Hacking, Security, and Information War

Slides:



Advertisements
Similar presentations
Northside I.S.D. Acceptable Use Policy
Advertisements

What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Craig Rimando Luke White. “hacking” - negative connotation Not always that way Originally a compliment Not all hacking necessarily bad “Good” hacking?
ETHICAL THEORY AND ETHICAL RESEARCH David Archard Professor of Philosophy, Lancaster University Member of the Lancaster University Research Ethics Committee.
Business Law Tort Law.
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Hacker Ethics Kim Bissett Sabrina Short. Hacker Ethic: In General  Freedom of Information The web is not physical; it couldn’t be interpreted as property,
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Hands-On Ethical Hacking and Network Defense
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Limits on Political Authority 1)Morality: laws obligate only if they are moral, that is, if they are consistent with reason or the natural law (Stoics).
Describe ethical considerations resulting from technological advances.
1 Ethics of Computing MONT 113G, Spring 2012 Session 37 Digital Order.
Ethics in Our Law Chapter 2
Question: Future Sessions AI and Military (UAS) Virtual Worlds Privacy and NSA Free Software Movement.
HACKING Unlike most computer crime / misuse areas which are clear cut in terms of actions and legalities (e.g. softwarepiracy), computer hacking is more.
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
 In most countries of the world, the “information revolution” has altered many aspects of life significantly: commerce, employment, medicine, security,
Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
“The act of gaining unauthorized access to computer systems (cracking) should not be criminalized assuming that there is no damage.” Dan Garrison Megan.
Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Computer Security By Duncan Hall.
NETWORK SECURITY LAB Rehab AlFallaj. Learning Objective ■In this Lecture you will learn: –Ethical Issues related to network security.
Basic Principles: Ethics and Business
Computer and Network Security Brendan Duncombe Bahein Maung.
Professional Ethics and Responsibilities Part-II
Cyber Security Foundations Part 1. Cyber Security defined:  Protects computer base information and equipment  Deals with confidentiality of data  Protects.
ETHICAL BASES FOR LAWS Chapter 2. Ethics A practice of deciding what is right or wrong in a reasoned, impartial manner  Decision affects you.
ETHICS Internet And Online Community Week 10.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Legislations.
Seminar On Ethical Hacking Submitted To: Submitted By:
HACKING VS PENTESTING NURUL HAFIZAH HAZWNI BINTI HASHIM (MCS151019)
Introduction to Ethics Lecture 12 Kant
Please read the entire presentation.
Privileged Information: Confidentiality and Disclosure
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
From Stockholder to a Stakeholder Theory
Lecture 01: A Brief Summary
Chapter # 1 Overview of Ethics
Basic Principles: Ethics and Business
Chapter 11 crime and security in the networked economy
The Impact Of ICT “Hacking”
Internet And Online Community Week 10
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Video: Digital citizenship is defined as the norms of appropriate,
A Gift of Fire Third edition Sara Baase
Business Law Ethics in Our Law.
Cyber security Policy development and implementation
Faculty of Science IT Department By Raz Dara MA.
Chapter 19: Civil Liberties: First Amendment Freedoms Section 4
What is computer hacking?
Introduction to Computer Ethics
Your Digital Footprint
Criteria for Civil Disobedience
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Basic Principles: Ethics and Business
Presentation transcript:

Hacking, Security, and Information War Adam D. Moore Information School Hacking, Security, and Information War

Hacking and Hacktivism The Hacker Ethic: information belongs to everyone and putting up fences or restricting access is wrong. Ideas belong to us all and intellectual property/privacy rights run counter to this. The Hacktivist: attacks on corporate and governmental sites are sometimes justified as a form of civil disobedience

What is a hacker? Hacker: “A person with an enthusiasm for programming or using computers as an end in itself.” Or, “A person who uses his skill with computers to try to gain unauthorized access to computer files or networks.” – Oxford English Dictionary Self-described hackers – enjoy experimenting with technology and writing code. Media-labeled hackers (crackers) – break into systems, cause damage, and write malware. Ethical hackers – former hackers or crackers who have joined the security industry to test network security and create security products and services. February 2004…https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=3&ved=0CCwQFjAC&url=http%3A%2F%2Fwww.dartmouth.edu%2F~marionba%2Fengs69%2FEthics_Law_Privacy_ENGS69.ppt&ei=EN1jVazjKsbpsAXJ9YGACA&usg=AFQjCNEcKho927WDCTtP4ZvlwbcPcAQ75Q&bvm=bv.93990622,d.b2w

Good or Bad Hackers? Black Hats – break into systems, develop and share vulnerabilities, exploits, malicious code, and attack tools. Grey Hats – are in hacker ‘no-man’s land,’ may work as security professionals by day and ‘hack’ by night. White Hats – are part of the ‘security community,’ help find security flaws, but share them with vendors so that products can be made safer. February 2004…. February 2004…https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=3&ved=0CCwQFjAC&url=http%3A%2F%2Fwww.dartmouth.edu%2F~marionba%2Fengs69%2FEthics_Law_Privacy_ENGS69.ppt&ei=EN1jVazjKsbpsAXJ9YGACA&usg=AFQjCNEcKho927WDCTtP4ZvlwbcPcAQ75Q&bvm=bv.93990622,d.b2w

Arguments for Hacking  Security: Hacker break-ins are ethical on this view because they illustrate the defects in computer networks. Morris' internet worm actually helped create a more secure system. Idle System Argument: According to this argument, hacker break-ins are ethical because they are merely using a system that is idle anyway — if they do not mess anything up it is as if they were not there at all. What could be wrong with this?

