The Psychology of Hackers: Steps Toward a New Taxonomy

Slides:



Advertisements
Similar presentations
Introduction and Overview of Digital Crime and Digital Terrorism
Advertisements

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Sixteen Police Technology Hi-Tech Crime.
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
Jacky Altal. T O C  Hackers Terminology  Cyber attacks in 2012 (so far…)  Nations Conflict  Cyber Motives  Characteristics of CyberCrime  DEMO –
Chapter 1.  Security Problem  Virus and Worms  Intruders  Types of Attack  Avenues of Attack 2 Prepared by Mohammed Saher Hasan.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Computer Crimes Chapter 9. Definition  Illegal act that involves a computer system or computer-related system  Telephone, microwave, satellite telecommunications.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Computer Security and Penetration Testing
Hacker Ethics Kim Bissett Sabrina Short. Hacker Ethic: In General  Freedom of Information The web is not physical; it couldn’t be interpreted as property,
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Computer Forensics BACS 371
Chapter 1 Introduction to Security
Chapter 1 Introduction. Art of War  If you know the enemy and know yourself, you need not fear the result of a hundred battles.  If you know yourself.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Hacking and Network Defense. Introduction  With the media attention covering security breaches at even the most tightly controlled organization, it is.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
CYBER CRIME AND SECURITY TRENDS
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally.
ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Are you safe? Alyssa Caputo & Niki Labella Itech 1101 Dr. Nagel.
Protecting People and Information: Threats and Safeguards
Computer Crime and CyberCrime Why we need Computer Forensics.
Computer Crime and Information Technology Security
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
What is the Information technology career cluster?
Cyber crime & Security Prepared by : Rughani Zarana.
By Hafez Barghouthi. Agenda Today Attack. Security policy. Measuring Security. Standard. Assest. Vulnerability. Threat. Risk and Risk Mitigation.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and.
Introduction to Computer Ethics
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Chapter 2: Anatomy of the Problem Recent terrorist attacks and the raise in cyber attacks have raised concern about the need to protect the nation’s cyber.
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information.
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
The Digital Crime Scene: A Software Perspective Written By: David Aucsmith Presented By: Maria Baron.
Security Mindset Lesson Introduction Why is cyber security important?
Computer Security Threats
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
1 Figure 1-3: Attack Trends Growing Incident Frequency  Incidents reported to the Computer Emergency Response Team/Coordination Center  1997: 2,134.
An analysis information security in distributed systems
The Economics of Cyber Security
Add video notes to lecture
CEH vs CISSP Course, Advantage, Career, Salary, Demand!
A Project on CYBER SECURITY
Security in the Workplace: Information Assurance
Hackers and Crackers iJacsn.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
1 Chapter Introduction 1st Week of the Semester.
Five Unethical Uses of Computers
Forensics Week 12.
Introduction to Computers
SECURITY POLICIES, LAWS AND COMPUTER CRIMES (CCI410) PERTEMUAN 12
Faculty of Science IT Department By Raz Dara MA.
Cultural Competence Britt Andreatta, Ph.D..
Computer Security By: Muhammed Anwar.
Industrial Control Cross 11, Tapovan Enclave Nala pani Road, Dehradun : ,
CYBERTERRORISM.
MIS650 Introduction.
Presentation transcript:

The Psychology of Hackers: Steps Toward a New Taxonomy Marc Rogers Dept. of Psychology University of Manitoba Senior Security Technical Architect EDS Systemhouse Canada UofM SHL Systemhouse

Agenda Introduction Evolution of the Term Theories of Deviance A New Taxonomy Demographics Psychological Profiles Conclusion UofM SHL Systemhouse

Introduction Criminal Hackers current “enemy” to IT/IS Security Research their targets $124 Million lost in 1999 (CSI/FBI) Intelligence gathering Information sharing What do we know about them? UofM

Evolution of the Term 4 Generations of the term Hacker 1st Generation: Creative Programmer: MIT/Stanford (1960’s) 2nd Generation: Computer Evolutionaries (1970’s) 3rd Generation: Games & Copyright breaking (1980’s) *4th Generation: Criminals & Cyberpunks (1990’s) UofM SHL Systemhouse

1st Generation Creative Programmers & Scientists Novel methods for programming (code bumming) Hacker Ethic (The Right Thing.) Very respected (Gurus) MIT (TMRC) & Stanford (SAIL) UofM SHL Systemhouse

