Dissertations / Theses on the topic 'Computer hackers'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 43 dissertations / theses for your research on the topic 'Computer hackers.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Wilmes, Justin Allen. "The Red Scare: The Evolution and Impact of Russian Computer Hackers." Miami University Honors Theses / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=muhonors1146055290.
Full textDalwadi, Chintan. "Network and data security." Birmingham, Ala. : University of Alabama at Birmingham, 2006. http://www.mhsl.uab.edu/dt/2006m/dalwadi.pdf.
Full textImhof, Robert. "Cyber crime and telecommunications law /." Online version of thesis, 2010. http://hdl.handle.net/1850/12268.
Full textRota, Andrea. "Hacking the Web 2.0 : user agency and the role of hackers as computational mediators." Thesis, London School of Economics and Political Science (University of London), 2016. http://etheses.lse.ac.uk/3313/.
Full textArtore, Diane. "Honeynet design and implementation." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/22614.
Full textHowell, Christian Jordan-Michael. "The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System." Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6259.
Full textOswald, Kathleen Frazer. "Hacking subject, subjecting hacking crisis in technoculture /." Click here for download, 2006. http://wwwlib.umi.com/cr/villanova/fullcit?p1432838.
Full textLevine, John G. (John Glenn). "A Methodology for Detecting and Classifying Rootkit Exploits." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5139.
Full textGupta, Nirbhay. "Determining the effectiveness of deceptive honeynets." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2003. https://ro.ecu.edu.au/theses/1303.
Full textKelly, Nicholas M. "The freedom of information hacked: console cowboys, computer wizards, and personal freedom in the digital age." Diss., University of Iowa, 2016. https://ir.uiowa.edu/etd/6778.
Full textLobo, Desmond. "Rapid identification of rootkit infections using data mining." Thesis, University of Ballarat, 2010. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/44308.
Full textDoctor of Philsophy
DiGiusto, Dennis Michael. "A protection motivation theory approach to home wireless network security in New Zealand establishing if groups of concerned wireless network users exist and exploring characteristics of behavioral intention : submitted to the School of Information Management, Victoria University of Wellington in partial fulfilment of the requirements for the degree of Master of Information Management /." ResearchArchive@Victoria e-Thesis, 2008. http://hdl.handle.net/10063/1148.
Full textBuys, Stephanus. "Log analysis aided by latent semantic mapping." Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1002963.
Full textLaTeX with hyperref package
Adobe Acrobat 9.54 Paper Capture Plug-in
Bilan, Carolina, and Carl Hedberg. "Säkerhetshot och lösningar för privatpersoner med bredband." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1491.
Full textPaulo, Luis Gonzaga de. "Um modelo complementar para aprimorar a segurança da informação no SDLC para dispositivos móveis: SDD - security driven development." Universidade Tecnológica Federal do Paraná, 2015. http://repositorio.utfpr.edu.br/jspui/handle/1/1895.
Full textThe increasingly wide and intense use of mobile devices - whose processing and storage capacity grows almost overcoming the desktops - exposes greatly issues relating to information security in this environment. This is a worrying fact. However, the models currently found in the literature and used by software industry in developing mobile applications with the highest information security requirements are not yet answering users’ needs for more security, and may be improved adding specific methods or techniques, sometimes already used in desktop - or not mobile ones - applications development. This work proposes to insert information security approach early in the software development life cycle using threats and vulnerabilities study, the early application of abuse case - also called misuse cases, the risk analysis, the risk based security test and the use of attack machines in the development process. To reach the research goal, this work analyzed usual models used on SDLC from the information security point of view, and presents a new approach thru the use of a security driven development complementary model. The work also presents some templates and uses a case study for apply the concepts and evaluate the main contributions discussed in the text, also as the preliminary results obtained on the research.
