SlideShare a Scribd company logo
The Infamous Hacker and
Society’s perspective
Randi Lovelett
What is a Hacker?
• A Hacker is a person that “tests the limitations
of information systems out of intellectual
curiosity-to see whether they can gain access and
how far they can go”. (Reynolds, 2014, p. 96)
▫ Contain at least a basic understanding of
information systems and security features.
▫ Motivation comes from desire to learn more.
Hackers and popular culture
• Popular culture has many different views about hackers:
▫ Some people "hail them as the heroes of the computer revolution“
▫ Others see them as the demons that stole their credit card
information
▫ They are referred by Janet Murray as the "one of the great
creative wellsprings of our time, causing the inanimate circuits to
sing with ever more individualized and quirky voices“
• In an article by Svetlana Nikitina, hackers are compared
to tricksters of mythology on a number of levels
▫ Trickers were known to “defy definition”, as do hackers.
▫ They both work to break boundaries.
▫ They both challenge us to be “be prepared for deceit and pranks”
as a part of their creative abilities.
(Nikitina, 2012)
Hackers vs. Crackers
Hackers Crackers
• Desire to test limits of
security systems.
• May also desire to gain
publicity.
• Motivated by desire to
learn more.
• Hack systems for to point
out vulnerabilities.
• Defined as hackers with
the intention of causing
trouble.
• Desire to test limits of
security systems.
• But also desire to steal
data, corrupt systems and
cause other problems.
• Hack systems for
personal gain.
(“What is Hacker?”)
So… what are they?
• Because of the misunderstandings of what hackers are
defined as, no one knows what to think of them.
▫ The mass media portrays them as malevolent rebels, adding to
their negative connotation.
 But really they misuse the term “hacker”. Instead they should be using
the term “cracker”.
▫ The Merriam-Webster Dictionary defines hackers as:
 “a person who is inexperienced or unskilled at a particular activity”
 “an expert at programming and solving problems with a computer.”
 These two very contradictory definitions contribute to the
misconceptions about hackers and their abilities.
(Nikitina, 2012)
Anonymous
• A widely known, loosely organized hacktivist
group created to promote free speech, free
access to information, and transparency of
government activities. (“What is Anonymous?”, 2015)
▫ Known for their hacks against governments world-
wide and against large corporations like Sony.
• Use computer hacking as their main tool
▫ But also use social media and organized street
protests to achieve their goals.
(Goode, 2015)
Anonymous continued…
• Was first known for playing pranks, but has
become more political and serious in recent
years. (“What is Anonymous?”, 2015)
▫ Commonly seen as cyberterrorists by governments
• Became one of the leading forces behind the
hacktivist movement in the 21st century.
▫ But they gave hackers a bad name through their
hypocritical ideals.
 Ex: promoting free speech by taking down websites.
(Goode, 2015)
The Hacker’s Perspective
• Studies have observed hacker’s cultural practices and
perceptions as technology evolves and as the cultural
view of hackers have changed.
▫ Especially after events like the Target hack of 2013.
• Society’s perspective towards hackers has become more
and more negative over time as personal privacy has
become an issue.
• Recently, a man named Steven Levy researched hacker
perspectives on surveillance and privacy and published
his findings in his book: Hackers: Heroes of the
Computer Revolution.
(Steinmetz, 2015)
Hacker Ethics
• The hacker ethic can be viewed as a particular
ontological perspective adopted by members of the
hacking subculture
• According to Steven Levy, hackers believe that:
1. Access to computers should be unlimited and total
 Provides the opportunity to take things apart and
possibly improve them
2. All information should be free
3. Mistrust authority-promote decentralization of
bureaucracies
 Deemed to be flawed systems because of the
boundaries they have to accessing information
(Steinmetz, 2015)
Hacker Ethics Continued
4. Hackers should be judged only by their hacking
abilities
 Not by age, sex, race, or position. Only by skill.
5. You can create art and beauty on a computer
6. Computers can change your life for the better
 They believe that computers have enriched our
lives and granted humans to turn dreams into
reality.
• Essentially, hackers love and promote freedom and
easy access to information.
(Steinmetz, 2015)
Conclusion
• Hackers have developed a negative connotation over the
years as technology and the concern for privacy have
grown.
▫ The group Anonymous and the media have contributed to
that.
• Most hackers are often mistaken for their “cracker”
counterparts, whom are hackers with malicious intent.
• Commonly seen as unethical people, when really hackers
have their own “ethical code” that goes against the
Computer Ethics Institute’s Computer Ethic code.
• Only through the development of technology and
concrete privacy policies can it be determined if hackers
are indeed good or bad to society.
References
Goode, L. (2015). Anonymous and the Political Ethos of Hacktivism. Popular Communication, 13(1),
74-86. doi:10.1080/15405702.2014.978000
NIKITINA, S. (2012). Hackers as Tricksters of the Digital Age: Creativity in Hacker Culture. Journal Of
Popular Culture, 45(1), 133-152. doi:10.1111/j.1540-5931.2011.00915.x
Reynolds, G. (2014). Ethics in Information Technology (5th ed.). Cengage Learning.
Steinmetz, K., & Gerber, J. (2015). "It Doesn't Have to Be This Way": Hacker Perspectives on Privacy.
Social Justice, 41(3), 29-51.
What is Anonymous? - Definition from WhatIs.com. (2015, November). Retrieved July 06, 2016, from
http://whatis.techtarget.com/definition/Anonymous
What is hacker? - Definition from WhatIs.com. (n.d.). Retrieved July 06, 2016, from
http://searchsecurity.techtarget.com/definition/hacker

