Beruflich Dokumente
Kultur Dokumente
Secret
Lives of
Hackers
Vennela Chatla
Independent Research GT
Ms.Bakhru
- Who can be a hacker?
- What is hacking
- Motives of hackers
- Brief intro to the dark web
- Ethical hacking + Overall Message
Research Question
How can we prevent ever evolving cyber attacks that result
on the loss of companies; intellectual property and personal
information?
Thesis
Although it can be argued that
hackers are the problem, they
are also the solution. Ethical
hacking can help protect
companies and individuals alike
from malicious attacks. The
need for cybersecurity is
stronger than ever and it will
only become a stronger demand
from the upcoming future.
The Answer is...
- Wrong Question
computer hacking
Motives
- Intellectual curiosity
- Ethical hackers
○ Employed by companies to perform penetration tests
- Penetration test
○ Legal attempt to break into a company’s network to find its weakest
link
○ Tester only reports findings, does not solve problems
- Security test
○ More than an attempt to break in; also includes analyzing company’s
security policy and procedures
○ Tester offers solutions to secure or protect the network
Data Collection
- Meta Analysis
- Interviews
- Academic Articles
Data Analysis
- Definition of ‘cybersecurity’
- What is ‘cybersecurity’?
- Reducing risk
Product
- 15 to 20 minute documentary
working term.
Conclusion
- Nothing is private!
Works Cited
Ben-Asher, Noam, and Cleotilde Gonzalez. “CyberWar Game: A Paradigm for Understanding New Challenges of Cyber War.”
Advances in Information Security Cyber Warfare, 2015, pp. 207–220., doi:10.1007/978-3-319-14039-1_10.
Smith, Alan D., and William T. Rupp. “Issues in Cybersecurity; Understanding the Potential Risks Associated with
Hackers/Crackers.” Information Management & Computer Security, vol. 10, no. 4, 2002, pp. 178–183.,
doi:10.1108/09685220210436976.
Isaac, Mike. “Facebook Hack Included Search History and Location Data of Millions.” The New York Times, The New York
Times, 12 Oct. 2018,
www.nytimes.com/2018/10/12/technology/facebook-hack-investigation.html?rref=collection/timestopic/Computer Security