Narrow your search
Listing 1 - 6 of 6
Sort by

Book
Ethical Hacking
Author:
ISBN: 0776627929 0776627937 9780776627922 9780776627946 0776627945 9780776627939 0776627910 Year: 2019 Publisher: University of Ottawa Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

"The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments. The line of transparency is moving by force. The twitter page for Wikileaks demonstrates this ethos through its motto "we open governments" and its location to be "everywhere". At the same time, we see a battle between major technology companies such as Apple trying to make more secure products and to protect customer data, while at the same time governments moving to restrict and decrypt new secure encryption technologies. Meanwhile, the market for security vulnerabilities grows with computer security experts able to sell software vulnerabilities from key technologies such as Apple and Google from 10,000 to 1.5 million dollars. Security activism is on the rise. Ethical Hacking is the non-violent use of a technology in pursuit of a cause, political or otherwise which is often legally and morally ambiguous. Ethical hacking may involve the acts of professional penetration intrusion testers and computer security experts, as other forms of emerging actions such as hacktivism and online civil disobedience. Increasingly, Hacktivism is a form of ethical hacking and also a form of civil rights activism in the digital age. Hacktivists believe in two general but spirited principles: respect for human rights and fundamental freedoms including freedom of expression and personal privacy, and the responsibility of government to be open, transparent and fully accountable to the public. In practice, however, hacktivists are as diverse in their backgrounds as they are in their agendas. How courts and governments will deal with hacking attempts which operate in a grey zone of the law and where different ethical views collide remains to be seen, as there are no exceptions to the cybercrime/computer crime provisions for security research or public interest in most jurisdictions around the globe. It will be equally difficult to determine how civil rights will apply to hacktivism. A fundamental discussion of key societal questions."--


Digital
Disclosure of Security Vulnerabilities : Legal and Ethical Issues
Author:
ISBN: 9781447150046 Year: 2013 Publisher: London Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Much debate has been given as to whether computer security is improved through the full disclosure of security vulnerabilities versus keeping the problems private and unspoken.  Although there is still tension between those who feel strongly about the subject, a middle ground of responsible disclosure seems to have emerged.  Unfortunately, just as we’ve moved into an era with more responsible disclosure, it would seem that a market has emerged for security vulnerabilities and zero day exploits. Disclosure of Security Vulnerabilities: Legal and Ethical Issues considers both the ethical and legal issues involved with the disclosure of vulnerabilities and explores the ways in which law might respond to these challenges.


Book
Ethical hacking
Author:
ISBN: 9780776627915 Year: 2019 Publisher: [Ottawa] : University of Ottawa Press,


Book
Financial Cryptography and Data Security : FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers
Authors: --- --- --- --- --- et al.
ISBN: 3030544559 3030544540 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of two workshops held at the 24th International Conference on Financial Cryptography and Data Security, FC 2020, in Kota Kinabalu, Malaysia, in February 2020. The 39 full papers and 3 short papers presented in this book were carefully reviewed and selected from 73 submissions. The papers feature four Workshops: The 1st Asian Workshop on Usable Security, AsiaUSEC 2020, the 1st Workshop on Coordination of Decentralized Finance, CoDeFi 2020, the 5th Workshop on Advances in Secure Electronic Voting, VOTING 2020, and the 4th Workshop on Trusted Smart Contracts, WTSC 2020. The AsiaUSEC Workshop contributes an increase of the scientific quality of research in human factors in security and privacy. In terms of improving efficacy of secure systems, the research included an extension of graphical password authentication. Further a comparative study of SpotBugs, SonarQube, Cryptoguard and CogniCrypt identified strengths in each and refined the need for improvements in security testing tools. The CoDeFi Workshop discuss multi-disciplinary issues regarding technologies and operations of decentralized finance based on permissionless blockchain. The workshop consists of two parts; presentations by all stakeholders, and unconference style discussions. The VOTING Workshop cover topics like new methods for risk-limited audits, new ethods to increase the efficiency of mixnets, verification of security of voting schemes election auditing, voting system efficiency, voting system usability, and new technical designs for cryptographic protocols for voting systems, and new way of preventing voteselling by de-incentivising this via smart contracts. The WTSC Workshop focuses on smart contracts, i.e., self-enforcing agreements in the form of executable programs, and other decentralized applications that are deployed to and run on top of specialized blockchains.


Multi
Financial Cryptography and Data Security
Authors: --- --- --- --- --- et al.
ISBN: 9783030544553 Year: 2020 Publisher: Cham Springer International Publishing :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of two workshops held at the 24th International Conference on Financial Cryptography and Data Security, FC 2020, in Kota Kinabalu, Malaysia, in February 2020. The 39 full papers and 3 short papers presented in this book were carefully reviewed and selected from 73 submissions. The papers feature four Workshops: The 1st Asian Workshop on Usable Security, AsiaUSEC 2020, the 1st Workshop on Coordination of Decentralized Finance, CoDeFi 2020, the 5th Workshop on Advances in Secure Electronic Voting, VOTING 2020, and the 4th Workshop on Trusted Smart Contracts, WTSC 2020. The AsiaUSEC Workshop contributes an increase of the scientific quality of research in human factors in security and privacy. In terms of improving efficacy of secure systems, the research included an extension of graphical password authentication. Further a comparative study of SpotBugs, SonarQube, Cryptoguard and CogniCrypt identified strengths in each and refined the need for improvements in security testing tools. The CoDeFi Workshop discuss multi-disciplinary issues regarding technologies and operations of decentralized finance based on permissionless blockchain. The workshop consists of two parts; presentations by all stakeholders, and unconference style discussions. The VOTING Workshop cover topics like new methods for risk-limited audits, new ethods to increase the efficiency of mixnets, verification of security of voting schemes election auditing, voting system efficiency, voting system usability, and new technical designs for cryptographic protocols for voting systems, and new way of preventing voteselling by de-incentivising this via smart contracts. The WTSC Workshop focuses on smart contracts, i.e., self-enforcing agreements in the form of executable programs, and other decentralized applications that are deployed to and run on top of specialized blockchains.


Digital
Future Law : Emerging Technology, Regulation and Ethics
Authors: --- --- --- --- --- et al.
ISBN: 9781474417631 9781474417617 Year: 2022 Publisher: Edinburgh Edinburgh University Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Law

Listing 1 - 6 of 6
Sort by