More Related Content

What's hot

Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
Pukhraj Singh
 
Judgement Day - Slovakia
Judgement Day  - SlovakiaJudgement Day  - Slovakia
Judgement Day - Slovakia
OCTF Industry Engagement
 
Raab festival of ideas presentation 2015+logo(1)
Raab festival of ideas presentation 2015+logo(1)Raab festival of ideas presentation 2015+logo(1)
Raab festival of ideas presentation 2015+logo(1)
Alex Dunedin
 
What is cyber crime ppoint
What is cyber crime ppointWhat is cyber crime ppoint
What is cyber crime ppointatkinsondf
 
Intro
IntroIntro
Intro
Kalkey
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
penetration Tester
 
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Pukhraj Singh
 
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan SiberID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
IGF Indonesia
 
Hacking
HackingHacking
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniques
Klaus Drosch
 
F2C12: Vint Cerf
F2C12: Vint CerfF2C12: Vint Cerf
F2C12: Vint Cerf
Freedom to Connect
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
Pukhraj Singh
 
Cs
CsCs
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
Pukhraj Singh
 
Gatekeepers Presentation B I L E T A
Gatekeepers  Presentation B I L E T AGatekeepers  Presentation B I L E T A
Gatekeepers Presentation B I L E T AEmily Laidlaw
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseAnonDownload
 
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random StrangerSocial engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
Steven Hatfield
 
Information Warfare
Information WarfareInformation Warfare
Information Warfare
Dibyendu Paul
 

What's hot (20)

Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
 
Judgement Day - Slovakia
Judgement Day  - SlovakiaJudgement Day  - Slovakia
Judgement Day - Slovakia
 
Raab festival of ideas presentation 2015+logo(1)
Raab festival of ideas presentation 2015+logo(1)Raab festival of ideas presentation 2015+logo(1)
Raab festival of ideas presentation 2015+logo(1)
 
What is cyber crime ppoint
What is cyber crime ppointWhat is cyber crime ppoint
What is cyber crime ppoint
 
Intro
IntroIntro
Intro
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj Singh
 
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan SiberID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
 
Hacking
HackingHacking
Hacking
 
Ka3118541860
Ka3118541860Ka3118541860
Ka3118541860
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniques
 
F2C12: Vint Cerf
F2C12: Vint CerfF2C12: Vint Cerf
F2C12: Vint Cerf
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
 
