Ethics CSE 591 – Security and Vulnerability Analysis Spring 2015 Adam Doupé Arizona State University

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

The impact of IT Around the world By Eddie Cole. The positive social impacts of IT Social networking sites are huge now, bringing in hundreds of millions.
Group 4 Project. Why? Scientific investigations of today involve teamwork which, like the Group 4 Project, is interdisciplinary. The underpinnings of.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
UNIT 20 The ex-hacker.
ETHICAL HACKING.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
Ethics CSE 591 – Security and Vulnerability Analysis Spring 2015 Adam Doupé Arizona State University
What is identity theft, and how can you protect yourself from it?
Ethical Hacking Pratheeba Murugesan. HACKER AENDA  What is Ethical Hacking?  Who are ethical hackers?  Every Website-A Target  Get out of jail free.
Internet Safety/Cyber Ethics
Prepared by: Nahed Al-Salah
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
Computer Security And Computer Crimes. Problem under consideration A software flaw was found in a national bank's web site that allows anyone who knows.
The Hacker Mindset CSE 591 – Security and Vulnerability Analysis Spring 2015 Adam Doupé Arizona State University
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
1 UNIT 20 The ex-hacker Lecturer: Ghadah Aldehim.
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
Hands-On Ethical Hacking and Network Defense
How to Prepare for the Fall Exam COM380/CIT304 Harry Erwin, PhD University of Sunderland.
Professional Ethics and Responsibilities
A Gift of Fire Third edition Sara Baase
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
The Business of Penetration Testing
Identifying Good Stock Investments Investment and Finance 12 Ms. Stewart.
Introduction Social Implications & EthicsSocial Implications & Ethics Since the introduction of the Internet, many policies have been introduced as a way.
Web Security Demystified Justin C. Klein Keane Sr. InfoSec Specialist University of Pennsylvania School of Arts and Sciences Information Security and Unix.
Introduction Our Topic: Mobile Security Why is mobile security important?
SEC835 Database and Web application security Information Security Architecture.
Principles of Management
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
Bill Gates By Eli De Carteret. Background Bill Gates real name is William Henry Gates III. He was born on the 28 th October 1955 in Seattle, Washington.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Team # 7 Tanaz Mozafari Kunal Mhaske Yanjing Chu Shin Sesthalao.
Back to the Basics The Ethical Aspect of Reverse Engineering.
Should employers have access to your social feeds?
Viruses For… What is a virus? A virus, affects your computer and damages its software. It can affect your computer, and some viruses can damage your.
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
OARN Database UPDATE – SEPTEMBER We’re Live – and Testing  The site is up and running in Google’s data centers:  The site has been secured: 
WHAT IS HACKING? Hacking is an act of controlling computer systems to get information about the system and how it works. Technically, a hacker is someone.
© 2007 McAfee, Inc. Vulnerability in the Real World Lessons from both sides of the fence Ryan Permeh Manager of Product Security McAfee Security Architecture.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Presents Ethical Hacking 1 For Inplant Training / Internship, please download the "Inplant training registration form" from our.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Understand why software needs installing or upgrading
Software Security CSE 545 – Software Security Spring 2016 Adam Doupé Arizona State University
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
9.1 Audience Appreciation
Team Quintinlessness: Antony Johnston Steven Pike Mark Coleman Alex Burch Alex Scleparis Nurbol Baimaganbetov.
Clash of Kings Hack and Cheats Published by:
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
Security Testing Methods
Module 3 (Ground Rules and Rules of Engagement)
Information Security.
Ethics CSE 591 – Security and Vulnerability Analysis Spring 2017
HOW MUCH PRICE OF DEVELOPING A CROSS-PLATFORM MOBILE APP?
Spyware. By: Katheryn L. Gaston.
How to analyze the Cost of Cross- platform Mobile App Development?
Ethics CSE 545 – Software Security Spring 2018 Adam Doupé
A Gift of Fire Third edition Sara Baase
Week 11: Professional Ethics and Responsibilities
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Networks, Legal and Ethical Behaviors BSU CS4MS - 4/9/19
Presentation transcript:

Ethics CSE 591 – Security and Vulnerability Analysis Spring 2015 Adam Doupé Arizona State University

Adam Doupé, Security and Vulnerability Analysis Avoiding Jail Pretty easy, don't do anything illegal! What does this mean in a hacking context? –Never hack into a system that you do not own or have permission –Do not attempt to find vulnerabilities in a system that you do not own or have permission

Adam Doupé, Security and Vulnerability Analysis Practicing Without Going to Jail Download source code onto a server/system that you control (assuming it is open-source) Only try to find vulnerabilities in a system that has a bug bounty program Become an academic –We can sometimes do vulnerability analysis, however we are very careful to consider the ethical considerations before performing any analysis

Adam Doupé, Security and Vulnerability Analysis Bug Bounty Programs A number of web sites have started to offer Bug Bounty programs They will give you money or fame in exchange for reporting security vulnerabilities to them –Make sure that they also give you permission, and make sure you understand what is in scope Google, Facebook, AT&T, Coinbase, Etsy, Github, Heroku, Microsoft, Paypal, –

Adam Doupé, Security and Vulnerability Analysis Facebook Incident Security researcher found vulnerability in Facebook to post on anyone's wall Breakdown in communication with Facebook's security team Researcher decided to post on Mark Zuckerberg's wall to get attention about the vulnerability Ultimately, Facebook said that the researcher did not follow the policy and therefore was ineligible for bounty

Adam Doupé, Security and Vulnerability Analysis

Disclosure In case you do find a vulnerability in software, what is your responsibility? –Tell the world (full disclosure) –Tell the company/group responsible for the software (responsible disclosure) –Sell the information to the grey or black market (no disclosure) Personal decision –I believe in responsible disclosure, first disclosing to the company then releasing the information publically

Adam Doupé, Security and Vulnerability Analysis Would You Hire a Hacker? Open problem and subject of much discussion Pros: "I want somebody who can find problems before the bad guys do" –Skillful, motivated, etc. Cons: "I don’t want to hire an arsonist as a Fire Marshal" –Problem with teamwork, may damage company, etc. In general assessment of personality is important (morals, ethics, attitude) –And hackers ARE hired all the time How would you fire a hacker?

Adam Doupé, Security and Vulnerability Analysis Legal Hacking: Penetration Testing Vulnerability analysis followed by exploitation –Assumptions and hypothesis derived from the analysis are verified on the field –It is usually "black-box" Penetration testing is part of the (larger) security auditing/analysis process –Pentest/fix as a cycle is NOT a good way to ensure the security of a system A comprehensive security analysis process takes into account many other aspects (e.g., source code analysis, policy analysis, social engineering) –For example: The Open-Source Security Testing Methodology 10

Adam Doupé, Security and Vulnerability Analysis Discussion: Is Penetration Testing Useful? 11

Adam Doupé, Security and Vulnerability Analysis Summary Proceed ethically Only attempt to find vulnerabilities in web applications that you either –Control –Have permission Jail is a possibility Also against ASU policy