Professional Documents
Culture Documents
Hacking
J.SAITEJA
Overview of Unit
This unit will focus on ethical hacking:
attack strategies and techniques, and their
countermeasures
Delivery:
1 lecture and 1 seminar or workshop per
week
Assessment:
Coursework and examination
Assumptions
Completion of year 1 only
Michael Jones
Hacking
Originally hackers were seen as:
Tinkering with software systems
Amateurs
Michael Jones
Hats
Based on old-style western films
White hats
The good guys ethical hackers
Black hats
The bad guys
Michael Jones
Michael Jones
Technical:
E.g., penetration testing
Social
E.g., why people do it?
Sources
Practical experience
Research: academic articles, white papers,
websites, blogs
Michael Jones
Required skills:
Communication, technical, collaboration
Michael Jones
Michael Jones
Hacker Subtypes
Main subtypes: technical, social
Access hackers
Will focus on ways to gain access
Subtypes: system, network, application
Malicious hackers
Will focus on ways to modify or destroy
Subtypes: network DoS, virus writers
Malicious hackers
Providing modification mechanisms e.g.,
DDoS, viruses
Factors
Acting as go-betweens with potential
clients
Michael Jones
10
A Case Study
In the UK, the biggest betting event
is the Grand National
In the weeks before the event,
betting websites receive threats to
their sites:
E.g., DDoS attack threatened blackmail
Michael Jones
11
MMO
Means
Motive
Opportunity
In terms of the Internet, are means
and opportunity relevant?
Michael Jones
12
Michael Jones
13
14
Modify theory
Hypothesis
Data Gathering
and Analysis
Experiment
The V Model of Scientific Method
Michael Jones
15
16
Hypothesis creation:
Identifying and exploring the potential
approach
Experiment:
Creating doctored files that compromise the
system
Michael Jones
17
Deduction
Inferring a hypothesis from observed events
18
19
Summary
Hacking is concerned with accessing data
and systems to which the individual
would normally not have access
Hacking requires a scientific approach,
and is based on technical, social, and
collaborative skills
These skills can be employed in the
domains of ethical hacking and business
intelligence
Michael Jones
20