation on ethical hacking
 presentation on ethical hacking  presentation on ethical hacking
presentation on ethical hacking Amol Deshmukh
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Rajan Chhangani
 
Ethical Hacking A high-level information security study on protecting a comp...
Ethical Hacking  A high-level information security study on protecting a comp...Ethical Hacking  A high-level information security study on protecting a comp...
Ethical Hacking A high-level information security study on protecting a comp...
Quinnipiac University
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
chakrekevin
 
hacking
hackinghacking
hacking
mayank1293
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Rajan Chhangani
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Rohit Yadav
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
sumit dimri
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Vishesh Singhal
 
Ethical hacking.
Ethical hacking.Ethical hacking.
Ethical hacking.
Khushboo Aggarwal
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
Vikram Khanna
 
Ethical Hacking - Explained
Ethical Hacking - ExplainedEthical Hacking - Explained
Ethical Hacking - Explained
Gunjan Panara
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Mukul Agarwal
 
Hacking
HackingHacking
Hacking
pranav patade
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
Georgekutty Francis
 
Ethical hacking course
Ethical hacking courseEthical hacking course
Ethical hacking course
ChitraKuder
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 

What's hot (20)

presentation on ethical hacking
 presentation on ethical hacking  presentation on ethical hacking
presentation on ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking A high-level information security study on protecting a comp...
Ethical Hacking  A high-level information security study on protecting a comp...Ethical Hacking  A high-level information security study on protecting a comp...
Ethical Hacking A high-level information security study on protecting a comp...
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
hacking
hackinghacking
hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking.
Ethical hacking.Ethical hacking.
Ethical hacking.
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking - Explained
Ethical Hacking - ExplainedEthical Hacking - Explained
Ethical Hacking - Explained
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Ethical hacking course
Ethical hacking courseEthical hacking course
Ethical hacking course
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 

Similar to Ethical Hacking

Cybercrime
CybercrimeCybercrime
Cybercrime
promit
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
KavithaK23
 
Newethics
NewethicsNewethics
FCL-Introduction.pptx
FCL-Introduction.pptxFCL-Introduction.pptx
FCL-Introduction.pptx
aratibhavsar
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
Kathirvel Ayyaswamy
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
nivi55
 
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometrics
Mayank Diwakar
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
Sudeshna07
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
Tushar B Kute
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
silas Sargunam
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
Accenture
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
Accenture
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
GogoOmolloFrancis
 
Ch01
Ch01Ch01
Ch01
phanleson
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
politegcuf
 

Similar to Ethical Hacking (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
Newethics
NewethicsNewethics
Newethics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
FCL-Introduction.pptx
FCL-Introduction.pptxFCL-Introduction.pptx
FCL-Introduction.pptx
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometrics
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 
Puna 2015
Puna 2015Puna 2015
Puna 2015
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
Ch01
Ch01Ch01
Ch01
 
Ch01
Ch01Ch01
Ch01
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 

Ethical Hacking

  • 1. Ethics of Ethical Hacking Source: Grey Hat Hacking: The Ethical Hacker’s Handbook By Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Michael Lester
  • 2.
  • 3.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. 18 USC 1029: Fraud And Related Activity In Connection With Access Devices
  • 21. 18 USC 1029: Fraud And Related Activity In Connection With Access Devices
  • 22.
  • 23. 18 USC 1030: Fraud And Related Activity In Connection With Computers
  • 24. 18 USC 1030: Fraud And Related Activity In Connection With Computers
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. 4.6. Attempts to circumvent security Users are prohibited from attempting to circumvent or subvert any system’s security measures. This section does not prohibit use of security tools by personnel authorized by OIT or their unit. 4.6.1. Decoding access control information Users are prohibited from using any computer program or device to intercept or decode passwords or similar access control information. 4.6.2. Denial of service Deliberate attempts to degrade the performance of a computer system or network or to deprive authorized personnel of resources or access to any Institute computer system or network are prohibited. 4.6.3. Harmful activities Harmful activities are prohibited. Examples include IP spoofing; creating and propagating viruses; port scanning; disrupting services; damaging files; or intentional destruction of or damage to equipment, software, or data. GIT Computer and Network Usage Policy
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.

Editor's Notes

  1. Legal and Ethical Aspects of Computer Hacking ECE4883 – Internetwork Security Georgia Institute of Technology
  2. What types of policies are in place? Many different policies are already set in place such as the United States Title 18 on Crimes and Criminal Procedure. Furthermore, there is also the Georgia Computer Systems Protection Act HB 822, the Patriot Act and Homeland Security. Since so many different acts are not enough to define hacking, individual organizations also have taken liberty to define their own rules like the one at Georgia Tech: Georgia Institute of Technology Computer and Network Usage Policy How do they differ from each other? Each act has a certain defined area to concentrate on. There are some where rules are broad and left at that to cover all types of details. Then there are other individual specific for the soul purpose of describing details that have been dealt with earlier. What kind of defined lines are there? Each act covers what is believed to be “bad” or which causes harm to others. Should these be there? Should laws be in place? After all the Internet is for everyone! Yes, the Internet is, but even there, disputes about personal space come into affect. Are they clear enough? The laws are not clear enough. If they were, then different people would not be punished differently for almost the same things. There would be a bar in place that said, if x is happening, then y is the punishment. With the laws in place, it is more like x is happening, but there is also a, b, c, then z is the punishment.
  3. Georgia Institute of Technology implements the Computer and Network Usage Policy for all students and faculty. It defines several areas including authorized users and uses, privileges for individuals, and user Responsibilities. Under Responsibilities comes section 4.5 Access to facilities and information. This section describes sharing of access, permitting unauthorized access, denial of service, harmful activities, unauthorized monitoring and access. The Harmful activities include many examples such as: IP spoofing; creating and propagating viruses; port scanning; disrupting services; damaging files; or intentional destruction of or damage to equipment, software, or data.
  4. Scenarios as such happen regularly. Access is either taken or given sometimes intentionally or accidentally. What steps can be taken from a users point of view? A Georgia Tech student uses their personal PC and the school’s network to do a port scan on a commercial web site. A Georgia Tech student uses their personal PC and a commercial ISP to do a port scan on a commercial web site. A Georgia Tech student sends a “spoofed mail” from the school account that appears to come from another user. A Georgia Tech student uses a school computer and password guessing software to access and crack the administrator password. A Georgia Tech student discovers that another user failed to log off when departing. The student uses the account to send an inflammatory email to the department chair.