Ethical hacking / / Alana Maurushat.

"The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments. The line of transparency is moving by force. The twitter page for Wikileaks demonstrates this ethos through its motto "we open governments" and its location to be &qu...

Full description

Saved in:
Bibliographic Details
VerfasserIn:
Place / Publishing House:Ottawa, Ontario : : University of Ottawa Press,, 2019.
Year of Publication:2019
Language:English
Series:Law, Technology and Media
Physical Description:1 online resource (267 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993655372404498
ctrlnum (CKB)4100000008039736
(MiAaPQ)EBC5751912
(DE-B1597)668152
(DE-B1597)9780776627922
(EXLCZ)994100000008039736
collection bib_alma
record_format marc
spelling Maurushat, Alana, author.
Ethical hacking / Alana Maurushat.
Ottawa, Ontario : University of Ottawa Press, 2019.
1 online resource (267 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Law, Technology and Media
Description based on print version record.
"The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments. The line of transparency is moving by force. The twitter page for Wikileaks demonstrates this ethos through its motto "we open governments" and its location to be "everywhere". At the same time, we see a battle between major technology companies such as Apple trying to make more secure products and to protect customer data, while at the same time governments moving to restrict and decrypt new secure encryption technologies. Meanwhile, the market for security vulnerabilities grows with computer security experts able to sell software vulnerabilities from key technologies such as Apple and Google from 10,000 to 1.5 million dollars. Security activism is on the rise. Ethical Hacking is the non-violent use of a technology in pursuit of a cause, political or otherwise which is often legally and morally ambiguous. Ethical hacking may involve the acts of professional penetration intrusion testers and computer security experts, as other forms of emerging actions such as hacktivism and online civil disobedience. Increasingly, Hacktivism is a form of ethical hacking and also a form of civil rights activism in the digital age. Hacktivists believe in two general but spirited principles: respect for human rights and fundamental freedoms including freedom of expression and personal privacy, and the responsibility of government to be open, transparent and fully accountable to the public. In practice, however, hacktivists are as diverse in their backgrounds as they are in their agendas. How courts and governments will deal with hacking attempts which operate in a grey zone of the law and where different ethical views collide remains to be seen, as there are no exceptions to the cybercrime/computer crime provisions for security research or public interest in most jurisdictions around the globe. It will be equally difficult to determine how civil rights will apply to hacktivism. A fundamental discussion of key societal questions."-- Provided by publisher.
Why ethical hacking? -- Essential terms and concepts -- Methodology and quantitative studies of ethical hacking : evidence-based decision and policy-making -- Legal cases around the world (with Jelena Ardalic) -- Select ethical-hacking incidences : anonymous -- Select ethical-hacking incidences : Chaos Computer Club, CyberBerkut, LulzSec, Iranian Cyber Army, and others -- Online civil disobedience -- Hacktivism -- Penetration/intrusion testing and vulnerability disclosure -- Counterattack/hackback -- Security activism -- Ethical-hacking challenges in legal frameworks, investigation, prosecution, and sentencing -- Ethical hacking, whistle-blowing, and human rights and freedoms -- Toward an ethical-hacking framework.
This eBook is made available Open Access under a CC BY-NC-ND 4.0 license: https://creativecommons.org/licenses/by-nc-nd/4.0 https://www.degruyter.com/dg/page/open-access-policy
Hacking United States Juvenile literature.
Anonymous.
Chaos Club.
Data Analytics.
Ethical Hacking.
Ethical hacking.
Hacktivism.
Human Rights.
Law.
Piratage éthique.
Policy.
activism.
activisme.
cause politique.
cybercrimes.
gouvernements ouverts.
hacktivism.
open government.
political cause.
transparence.
transparency.
0-7766-2791-0
language English
format eBook
author Maurushat, Alana,
spellingShingle Maurushat, Alana,
Ethical hacking /
Law, Technology and Media
Why ethical hacking? -- Essential terms and concepts -- Methodology and quantitative studies of ethical hacking : evidence-based decision and policy-making -- Legal cases around the world (with Jelena Ardalic) -- Select ethical-hacking incidences : anonymous -- Select ethical-hacking incidences : Chaos Computer Club, CyberBerkut, LulzSec, Iranian Cyber Army, and others -- Online civil disobedience -- Hacktivism -- Penetration/intrusion testing and vulnerability disclosure -- Counterattack/hackback -- Security activism -- Ethical-hacking challenges in legal frameworks, investigation, prosecution, and sentencing -- Ethical hacking, whistle-blowing, and human rights and freedoms -- Toward an ethical-hacking framework.
author_facet Maurushat, Alana,
author_variant a m am
author_role VerfasserIn
author_sort Maurushat, Alana,
title Ethical hacking /
title_full Ethical hacking / Alana Maurushat.
title_fullStr Ethical hacking / Alana Maurushat.
title_full_unstemmed Ethical hacking / Alana Maurushat.
title_auth Ethical hacking /
title_new Ethical hacking /
title_sort ethical hacking /
series Law, Technology and Media
series2 Law, Technology and Media
publisher University of Ottawa Press,
publishDate 2019
physical 1 online resource (267 pages)
contents Why ethical hacking? -- Essential terms and concepts -- Methodology and quantitative studies of ethical hacking : evidence-based decision and policy-making -- Legal cases around the world (with Jelena Ardalic) -- Select ethical-hacking incidences : anonymous -- Select ethical-hacking incidences : Chaos Computer Club, CyberBerkut, LulzSec, Iranian Cyber Army, and others -- Online civil disobedience -- Hacktivism -- Penetration/intrusion testing and vulnerability disclosure -- Counterattack/hackback -- Security activism -- Ethical-hacking challenges in legal frameworks, investigation, prosecution, and sentencing -- Ethical hacking, whistle-blowing, and human rights and freedoms -- Toward an ethical-hacking framework.
isbn 0-7766-2792-9
0-7766-2793-7
0-7766-2791-0
callnumber-first H - Social Science
callnumber-subject HV - Social Pathology, Criminology
callnumber-label HV6773
callnumber-sort HV 46773 M387 42019
genre_facet Juvenile literature.
geographic_facet United States
illustrated Not Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 360 - Social problems & social services
dewey-ones 364 - Criminology
dewey-full 364.168
dewey-sort 3364.168
dewey-raw 364.168
dewey-search 364.168
work_keys_str_mv AT maurushatalana ethicalhacking
status_str n
ids_txt_mv (CKB)4100000008039736
(MiAaPQ)EBC5751912
(DE-B1597)668152
(DE-B1597)9780776627922
(EXLCZ)994100000008039736
carrierType_str_mv cr
is_hierarchy_title Ethical hacking /
