HOW TO BECOME A LEGALISED CRIMINAL “ETHICAL HACKING”

Transcription

HOW TO BECOME A LEGALISED CRIMINAL “ETHICAL HACKING”
HOW TO BECOME A LEGALISED CRIMINAL
“ETHICAL HACKING”
The title of this article alone contains two oxymorons. How can criminality be legal
and is there such a thing as ethical or moral hacking? Many IT professionals have disliked the
term of “Ethical Hacker”, preferring IT Security Expert or some other such term. Part of the
controversy may arise from the older, less stigmatized,
definition of Hacker, which has since become
synonymous with the computer criminal. Some consider
that there is no such thing as ethics in hacking. However,
to be sure, it seems to make sense to employ, even
temporary, a person or company with the in-depth
knowledge and skills of the hacker to test the security,
vulnerability and resilience of their systems against the
threat of malicious sabotage, data or information theft
or, in the case of financial systems, actual money. Instances of Hacking can not only be
damaging, but if the occurrence becomes publically known, a public relations nightmare could
result, as accusations of irresponsibility and the loss of public confidence in the victim
organisation. Publically well-known companies, and governmental departments for that
matter, should take these threats, real or imagined, seriously as the consequences could be
far reaching, and for some organisations, financially devastating.
“Channel 4 is the latest media organization fell victim to the Syrian Electronic Army hacktivist
that target western media organizations. Channel 4 is a British public-service television
service.” 7th August 2013 – ehackingnews.com
The Channel 4 website had been using an outdated version of WordPress.
“Pakistan Google Hacked in November 2012 - Top Level Pakistan Domains displayed a
defacement page including Yahoo, MSN, HSBC, EBay,Paypal and other sites. Apparently
Google Pakistan has been defaced by a Turkish Hacker group 'Eboz'. It's still quite hard to
believe that a Google server has been hacked.” – ehackingnews.com
These threats are real and as previously stated potentially devastating, if not
embarrassing.
Another dilemma arises, with regards to employing an “expert” with the requisite
knowledge. For instance, in the CV does one list under work experience previous cybercrimes
successful committed? However, help is at hand. It is now possible to take specific courses in
“Ethical Hacking” offered by reputable organisations such as the International Council of eCommerce Consultants (eccouncil.org), or you can employ individuals already certified as
Ethical Hackers (CEH). You can study at an ATC (Accredited Training Centre) or even through
a self-study course to become a qualified Ethical Hacker (CEH).
Large organisations, such as IBM, often employ teams of Ethical Hackers who are
trusted to attempt to penetrate their networks and/or computer systems, using the same
methods as the hacker, for the purpose of finding and fixing computer security vulnerabilities
such as penetration testing.
Experts in the field of preventing hacking are in great demand, as CEOs and Managing
Directors see the potential threat to their businesses as serious. And because senior
management of organisations often have little knowledge of the technicalities of ICT, will
frequently apply the FUD Factor (“Fear, Uncertainty and Doubt”). Of course, the less
scrupulous IT consultants will leverage this fear to their financial advantage.
For those of us in the IT Industry, during the run up to the year 2000, know all too well
the FUD phenomena (I was a Global IT Manager during this period). The media hype around
the “Millennium Bug” was never ending, with claims that planes would drop out of the sky,
and in fact many planes were grounded at the time. This was a drama created by the IT
industry, since after all the pending arrival of the year 2000 wasn’t exactly a secret, so why
was there little or no apparent preparation in software development and operating systems
beforehand in a timely manner? Nevertheless, the culprits of the “Year 2000 Dooms Day”
scenario, the IT Industry, made a fortune in consultancy fees and compelled companies to pay
for expensive immediate software upgrades.
Some individuals (or groups) with hacking expertise might consider that hacking
should be used as a tool or weapon against organisations they consider to be “bad”. They
moralise and justify their actions to be ethical. Such “attacks” might be by groups against
globalisation, “Whistle Blowers” or worse could be classified as “Cyber-Terrorists” (and
considered highly criminal by the authorities). In its simplest form, which strictly speaking is
not hacking, is “Denial-of-Service”, whereby server(s) are overwhelmed by timed and
coordinated mass internet requests for service, sometimes using automated systems.
Therefore, the threats to our ICT systems are complex, multifaceted and external and internal,
and are now no longer restricted to our servers, networks and computers, but extending to
hand-held mobile devices. With the advent of Cloud computing potential new threats emerge
as we delegate our data security to third parties which operate trans-globally and transnationally (remember Pakistan Google). Can we really trust them with our private and
commercial data? And more recently, following the revelations made by the American
Edward Snowden, we now know the extent to which national governments access and read
our emails (personal and business), but the latter shouldn’t really surprise us, with the
technology available now, the temptation for
governments to access our private
correspondence and data, in the name of
The role for IT Security Experts
national security, is simply too great for them
and Ethical Hackers is expanding
to resist. The question is then, is this form of
“official” hacking ethical, even if it might be
technically legal?
In conclusion, the role for IT Security Experts and Ethical Hackers is expanding, and will
not doubt create new sub-branches of expertise with specialities in network security (physical
and radio), mobile security, websites, laptops, tablets, “Smart” cars and houses, and so on.
This work will always be in demand, and experts in the field will be required to constantly
update and adapt their knowledge and skills as new technologies emerge and new uses are
applied.
Prof. N A Browne is the Director of
Victoria Higher Education Campus, 498 R.A. De Mel Mawatha, Colombo 03.
(Working in collaboration with the University of Greenwich).