2nd Generation Computer Evolutionary Hardware Hackers Mainframe to personal systems Computer Kits (Altair, Apple) Founders of Major Computer Companies Minor criminal activity: Phreaking/Blue Boxing Software Piracy UofM SHL Systemhouse

3rd Generation Computer Games & Copyrights Game Hackers Personal PC Computer for entertainment Methods for protecting and breaking copyright codes on games Minor criminal activity UofM SHL Systemhouse

4th Generation Criminals Cyber-punks Not respected Rarely technically elite Motivated primarily by greed, power, revenge, malicious intent Not respected UofM SHL Systemhouse

Theories of Deviance Traditional theories of deviance Why individuals become involved in delinquent behavior? How do they justify the behaviors engaged in? UofM

Theories of Deviance Differential Association: Delinquency based on normative conflict Conflicting definitions of appropriate behavior Differential association - communication with intimate groups (peer pressure) UofM SHL Systemhouse

Theories of Deviance Conflicting norms and definitions Almost a sub-culture Strong hacker peer pressure Reinforcement: Internal/External/Vicarious Complex schedule of Reinforcement UofM SHL Systemhouse

Moral Disengagement Social Learning Theory (Bandura) Moral standards Avoid Self-Censure Rightness of their actions Valued social or moral purposes UofM

Moral Disengagement Mechanisms : Moral justification, Minimizing, ignoring or misconstruing the consequences, Dehumanizing, Attribution of blame on victims. UofM

A New Taxonomy Hackers, Phreakers, Crackers (Moot) Generic Term Research on Generic Criminals? Wide Range of activities What groups? Operational Definition UofM

A New Taxonomy Proposed: Novice (newbies\script kiddies) Cyber-punks Insiders Coders Old Guard Professionals Cyber-Terrorists Political Activists? UofM

A New Taxonomy Hacker Continuum UofM

Novice (Newbie/Script Kiddies) Limited computer skills New to the activity Rely on software available on the Internet Nuisance attacks: Denial of Service (DOS) Can cause extensive damage to systems as they don’t understand how the attack works Media attention UofM SHL Systemhouse

Cyber-punks Better computer skills Limited programming knowledge Better understanding of how the attack works Criminal intent, malicious behavior, credit card frauds, etc. Media attention UofM SHL Systemhouse

Insiders Computer literate Technology/Information Fields Disgruntled, Ex-employee Able to carry out attack due to privileges inherent in position Largest security problem: 70-80% of all computer security breaches UofM SHL Systemhouse

Coders Technically skilled Writes the scripts and automated tools Acts as a mentor to the newbies Motivated by a sense of power and prestige Revered Dangerous (hidden agendas, trojans etc) UofM

Old Guard No criminal intent Values similar to 1st generation Disturbing lack of regard for private property Mentoring Very defensive and limited view of hacker community. UofM

Professional Criminals Thieves Corporate Espionage Guns for Hire Highly motivated, highly trained, state of the art equipment Very little known of this group UofM SHL Systemhouse

Cyber-Terrorists Increase in activity since the fall of many Eastern Bloc intelligence agencies Well funded Very motivated Mixing political rhetoric with criminal activity Information Warfare: Rand Corp. Day after scenario Very little known in this area UofM

Personality Profiles & Demographics Limited “true” empirical research Self report based Several “documentary” books written (objectivity is questionable) Findings not generalizable to other subgroups Criminal Activities UofM SHL Systemhouse

Demographics Current Research: Caucasian Male 12-28 years old Middle Class Limited Social Skills Perform poorly in school: aptitude for computers & technology Dysfunctional families UofM SHL Systemhouse

Personality Profiles Socially Inept Obsessive Loners yet appear to crave membership Inferiority Complex Escapism Motivation Computer Addictive Disorder? UofM SHL Systemhouse

Conclusion New breed of criminals (specific sub-groups) Non homogeneous classification Little known about the true problem groups Responsible for over $124 Million dollars in 1998-99 (CSI-FBI Study). As the Internet grows so to does the rate of criminal activity (Howard, 1997) Obvious need for a new taxonomy & more research No Generic Hacker Profile UofM

The Psychology of Hackers: Steps Toward a New Taxonomy "..If you know yourself but not the enemy, for every victory gained you will also suffer a defeat". Sun TZU UofM