Cs
CsCs
Cs
 
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
 
Gatekeepers Presentation B I L E T A
Gatekeepers  Presentation B I L E T AGatekeepers  Presentation B I L E T A
Gatekeepers Presentation B I L E T A
 
Privacy vs Security
Privacy vs SecurityPrivacy vs Security
Privacy vs Security
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefense
 
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random StrangerSocial engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
 
Information Warfare
Information WarfareInformation Warfare
Information Warfare
 

Similar to Some Perspective on Hackers

The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
jwilso
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
whittemorelucilla
 
C3 Cyber
C3 CyberC3 Cyber
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
 
hacking
hackinghacking
hacking
mayank1293
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
Gautam708801
 
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxHackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docx
shericehewat
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816
Nicole Fields
 
Traditional Terrorists
Traditional TerroristsTraditional Terrorists
Traditional Terrorists
Christina Ramirez
 
nullcon 2010 - Underground Economy
nullcon 2010 - Underground Economynullcon 2010 - Underground Economy
nullcon 2010 - Underground Economy
n|u - The Open Security Community
 
Democracy2 IPMA Jan 12 2010
Democracy2 IPMA Jan 12 2010Democracy2 IPMA Jan 12 2010
Democracy2 IPMA Jan 12 2010
Roy King
 
hackers
hackershackers
hackers
Aya Eltayed
 
The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom Activism
University of Sydney
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its Discontents
Msifry
 
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdfBriefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
archanaemporium
 
Malwares
MalwaresMalwares
Malwares
Claire Medolla
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
CRS4 Research Center in Sardinia
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Muhammad Hamza
 

Similar to Some Perspective on Hackers (20)

The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
hacking
hackinghacking
hacking
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxHackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docx
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816
 
Hacking
HackingHacking
Hacking
 
Traditional Terrorists
Traditional TerroristsTraditional Terrorists
Traditional Terrorists
 
nullcon 2010 - Underground Economy
nullcon 2010 - Underground Economynullcon 2010 - Underground Economy
nullcon 2010 - Underground Economy
 
Democracy2 IPMA Jan 12 2010
Democracy2 IPMA Jan 12 2010Democracy2 IPMA Jan 12 2010
Democracy2 IPMA Jan 12 2010
 
hackers
hackershackers
hackers
 
The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom Activism
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its Discontents
 
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdfBriefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
 
Malwares
MalwaresMalwares
Malwares
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 