Almeida, Fernanda Albuquerque de. "Machinima: entre a narrativa e a experimentação." Universidade de São Paulo, 2014. http://www.teses.usp.br/teses/disponiveis/93/93131/tde-24042015-164451/.
Full textSince the first films accomplished in digital games in the 1990s, the concept of machinima has been associated to the conventions of classical cinema. Therewith, it fails to embrace the diversity of audiovisual works produced in real-time interactive virtual environments. Therefore, this study aims to contribute to a deepen comprehension of this concept through an interpretative analysis of its experimental films and also of the specific bibliography. It also intends to collaborate with its expansion as a communication and an artistic expression medium. First, it is aimed to evince the association of the idea of machinima with the classical cinema, through the presentation of the relevant films of its history and also through an interpretative analysis of the first theoretical publications. From this verification, the previous audiovisual practices and experimental movies accomplished in its first years are presented. Then, it is intended to demonstrate that the distance from narrative represented by the experimental works in machinima makes room for the identification of other features that may collaborate to a deepening understanding of its concept. Thus, the following features are presented and analyzed in relation to this idea: the performance, the intervention, and the record. This approximation is followed by the interpretative analysis of the films Formation (Difference and Repetition), by Baden Pailthorpe, 30 Seconds or More One Animation a Day, by Victor Morales, and Abstract Livecoded Machinima (Missile Command), by David Griffiths. By emphasizing the experimental works in machinima, the proposal of this study is to evince that there is a diversity of paths, between the narrative and the experimentation, to go through by the artists with machinima. Thus, its concept must include the plurality of these audiovisual productions.
Krutisch, Dorothee. "Strafbarkeit des unberechtigten Zugangs zu Computerdaten und -systemen /." Frankfurt am Main [u.a.] : Lang, 2004. http://www.gbv.de/dms/spk/sbb/recht/toc/376082763.pdf.
Full textOgbanufe, Obiageli. "Three Essays on Information Security Risk Management." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157576/.
Full textWithers, Kim. "A Psychosocial Behavioral Attribution Model: Examining the Relationship Between the “Dark Triad” and Cyber-Criminal Behaviors Impacting Social Networking Sites." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1072.
Full textKisakye, Alex. "An investigation into information security practices implemented by Research and Educational Network of Uganda (RENU) member institution." Thesis, Rhodes University, 2012. http://hdl.handle.net/10962/d1004748.
Full textTeX
Watkins, Trevor U. "Is Microsoft a Threat to National Security? Policy, Products, Penetrations, and Honeypots." Connect to resource online, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1244659206.
Full textOlofsson, Ammy. "Computer-human relation through glass : a part of the masters project “Growing Computers, Connecting Bodies, Cutting the Cord”." Thesis, Konstfack, Keramik & Glas, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:konstfack:diva-6287.
Full textRheinberg, Falko, and Nadine Tramp. "Anreizanalyse intensiver Freizeitnutzung von Computern : Hacker, Cracker und zweckorientierte Nutzer." Universität Potsdam, 2006. http://opus.kobv.de/ubp/volltexte/2008/1830/.
Full textУткіна, Марина Сергіївна, Марина Сергеевна Уткина, and Maryna Serhiivna Utkina. "Computer hacking - high-tech crime." Thesis, Сумський державний університет, 2012. http://essuir.sumdu.edu.ua/handle/123456789/42835.
Full textВ работе проанализированы преступления с использованием компьютеров несмотря на технический прогресс. Также определено понятие "хакер" и приведены пути, как защитить себя от хакеров.
The work analyzed crimes using computers in view of technical progress. Also the term "hacker" was given and there were defined ways to protect yourself from hackers.
Zadig, Sean M. "Understanding the Impact of Hacker Innovation upon IS Security Countermeasures." NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/976.
Full textRochefort, Guillaume. "Collaborative Chaos: Symbiotic Physical and Virtual Resistance to Pervasive Surveillance." Thesis, Université d'Ottawa / University of Ottawa, 2021. http://hdl.handle.net/10393/42183.
