frontend/ultimo/default/template/page/1column.phtml
frontend/ultimo/uop/template/page/html/head.phtml
Ethical Hacking - University of Ottawa Press
frontend/base/default/template/page/js/cookie.phtml
frontend/base/default/template/directory/js/optional_zip_countries.phtml
frontend/base/default/template/googleanalytics/ga.phtml
frontend/ultimo/default/template/page/html/head_theme_css.phtml
frontend/base/default/template/creareseo/social/social.phtml
frontend/base/default/template/creareseo/google/googletagmanager.phtml
frontend/base/default/template/creareseo/social/schema.phtml
frontend/base/default/template/creareseo/logo/schema.phtml
frontend/base/default/template/creareseo/business/schema.phtml
frontend/base/default/template/creareseo/product/schema.phtml
frontend/base/default/template/page/html/notices.phtml
frontend/ultimo/uop/template/page/html/header.phtml

frontend/ultimo/uop/template/creareseo/page/html/breadcrumbs.phtml
frontend/base/default/template/ebizmarts/mailchimp/popup/emailcatcher.phtml
frontend/base/default/template/ebizmarts/mailchimp/popup/emailcatcher.phtml
frontend/ultimo/uop/template/catalog/product/view.phtml
frontend/base/default/template/core/formkey.phtml
frontend/ultimo/uop/template/infortis/cloudzoom/product/view/media.phtml

Ethical Hacking

frontend/ultimo/default/template/infortis/cloudzoom/product/view/lightbox_config.phtml

Ethical Hacking

By Alana Maurushat

368 Pages · 9x6 · April 9 2019

Paper ISBN: 9780776627915

frontend/base/default/template/cataloginventory/qtyincrements.phtml
frontend/ultimo/uop/template/catalog/product/view/type/grouped.phtml

Availability: In stock

Product Name Price Qty
Paper
frontend/ultimo/uop/template/catalog/product/price.phtml
39.95 $ CA
frontend/base/default/template/catalog/product/view/tierprices.phtml
-
+
frontend/base/default/template/catalog/product/view/tierprices.phtml
frontend/ultimo/uop/template/catalog/product/view/addto.phtml
frontend/ultimo/uop/template/catalog/product/view/addtocart.phtml
Request an Examination copy Request a Desk copy
frontend/ultimo/default/template/infortis/brands/brand.phtml

Description

How will governments and courts protect civil liberties in this new era of hacktivism? Ethical Hacking discusses the attendant moral and legal issues. The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments and the line of transparency moved by force. One need only read the motto “we open governments” on the Twitter page for Wikileaks to gain a sense of the sea change that has occurred.

Ethical hacking is the non-violent use of a technology in pursuit of a cause—political or otherwise—which is often legally and morally ambiguous. Hacktivists believe in two general but spirited principles: respect for human rights and fundamental freedoms, including freedom of expression and personal privacy; and the responsibility of government to be open, transparent and fully accountable to the public.

How courts and governments will deal with hacking attempts which operate in a grey zone of the law and where different ethical views collide remains to be seen. What is undisputed is that Ethical Hacking presents a fundamental discussion of key societal questions.

A fundamental discussion of key societal questions.

This book is published in English.

-

La première moitié du XXIe siècle sera sans doute reconnue comme l’époque où le piratage éthique a ouvert de force les gouvernements, déplaçant les limites de la transparence. La page twitter de Wikileaks enchâsse cet ethos à même sa devise, « we open governments », et sa volonté d’être omniprésent. En parallèle, les grandes sociétés de technologie comme Apple se font compétition pour produire des produits de plus en plus sécuritaires et à protéger les données de leurs clients, alors même que les gouvernements tentent de limiter et de décrypter ces nouvelles technologies d’encryption. 

Entre-temps, le marché des vulnérabilités en matière de sécurité augmente à mesure que les experts en sécurité informatique vendent des vulnérabilités de logiciels des grandes technologies, dont Apple et Google, contre des sommes allant de 10 000 à 1,5 million de dollars. L’activisme en sécurité est à la hausse. 

Le piratage éthique est l’utilisation non-violence d’une technologie quelconque en soutien d’une cause politique ou autre qui est souvent ambigue d’un point de vue juridique et moral. Le hacking éthique peut désigner les actes de vérification de pénétration professionnelle ou d’experts en sécurité informatique, de même que d’autres formes d’actions émergentes, comme l’hacktivisme et la désobéissance civile en ligne.

L’hacktivisme est une forme de piratage éthique, mais également une forme de militantisme des droits civils à l’ère numérique. En principe, les adeptes du hacktivisme croient en deux grands principes : le respect des droits de la personne et les libertés fondamentales, y compris la liberté d’expression et à la vie privée, et la responsabilité des gouvernements d’être ouverts, transparents et pleinement redevables au public.

En pratique, toutefois, les antécédents comme les agendas des hacktivistes sont fort diversifiés. Il n’est pas clair de quelle façon les tribunaux et les gouvernements traiteront des tentatives de piratage eu égard aux zones grises juridiques, aux approches éthiques conflictuelles, et compte tenu du fait qu’il n’existe actuellement, dans le monde, presque aucune exception aux provisions, en matière de cybercrime et de crime informatique, liées à la recherche sur la sécurité ou l’intérêt public. Il sera également difficile de déterminer le lien entre hacktivisme et droits civils.

Ce livre est publié en anglais.