_version_ 1806512329902260225
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01216nam a2200313 i 4500</leader><controlfield tag="001">993655372404498</controlfield><controlfield tag="005">20200224115639.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">190510s2019 onc o 000 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-7766-2792-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-7766-2793-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9780776627922</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4100000008039736</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC5751912</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)668152</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)9780776627922</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994100000008039736</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">n-us---</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxc</subfield><subfield code="c">CA</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6773</subfield><subfield code="b">.M387 2019</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">LAW099000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.168</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Maurushat, Alana,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ethical hacking /</subfield><subfield code="c">Alana Maurushat.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ottawa, Ontario :</subfield><subfield code="b">University of Ottawa Press,</subfield><subfield code="c">2019.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (267 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Law, Technology and Media</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on print version record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments. The line of transparency is moving by force. The twitter page for Wikileaks demonstrates this ethos through its motto "we open governments" and its location to be "everywhere". At the same time, we see a battle between major technology companies such as Apple trying to make more secure products and to protect customer data, while at the same time governments moving to restrict and decrypt new secure encryption technologies. Meanwhile, the market for security vulnerabilities grows with computer security experts able to sell software vulnerabilities from key technologies such as Apple and Google from 10,000 to 1.5 million dollars. Security activism is on the rise. Ethical Hacking is the non-violent use of a technology in pursuit of a cause, political or otherwise which is often legally and morally ambiguous. Ethical hacking may involve the acts of professional penetration intrusion testers and computer security experts, as other forms of emerging actions such as hacktivism and online civil disobedience. Increasingly, Hacktivism is a form of ethical hacking and also a form of civil rights activism in the digital age. Hacktivists believe in two general but spirited principles: respect for human rights and fundamental freedoms including freedom of expression and personal privacy, and the responsibility of government to be open, transparent and fully accountable to the public. In practice, however, hacktivists are as diverse in their backgrounds as they are in their agendas. How courts and governments will deal with hacking attempts which operate in a grey zone of the law and where different ethical views collide remains to be seen, as there are no exceptions to the cybercrime/computer crime provisions for security research or public interest in most jurisdictions around the globe. It will be equally difficult to determine how civil rights will apply to hacktivism. A fundamental discussion of key societal questions."--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Why ethical hacking? -- Essential terms and concepts -- Methodology and quantitative studies of ethical hacking : evidence-based decision and policy-making -- Legal cases around the world (with Jelena Ardalic) -- Select ethical-hacking incidences : anonymous -- Select ethical-hacking incidences : Chaos Computer Club, CyberBerkut, LulzSec, Iranian Cyber Army, and others -- Online civil disobedience -- Hacktivism -- Penetration/intrusion testing and vulnerability disclosure -- Counterattack/hackback -- Security activism -- Ethical-hacking challenges in legal frameworks, investigation, prosecution, and sentencing -- Ethical hacking, whistle-blowing, and human rights and freedoms -- Toward an ethical-hacking framework.</subfield></datafield><datafield tag="540" ind1=" " ind2=" "><subfield code="a">This eBook is made available Open Access under a CC BY-NC-ND 4.0 license: </subfield><subfield code="u">https://creativecommons.org/licenses/by-nc-nd/4.0 </subfield><subfield code="u">https://www.degruyter.com/dg/page/open-access-policy</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hacking</subfield><subfield code="z">United States</subfield><subfield code="v">Juvenile literature.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Anonymous.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Chaos Club.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Data Analytics.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Ethical Hacking.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Ethical hacking.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hacktivism.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Human Rights.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Law.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Piratage éthique.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Policy.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">activism.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">activisme.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cause politique.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cybercrimes.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">gouvernements ouverts.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">hacktivism.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">open government.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">political cause.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">transparence.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">transparency.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">0-7766-2791-0</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2024-03-13 02:55:19 Europe/Vienna</subfield><subfield code="f">System</subfield><subfield code="c">marc21</subfield><subfield code="a">2019-05-04 22:02:20 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5353611530004498&amp;Force_direct=true</subfield><subfield code="Z">5353611530004498</subfield><subfield code="b">Available</subfield><subfield code="8">5353611530004498</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5357039760004498&amp;Force_direct=true</subfield><subfield code="Z">5357039760004498</subfield><subfield code="b">Available</subfield><subfield code="8">5357039760004498</subfield></datafield></record></collection>