Listing 1 - 6 of 6 |
Sort by
|
Choose an application
"The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments. The line of transparency is moving by force. The twitter page for Wikileaks demonstrates this ethos through its motto "we open governments" and its location to be "everywhere". At the same time, we see a battle between major technology companies such as Apple trying to make more secure products and to protect customer data, while at the same time governments moving to restrict and decrypt new secure encryption technologies. Meanwhile, the market for security vulnerabilities grows with computer security experts able to sell software vulnerabilities from key technologies such as Apple and Google from 10,000 to 1.5 million dollars. Security activism is on the rise. Ethical Hacking is the non-violent use of a technology in pursuit of a cause, political or otherwise which is often legally and morally ambiguous. Ethical hacking may involve the acts of professional penetration intrusion testers and computer security experts, as other forms of emerging actions such as hacktivism and online civil disobedience. Increasingly, Hacktivism is a form of ethical hacking and also a form of civil rights activism in the digital age. Hacktivists believe in two general but spirited principles: respect for human rights and fundamental freedoms including freedom of expression and personal privacy, and the responsibility of government to be open, transparent and fully accountable to the public. In practice, however, hacktivists are as diverse in their backgrounds as they are in their agendas. How courts and governments will deal with hacking attempts which operate in a grey zone of the law and where different ethical views collide remains to be seen, as there are no exceptions to the cybercrime/computer crime provisions for security research or public interest in most jurisdictions around the globe. It will be equally difficult to determine how civil rights will apply to hacktivism. A fundamental discussion of key societal questions."--
Hacking --- Computer hacking --- Computer programming --- Computer security --- Anonymous. --- Chaos Club. --- Data Analytics. --- Ethical Hacking. --- Ethical hacking. --- Hacktivism. --- Human Rights. --- Law. --- Piratage éthique. --- Policy. --- activism. --- activisme. --- cause politique. --- cybercrimes. --- gouvernements ouverts. --- hacktivism. --- open government. --- political cause. --- transparence. --- transparency.
Choose an application
Much debate has been given as to whether computer security is improved through the full disclosure of security vulnerabilities versus keeping the problems private and unspoken. Although there is still tension between those who feel strongly about the subject, a middle ground of responsible disclosure seems to have emerged. Unfortunately, just as we’ve moved into an era with more responsible disclosure, it would seem that a market has emerged for security vulnerabilities and zero day exploits. Disclosure of Security Vulnerabilities: Legal and Ethical Issues considers both the ethical and legal issues involved with the disclosure of vulnerabilities and explores the ways in which law might respond to these challenges.
Computer science --- Computer. Automation --- computers --- informatica --- computercriminaliteit --- computerkunde
Choose an application
Penetration testing (Computer security) --- Tests d'intrusion --- Hacking --- Piratage informatique --- Hackers --- Pirates informatiques --- Computer security --- Sécurité informatique --- Moral and ethical aspects. --- Aspect moral --- Legal status, laws, etc. --- Droit --- Law and legislation.
Choose an application
This book constitutes the refereed proceedings of two workshops held at the 24th International Conference on Financial Cryptography and Data Security, FC 2020, in Kota Kinabalu, Malaysia, in February 2020. The 39 full papers and 3 short papers presented in this book were carefully reviewed and selected from 73 submissions. The papers feature four Workshops: The 1st Asian Workshop on Usable Security, AsiaUSEC 2020, the 1st Workshop on Coordination of Decentralized Finance, CoDeFi 2020, the 5th Workshop on Advances in Secure Electronic Voting, VOTING 2020, and the 4th Workshop on Trusted Smart Contracts, WTSC 2020. The AsiaUSEC Workshop contributes an increase of the scientific quality of research in human factors in security and privacy. In terms of improving efficacy of secure systems, the research included an extension of graphical password authentication. Further a comparative study of SpotBugs, SonarQube, Cryptoguard and CogniCrypt identified strengths in each and refined the need for improvements in security testing tools. The CoDeFi Workshop discuss multi-disciplinary issues regarding technologies and operations of decentralized finance based on permissionless blockchain. The workshop consists of two parts; presentations by all stakeholders, and unconference style discussions. The VOTING Workshop cover topics like new methods for risk-limited audits, new ethods to increase the efficiency of mixnets, verification of security of voting schemes election auditing, voting system efficiency, voting system usability, and new technical designs for cryptographic protocols for voting systems, and new way of preventing voteselling by de-incentivising this via smart contracts. The WTSC Workshop focuses on smart contracts, i.e., self-enforcing agreements in the form of executable programs, and other decentralized applications that are deployed to and run on top of specialized blockchains.
Data encryption (Computer science). --- Computer organization. --- Data structures (Computer science). --- Computer security. --- Cryptology. --- Computer Systems Organization and Communication Networks. --- Data Structures and Information Theory. --- Systems and Data Security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Organization, Computer --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Protection --- Security measures --- Data encryption (Computer science)
Choose an application
This book constitutes the refereed proceedings of two workshops held at the 24th International Conference on Financial Cryptography and Data Security, FC 2020, in Kota Kinabalu, Malaysia, in February 2020. The 39 full papers and 3 short papers presented in this book were carefully reviewed and selected from 73 submissions. The papers feature four Workshops: The 1st Asian Workshop on Usable Security, AsiaUSEC 2020, the 1st Workshop on Coordination of Decentralized Finance, CoDeFi 2020, the 5th Workshop on Advances in Secure Electronic Voting, VOTING 2020, and the 4th Workshop on Trusted Smart Contracts, WTSC 2020. The AsiaUSEC Workshop contributes an increase of the scientific quality of research in human factors in security and privacy. In terms of improving efficacy of secure systems, the research included an extension of graphical password authentication. Further a comparative study of SpotBugs, SonarQube, Cryptoguard and CogniCrypt identified strengths in each and refined the need for improvements in security testing tools. The CoDeFi Workshop discuss multi-disciplinary issues regarding technologies and operations of decentralized finance based on permissionless blockchain. The workshop consists of two parts; presentations by all stakeholders, and unconference style discussions. The VOTING Workshop cover topics like new methods for risk-limited audits, new ethods to increase the efficiency of mixnets, verification of security of voting schemes election auditing, voting system efficiency, voting system usability, and new technical designs for cryptographic protocols for voting systems, and new way of preventing voteselling by de-incentivising this via smart contracts. The WTSC Workshop focuses on smart contracts, i.e., self-enforcing agreements in the form of executable programs, and other decentralized applications that are deployed to and run on top of specialized blockchains.
Computer architecture. Operating systems --- Computer. Automation --- computers --- informatica --- computerbeveiliging
Choose an application
Listing 1 - 6 of 6 |
Sort by
|