Full textPalmqvist, Stefan. "Social-engineering ett hot mot informationssäkerheten?" Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-1993.
Full textDen här rapporten tar upp ett annorlunda hot mot informationssäkerheten, som inte hårdvara
eller mjukvara kan stoppa. Detta hot kallas för social-engineering, och det som gör detta hot
farligt är att de anställda och chefer i en organisation, kan hjälpa utövaren av socialengineering
utan att de själva vet om det.
Det går inte att förhindra att dessa attacker sker, men man kan förhindra de negativa
konsekvenserna av en sådan attack. Denna rapport tar upp hur man ska göra för att en
organisation ska kunna fortsätta med sin verksamhet, efter en attack av social-engineering. I
värsta fall kan en attack av social-engineering innebära att ett företag aldrig återhämtar sig.
Detta kan bero på att organisationen har förlorat alla sina kunder, förlorat marknads andelar,
eller för att de ansvariga och viktiga personerna i organisationen har blivit dömda för
oaktsamhet och sitter i fängelse.
Denna rapport ska informera och få er att vara uppmärksamma och medvetna om dessa
hot, som ni kanske inte vet finns. Ni ska få kunskap och lära er känna igen de olika
förklädnaderna en utövare av social-engineering antar.
This paper discusses a different threat against information security, which can not be
prevented by either hardware or software. This Threat is called social engineering and the
main issue that makes this threat so dangerous is that the victims, like executives and the
employees in an organization are not aware that they actually helps the practician of social
engineering.
These attacks can not be avoided, but there is a way to prevent negative consequences of
such an attack. This paper discusses how an organization can manage to continue with the
activity, despite an attack of social engineering. In worse case the scenarios of an attack of
social engineering can mean that an organization never fully recovers. The different scenarios
of this can be as following. The organization could lose all the clients, they could have lost
market share or the responsible important people in the organization could be convicted and
sent to jail.
This paper will make you aware of these threats that you might even don’t know exists.
You will be given the knowledge to be able to recognize de different disguises a practician of
social engineering can assume.
Wallström, Andreas, and Mohammad-Ali Omer. "Implementing Security Techniques to Lower the Probability of IoT-devices Getting Hacked." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259359.
Full textIoT-säkerhet är ett fält med en allt mer ökad relevans i dagens samhälle i och med den exponentialla tillväxten av IoT-enheter. Det är viktigt att hitta metoder som kan göra IoT-enheter säkrare och är enkla att installera och använda. Den här rapporten undersöker hur effektiva geografiskt baserad IP-blockningar (GeoIP) och en begränsning i antalet tillåtna inloggningsförsök till en server (fail2ban) kan vara i att minska antalet lyckade attacker mot IoT-enheter. Genom att sätta upp honeypots med och utan de tidigare nämnda säkerhetsfunktionerna kunda vi samla data på hur de påverkade antalet attacker. Resultaten visade att GeoIP reducerade antalet med ungefär 93% och att fail2ban reducerade antalet med ungefär 99%. Framtida arbete inom detta fält kan vara att skapa en snabbare och mer simpel GeoIP modul och att försöka förstå hur dessa säkerhetstekniker kan påverka IoT-enheter i en större skala.
Ottosson, Henrik, and Per Lindquist. "Penetration testing for the inexperienced ethical hacker : A baseline methodology for detecting and mitigating web application vulnerabilities." Thesis, Linköpings universitet, Databas och informationsteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148581.