The Security Argument P1. It is morally permitted to trespass on the property of others as long as one’s motives are good and no harm is done (no harm, no foul). P2. Many hackers have good intentions and do no damage. C3. Some hacking should be permitted Problems: Fred and Ginger Case Motives are irrelevant (Dr. Demento) Doing no harm is irrelevant (Dr. Demento again…) Imposing unconsented to risks is a harm

Arguments for Hacking The Student Hacker Argument: Suppose we couple the idle system argument with the good that is obtained in terms of learning. Students are simply learning how systems operate. The Social Protector Argument: Hackers break-ins are justified because they protect civilians against "big brother" government and corporations. The government and businesses as well, have lots of information about us than they should have. The hacker is merely keeping these institutions honest.

Himma: Hacktivism Elements of civil disobedience: Open/public. . .knowing violation Non-violent (civil), pure speech acts vs. behavior Violates the law Purpose = protesting the law, political expression

Justified if: committed openly properly motivated Greta Pittenger Annie Christensen Rachel Wishkoski Jeffrey Lopez Evaluative framework Justified if: committed openly properly motivated willing to accept responsibility plausible position thoughtful justification no significant damage to innocents calculated to advance debate According to Himma, justified/excused civil disobedience that shouldn’t be punished meets the following criteria: “First, the act is committed openly by properly motivated persons willing to accept responsibility for the act. Second, the position is a plausible one that is, at the very least, in play among open-minded, reasonable persons in the relevant community. Third, persons committing an act of civil disobedience are in possession of a thoughtful justification for both the position and the act. Fourth, the act does not result in significant damage to the interests of innocent third parties. Fifth, the act is reasonably calculated to stimulate and advance debate on the issue.” For example, Civil Rights sit-ins https://upload.wikimedia.org/wikipedia/commons/2/28/Richmond34.jpg

NOT justified: committed openly properly motivated Greta Pittenger Annie Christensen Rachel Wishkoski Jeffrey Lopez Evaluative framework NOT justified: committed openly properly motivated willing to accept responsibility plausible position thoughtful justification no significant damage to innocents calculated to advance debate According to Himma, unexcused civil disobedience doesn’t meet those criteria For example, the 1999 Seattle WTO protests https://upload.wikimedia.org/wikipedia/commons/thumb/6/63/WTO_protests_in_Seattle_November_30_1999.jpg/320px-WTO_protests_in_Seattle_November_30_1999.jpg

Himma: Hacktivism Pure speech acts vs. behavior Civil disobedience requires behavior Thus, civil disobedience requires a stronger justification In a properly administered democracy we each have the right express ourselves In violating the law (civil disobedience) we are claiming for ourselves a larger role. . .why are those who are disobedient so privileged?

Himma: Hacktivism When is Hacktivism Morally Permitted? Correct purpose, motivation Amount of harm? Violent acts are not civil! Amount of harm to third parties? Accepting responsibility? Is the political agenda supported by adequate reasons?

Greta Pittenger. Annie Christensen. Rachel Wishkoski Greta Pittenger Annie Christensen Rachel Wishkoski Jeffrey Lopez Punishment “Acts of electronic civil disobedience committed anonymously should be punished to the full extent under the law.”(p. 23) Earlier in the article, Himma concludes that a legitimate state is permitted to punish unjustified acts of civil disobedience (this is different from being obligated to punish) Revisits this idea at the end of the article to ask if unjustified electronic civil disobedience (hacktivism) should be punished, and how Why punishment? “provide (1) an incentive for hacktivists to do more than just anonymously claim responsibility for their actions and (2) a significant deterrent to anonymous cyberattacks of any kind, no matter how well motivated they might be.” (p. 23)

Greta Pittenger. Annie Christensen. Rachel Wishkoski Greta Pittenger Annie Christensen Rachel Wishkoski Jeffrey Lopez Himma’s conclusion “Hacktivism is impermissible [and should be punished] insofar as such acts result in significant harms to innocent third-parties or insofar the persons responsible for such acts conceal their identities to avoid the potential legal consequences.” (p. 2)

The Case of Aaron Swartz https://www.youtube.com/watch?v=dU5JWT0hFlc Group Work: Related to PACER or JSTOR: --Was this hacktivism? -- Was this ‘taking’ theft or stealing? --Was there harm done? -- Does the notion of ‘stealing’ rely on ‘harm?’ --What is ‘harm’?

TOR, The Dark Web, and Bitcoin Group work: After watching the video. . .Get into 3-4 person groups and answer the following questions. What are some of the positives about TOR, the Dark Web, and Bitcoin (in general, for libraries)? What are some of the negatives about TOR, the Dark Web, and Bitcoin (in general, for libraries)? Should these technologies be regulated (eliminated)? Is it possible to regulate/eliminate these technologies?