Unit I
Unit I
1
Ethics of Ethical Hacking
• Role of Ethical hacking in Today’s World
• Vulnerability Assessments versus
Penetration testing
• How Hacking tools are used by security
professionals
• General steps of hackers and security
professionals
• Ethical issues between a white hat and a
black hat hacker
Source: Grey Hat Hacking: The Ethical Hacker’s Handbook 2
By Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Michael Lester
Motivation
• Why do militaries all over the world study
their enemy’s tactics. Tools, strategies,
technologies?
• The more you know what the enemy is up
to, the better idea you have as to what
protection mechanisms you need to put
into place to defend yourself.
• Outline:
– Laws dealing with computer crimes and what
they address
– Malware and insider threats companies face
today
– Civil versus criminal approaches in the court
system
– Federal versus state laws and their use in
prosecution
• See www.cyberspacelaw.org
Source: Grey Hat Hacking: The Ethical Hacker’s Handbook 16
By Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Michael Lester
USA Laws
• A Georgia Tech student discovers that another user failed to log off
when departing. The student uses the account to send an
inflammatory email to the department chair.
ECE 4112 - Internetwork Security 34
Proper and Ethical Disclosure
• Outline:
• Different points of view pertaining to vulnerability
disclosure
• Evolution and pitfalls of vulnerability discovery
and reporting procedures
• CERT’s approach to work with ethical hacker
and vendors
• Full disclosure policy and how it differs between
CERT and the Organization for Internet Safety
(OIS)