Amazon cover image
Image from Amazon.com

Ethical hacking / Alana Maurushat.

By: Material type: TextTextPublisher: [Ottawa, Ontario, Canada] : University of Ottawa Press, 2019Copyright date: ©2019Description: 1 online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780776627922
  • 0776627929
  • 9780776627946
  • 0776627945
  • 9780776627939
  • 0776627937
Subject(s): Genre/Form: Additional physical formats: Print version:: Ethical hacking.DDC classification:
  • 364.16/8 23
LOC classification:
  • HV6773 .M38 2019
Other classification:
  • cci1icc
Online resources:
Contents:
Why Ethical Hacking? -- Essential Terms and Concepts -- Methodology and Quantitative Studies of Ethical Hacking: Evidence-Based Decision and Policy-Making -- Legal Cases Around the World (with Jelena Ardalic) -- Select Ethical-Hacking Incidences: Anonymous -- Select Ethical-Hacking Incidences: Chaos Computer Club, CyberBerkut, Lulzsec, Iranian Cyber Army, and Others -- Online Civil Disobedience -- Hacktivism -- Penetration/Intrusion Testing and Vulnerability Disclosure -- Counterattack/Hackback -- Security Activism -- Ethical-Hacking Challenges in Legal Frameworks, Investigation, Prosecution, and Sentencing -- Ethical Hacking, Whistle-Blowing, and Human Rights and Freedoms -- Toward an Ethical-Hacking Framework.
Summary: "The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments. The line of transparency is moving by force. The twitter page for Wikileaks demonstrates this ethos through its motto "we open governments" and its location to be "everywhere". At the same time, we see a battle between major technology companies such as Apple trying to make more secure products and to protect customer data, while at the same time governments moving to restrict and decrypt new secure encryption technologies. Meanwhile, the market for security vulnerabilities grows with computer security experts able to sell software vulnerabilities from key technologies such as Apple and Google from $10,000 to $1.5 million dollars. Security activism is on the rise. Ethical Hacking is the non-violent use of a technology in pursuit of a cause, political or otherwise which is often legally and morally ambiguous. Ethical hacking may involve the acts of professional penetration intrusion testers and computer security experts, as other forms of emerging actions such as hacktivism and online civil disobedience. Increasingly, Hacktivism is a form of ethical hacking and also a form of civil rights activism in the digital age. Hacktivists believe in two general but spirited principles: respect for human rights and fundamental freedoms including freedom of expression and personal privacy, and the responsibility of government to be open, transparent and fully accountable to the public. In practice, however, hacktivists are as diverse in their backgrounds as they are in their agendas. How courts and governments will deal with hacking attempts which operate in a grey zone of the law and where different ethical views collide remains to be seen, as there are no exceptions to the cybercrime/computer crime provisions for security research or public interest in most jurisdictions around the globe. It will be equally difficult to determine how civil rights will apply to hacktivism. A fundamental discussion of key societal questions."-- Provided by publisher.
Item type:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Home library Collection Call number Materials specified Status Date due Barcode
Electronic-Books Electronic-Books OPJGU Sonepat- Campus E-Books EBSCO Available

Includes bibliographical references.

Why Ethical Hacking? -- Essential Terms and Concepts -- Methodology and Quantitative Studies of Ethical Hacking: Evidence-Based Decision and Policy-Making -- Legal Cases Around the World (with Jelena Ardalic) -- Select Ethical-Hacking Incidences: Anonymous -- Select Ethical-Hacking Incidences: Chaos Computer Club, CyberBerkut, Lulzsec, Iranian Cyber Army, and Others -- Online Civil Disobedience -- Hacktivism -- Penetration/Intrusion Testing and Vulnerability Disclosure -- Counterattack/Hackback -- Security Activism -- Ethical-Hacking Challenges in Legal Frameworks, Investigation, Prosecution, and Sentencing -- Ethical Hacking, Whistle-Blowing, and Human Rights and Freedoms -- Toward an Ethical-Hacking Framework.

"The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments. The line of transparency is moving by force. The twitter page for Wikileaks demonstrates this ethos through its motto "we open governments" and its location to be "everywhere". At the same time, we see a battle between major technology companies such as Apple trying to make more secure products and to protect customer data, while at the same time governments moving to restrict and decrypt new secure encryption technologies. Meanwhile, the market for security vulnerabilities grows with computer security experts able to sell software vulnerabilities from key technologies such as Apple and Google from $10,000 to $1.5 million dollars. Security activism is on the rise. Ethical Hacking is the non-violent use of a technology in pursuit of a cause, political or otherwise which is often legally and morally ambiguous. Ethical hacking may involve the acts of professional penetration intrusion testers and computer security experts, as other forms of emerging actions such as hacktivism and online civil disobedience. Increasingly, Hacktivism is a form of ethical hacking and also a form of civil rights activism in the digital age. Hacktivists believe in two general but spirited principles: respect for human rights and fundamental freedoms including freedom of expression and personal privacy, and the responsibility of government to be open, transparent and fully accountable to the public. In practice, however, hacktivists are as diverse in their backgrounds as they are in their agendas. How courts and governments will deal with hacking attempts which operate in a grey zone of the law and where different ethical views collide remains to be seen, as there are no exceptions to the cybercrime/computer crime provisions for security research or public interest in most jurisdictions around the globe. It will be equally difficult to determine how civil rights will apply to hacktivism. A fundamental discussion of key societal questions."-- Provided by publisher.

Online resource; title from digital title page (viewed on May 17, 2019).

eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - Worldwide

There are no comments on this title.

to post a comment.

O.P. Jindal Global University, Sonepat-Narela Road, Sonepat, Haryana (India) - 131001

Send your feedback to glus@jgu.edu.in

Hosted, Implemented & Customized by: BestBookBuddies   |   Maintained by: Global Library