Sie sind auf Seite 1von 16

The

Secret
Lives of
Hackers
Vennela Chatla
Independent Research GT
Ms.Bakhru
- Who can be a hacker?
- What is hacking
- Motives of hackers
- Brief intro to the dark web
- Ethical hacking + Overall Message
Research Question
How can we prevent ever evolving cyber attacks that result
on the loss of companies; intellectual property and personal
information?
Thesis
Although it can be argued that
hackers are the problem, they
are also the solution. Ethical
hacking can help protect
companies and individuals alike
from malicious attacks. The
need for cybersecurity is
stronger than ever and it will
only become a stronger demand
from the upcoming future.
The Answer is...
- Wrong Question

- Completely depends on the person

- What is hacking and why do people do it?


So what is Hacking?
- Creative problem solving

- Usually when hacking comes up, we are referring to

computer hacking
Motives
- Intellectual curiosity

- Defending valuable information

- Motivated by greed, fame, or rebellion

- Morally grey areas


Types of Hackers
Ethical Hacking

- Ethical hackers
○ Employed by companies to perform penetration tests
- Penetration test
○ Legal attempt to break into a company’s network to find its weakest
link
○ Tester only reports findings, does not solve problems
- Security test
○ More than an attempt to break in; also includes analyzing company’s
security policy and procedures
○ Tester offers solutions to secure or protect the network
Data Collection
- Meta Analysis

- Interviews

- Academic Articles
Data Analysis
- Definition of ‘cybersecurity’

- What is ‘cybersecurity’?

- Reducing risk
Product
- 15 to 20 minute documentary

- Promote ethical hacking

- Bringing awareness to cybersecurity and work to create a

working term.
Conclusion

- Assigning right or wrong to hacking will do no good

- Ethical hacking is the solution

- Nothing is private!
Works Cited
Ben-Asher, Noam, and Cleotilde Gonzalez. “CyberWar Game: A Paradigm for Understanding New Challenges of Cyber War.”
Advances in Information Security Cyber Warfare, 2015, pp. 207–220., doi:10.1007/978-3-319-14039-1_10.

Khan Academy, Khan Academy,


www.khanacademy.org/computing/computer-science/internet-intro/internet-works-intro/v/the-internet-cybersecurity-and-crime.

“Figure 2f from: Irimia R, Gottschling M (2016) Taxonomic Revision of Rochefortia Sw.


(Ehretiaceae, Boraginales). Biodiversity Data Journal 4: e7720.
Https://Doi.org/10.3897/BDJ.4.e7720.” doi:10.3897/bdj.4.e7720.figure2f.

Smith, Alan D., and William T. Rupp. “Issues in Cybersecurity; Understanding the Potential Risks Associated with
Hackers/Crackers.” Information Management & Computer Security, vol. 10, no. 4, 2002, pp. 178–183.,
doi:10.1108/09685220210436976.

Isaac, Mike. “Facebook Hack Included Search History and Location Data of Millions.” The New York Times, The New York
Times, 12 Oct. 2018,
www.nytimes.com/2018/10/12/technology/facebook-hack-investigation.html?rref=collection/timestopic/Computer Security

Das könnte Ihnen auch gefallen