Chapter I: Why Ethical Hacking?
1.1 You
1.2 Me
1.3 Ethical Hacking

Chapter II: Essential Terms and Concepts
2.1 Types of Ethical Hackers
2.2 Definitions and Typology of Ethical Hacking
2.3 Conventional Computer-Security-Threat Model
2.4 Common Methods Used in Ethical Hacking
2.5 Other Relevant Terms

Chapter III: Methodology and Quantitative Studies of Ethical Hacking: Evidence-Based Decision and Policy-Making
3.1 Report for Public Safety Canada, 2011
3.2 Summary of Findings
3.3 GDELT Analysis Service—Event Data(with Kevin Kim)
3.4 Google’s BigQuery (with Richard Li)
3.5 Dark-Net Analysis of Malware and Cyber-Jihad Forums
3.5.1 Cyber-Jihad Forums (with Adrian Agius)
3.5.2 Hacking Forums (with Richard Li)
3.6 Observations

Chapter IV: Legal Cases Around the World (with Jelena Ardalic)

Chapter V: Select Ethical-Hacking Incidences: Anonymous

Chapter VI: Select Ethical-Hacking Incidences: Chaos Computer Club, CyberBerkut, LulzSec, Iranian Cyber Army, and Others

Chapter VII: Online Civil Disobedience
7.1 Online Civil Disobedience in Context
7.2 Timeline
7.3 Case Studies
7.3.1 Anonymous, Operation Titstorm
7.3.2 German Lufthansa Protest
7.3.3 Twitter #TellVicEverything Campaign
7.4 Observations

Chapter VIII: Hacktivism
8.1 Hacktivism in Context
8.2 Timelines
8.3 Case Studies
8.3.1 Anonymous, Post-Christmas Charity Donations
8.3.2 Neo-Nazi Website
8.3.3 WikiLeaks, Operation Payback
8.4 Observations

Chapter IX: Penetration/Intrusion Testing and Vulnerability Disclosure
9.1 Penetration Testing and Vulnerability Disclosure in Context
9.2 Timeline
9.3 Case Studies
9.3.1 Australian Security Expert Patrick Webster
9.3.2 Cisco Router9.3.3 LulzSec Hacking to Incentivize Sony to Fix Known Software Bugs
9.3.4 Guardians of Peace, North Korea, and the Sony Pictures Hack
9.3.5 Vulnerability Hunter Glenn Mangham
9.3.6 Da Jiang Innovation
9.4 Observations

Chapter X: Counterattack/Hackback
10.1 Counterattack/Hackback in Context
10.2 Case Studies
10.2.1 LulzSec, MasterCard and PayPal, and Barr
10.2.2 Illegal Streaming Link Sites
10.2.3 Automated Counter-DDoS
10.3 The Legalization of Hackback
10.4 Observations

Chapter XI: Security Activism
11.1 Security Activism in Context
11.2 Case Studies
11.2.1 Spamhaus Project
11.2.2 Spam Fighter
11.2.3 Botnet Removal Communities
11.2.4 Cyber-Security Researcher Y
11.3 Observations

Chapter XII: Ethical-Hacking Challenges in Legal Frameworks, Investigation, Prosecution, and Sentencing
12.1 Criminal Landscape: Convention on Cybercrime and the Canadian Criminal Framework
12.2 Attribution
12.3 Jurisdiction
12.4 Evidence
12.5 Integrity, Volatility of Evidence, and the Trojan-Horse Defence
12.6 Damages
12.7 Sentencing and Dealing with Mental Disorders—Addiction and Autism Spectrum (with PhD candidate Hannah Rappaport)
12.8 Observations

Chapter XIII: Ethical Hacking, Whistle-Blowing, and Human Rights and Freedoms
13.1 The Canadian Charter of Human Rights and Freedoms
13.2 Whistle-Blowing and Ethical Hacking
13.3 Observations 

Chapter XIV: Toward an Ethical-Hacking Framework
14.1 Ethical Hacking in Context
14.2 Encourage Legitimate Space for Virtual Protests
14.3 Guidelines and Policy
14.4 Code of Conduct for Hackback
14.5 Transparency of Government Engagement with Hackback
14.6 Security Research Exemption and Public-Interest Consideration
14.7 Concluding Remarks

Bibliography
Appendix: Interview Questions

Author Bio

Alana Maurushat Maurushat is Professor of Cybersecurity and Behaviour at Western Sydney Univeristy. She is also on the Board of Directors for the cybercrime investigation firm IFW Global.

frontend/ultimo/default/template/catalog/product/view/collateral.phtml
frontend/ultimo/default/template/catalog/product/view/tabs.phtml

Awards

frontend/ultimo/uop/template/catalog/product/view/awards.phtml

Reviews

frontend/ultimo/uop/template/catalog/product/view/press_reviews_en.phtml

Recensions

frontend/ultimo/uop/template/catalog/product/view/press_reviews_fr.phtml
frontend/base/default/template/catalog/product/view/additional.phtml
frontend/ultimo/uop/template/catalog/product/list/upsell.phtml
frontend/ultimo/uop/template/authors/books.phtml

Books by this Author

Ethical Hacking

Alana Maurushat

frontend/ultimo/uop/template/catalog/product/price.phtml
39.95 $ CA
frontend/base/default/template/catalog/msrp/popup.phtml
frontend/base/default/template/pagecache/cookie.phtml
frontend/ultimo/default/template/page/html/footer.phtml
frontend/ultimo/default/template/page/html/footer_theme_scripts.phtml
frontend/ultimo/uop/template/page/html/cookienotice.phtml
[profiler]
Memory usage: real: 26476544, emalloc: 25708008
Code ProfilerTimeCntEmallocRealMem