Some Perspective on Hackers

  • 1. The Infamous Hacker and Society’s perspective Randi Lovelett
  • 2. What is a Hacker? • A Hacker is a person that “tests the limitations of information systems out of intellectual curiosity-to see whether they can gain access and how far they can go”. (Reynolds, 2014, p. 96) ▫ Contain at least a basic understanding of information systems and security features. ▫ Motivation comes from desire to learn more.
  • 3. Hackers and popular culture • Popular culture has many different views about hackers: ▫ Some people "hail them as the heroes of the computer revolution“ ▫ Others see them as the demons that stole their credit card information ▫ They are referred by Janet Murray as the "one of the great creative wellsprings of our time, causing the inanimate circuits to sing with ever more individualized and quirky voices“ • In an article by Svetlana Nikitina, hackers are compared to tricksters of mythology on a number of levels ▫ Trickers were known to “defy definition”, as do hackers. ▫ They both work to break boundaries. ▫ They both challenge us to be “be prepared for deceit and pranks” as a part of their creative abilities. (Nikitina, 2012)
  • 4. Hackers vs. Crackers Hackers Crackers • Desire to test limits of security systems. • May also desire to gain publicity. • Motivated by desire to learn more. • Hack systems for to point out vulnerabilities. • Defined as hackers with the intention of causing trouble. • Desire to test limits of security systems. • But also desire to steal data, corrupt systems and cause other problems. • Hack systems for personal gain. (“What is Hacker?”)
  • 5. So… what are they? • Because of the misunderstandings of what hackers are defined as, no one knows what to think of them. ▫ The mass media portrays them as malevolent rebels, adding to their negative connotation.  But really they misuse the term “hacker”. Instead they should be using the term “cracker”. ▫ The Merriam-Webster Dictionary defines hackers as:  “a person who is inexperienced or unskilled at a particular activity”  “an expert at programming and solving problems with a computer.”  These two very contradictory definitions contribute to the misconceptions about hackers and their abilities. (Nikitina, 2012)
  • 6. Anonymous • A widely known, loosely organized hacktivist group created to promote free speech, free access to information, and transparency of government activities. (“What is Anonymous?”, 2015) ▫ Known for their hacks against governments world- wide and against large corporations like Sony. • Use computer hacking as their main tool ▫ But also use social media and organized street protests to achieve their goals. (Goode, 2015)
  • 7. Anonymous continued… • Was first known for playing pranks, but has become more political and serious in recent years. (“What is Anonymous?”, 2015) ▫ Commonly seen as cyberterrorists by governments • Became one of the leading forces behind the hacktivist movement in the 21st century. ▫ But they gave hackers a bad name through their hypocritical ideals.  Ex: promoting free speech by taking down websites. (Goode, 2015)
  • 8. The Hacker’s Perspective • Studies have observed hacker’s cultural practices and perceptions as technology evolves and as the cultural view of hackers have changed. ▫ Especially after events like the Target hack of 2013. • Society’s perspective towards hackers has become more and more negative over time as personal privacy has become an issue. • Recently, a man named Steven Levy researched hacker perspectives on surveillance and privacy and published his findings in his book: Hackers: Heroes of the Computer Revolution. (Steinmetz, 2015)
  • 9. Hacker Ethics • The hacker ethic can be viewed as a particular ontological perspective adopted by members of the hacking subculture • According to Steven Levy, hackers believe that: 1. Access to computers should be unlimited and total  Provides the opportunity to take things apart and possibly improve them 2. All information should be free 3. Mistrust authority-promote decentralization of bureaucracies  Deemed to be flawed systems because of the boundaries they have to accessing information (Steinmetz, 2015)
  • 10. Hacker Ethics Continued 4. Hackers should be judged only by their hacking abilities  Not by age, sex, race, or position. Only by skill. 5. You can create art and beauty on a computer 6. Computers can change your life for the better  They believe that computers have enriched our lives and granted humans to turn dreams into reality. • Essentially, hackers love and promote freedom and easy access to information. (Steinmetz, 2015)
  • 11. Conclusion • Hackers have developed a negative connotation over the years as technology and the concern for privacy have grown. ▫ The group Anonymous and the media have contributed to that. • Most hackers are often mistaken for their “cracker” counterparts, whom are hackers with malicious intent. • Commonly seen as unethical people, when really hackers have their own “ethical code” that goes against the Computer Ethics Institute’s Computer Ethic code. • Only through the development of technology and concrete privacy policies can it be determined if hackers are indeed good or bad to society.
  • 12. References Goode, L. (2015). Anonymous and the Political Ethos of Hacktivism. Popular Communication, 13(1), 74-86. doi:10.1080/15405702.2014.978000 NIKITINA, S. (2012). Hackers as Tricksters of the Digital Age: Creativity in Hacker Culture. Journal Of Popular Culture, 45(1), 133-152. doi:10.1111/j.1540-5931.2011.00915.x Reynolds, G. (2014). Ethics in Information Technology (5th ed.). Cengage Learning. Steinmetz, K., & Gerber, J. (2015). "It Doesn't Have to Be This Way": Hacker Perspectives on Privacy. Social Justice, 41(3), 29-51. What is Anonymous? - Definition from WhatIs.com. (2015, November). Retrieved July 06, 2016, from http://whatis.techtarget.com/definition/Anonymous What is hacker? - Definition from WhatIs.com. (n.d.). Retrieved July 06, 2016, from http://searchsecurity.techtarget.com/definition/hacker