Full textAtt ha en gedigen metodologi för att försvara mot attacker är avgörande för att upprätthålla säkerheten i webbapplikationer, både vad gäller applikationen själv och dess användare. Penetrationstestning (eller etisk hacking) har länge varit en av de främsta metoderna för att upptäcka sårbarheter mot sådana attacker, men det är kostsamt och kräver stor personlig förmåga och kunskap. Eftersom denna expertis förblir i stor utsträckning individuell och odokumenterad, fortsätter industrin vara baserad på expertis. En brist på omfattande metodiker på nivåer som är tillgängliga för oerfarna etiska hackare är tydligt observerbar. Även om försök att automatisera processen har givit visst resultat är automatiserade verktyg ofta specifika för vissa typer av sårbarheter och lider av bristande flexibilitet. En tydlig, enkel och övergripande metodik som använder sig av automatiska sårbarhetsverktyg och kompletterande manuella metoder är därför nödvändig för att få till en grundläggande och heltäckande säkerhetsnivå. Denna masteruppsats beskriver konstruktionen av en sådan metodik. För att definiera metodologin genomfördes en litteraturstudie för att identifiera de typer av sårbarheter som är mest kritiska för webbapplikationer, samt tillämpligheten av automatiserade verktyg för var och en av dessa sårbarhetstyper. Verktygen i fråga testades mot olika befintliga applikationer, både mot avsiktligt sårbara, och sådana som var utvecklade med syfte att vara säkra. Metodiken konstruerades som en fyrstegsprocess: manuell granskning, sårbarhetstestning, riskanalys och rapportering. Vidare definierades sårbarhetstestningen som en iterativ process i tre delar: val av verkyg och metoder, sårbarhetsprovning och sårbarhetsverifiering. För att verifiera metodens tillräcklighet användes metoder såsom peer-review och fältexperiment.
Mazieres, Antoine Bernardo Marie. "Uma analise sociopolitica do movimento de software livre e de codigo aberto." [s.n.], 2009. http://repositorio.unicamp.br/jspui/handle/REPOSIP/279476.
Full textDissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Filosofia e Ciencias Humanas
Made available in DSpace on 2018-08-14T10:47:13Z (GMT). No. of bitstreams: 1 Mazieres_AntoineBernardoMarie_M.pdf: 1276055 bytes, checksum: fb566238c8de83cd0ddace38cae7b026 (MD5) Previous issue date: 2009
Resumo: Esta dissertação procura apresentar as significações políticas e culturais de um movimento de Software Livre e de Código Aberto (SL/CA) entendido como conjunto muito heterogêneo de comunidades e projetos. Ademais, a partir de um histórico do objeto "software" desde a sua origem, mostramos como ele foi diferenciado do hardware e depois encerrado como um objeto fechado pela companhias de software nascentes. Nesse contexto, o movimento SL/CA aparece tanto uma reação ao fenômeno de blackboxing, como uma continuação da tradição de compartilhamento de informações dentro da engenharia da computação. Por isso, estrutura-se ao redor de vários ramos da ética hacker e de seu agnosticismo político para constituir uma alternativa tecnológica concreta. Isto nos permite afirmar que as características sociopolíticas das comunidades do Software Livre devem ser procuradas no próprio ato de programar, na pragmática, como arte ou regulação. Dessa forma, estudamos os casos específicos de varias comunidades (gNewSense, Samba, BSD) para tentar sistematizar os seus posicionamentos tecnológicos e sociopolíticos a respeito do movimento tecnológico contemporâneo.
Abstract: This dissertation presents some political and cultural significations of a Free Software Movement, understood as a heterogeneous aggregation of projects and communities. Then, the historical analysis of the "software object" shows how it become, in the first place, differentiated from the hardware and, then, secondly, closed as an end- product by the rising software companies. In this context, the Free Software Movement presents itself as a reaction to blackboxing phenomena, as well as a continuation of the computater engineering tradition of sharing knowledge freely. Therefore, FS Movement has become structured through diverse blends of Hacker Ethic and its own political agnosticism, in order to build a concrete technological alternative. This leads to the argument that sociopolitical characteristics of Free Software communities should be found in the very act of programming, and in its pragmatics as an art or a regulation. Finally, specific cases of several communities (gNewSense, Samba, BSD) are examined in an attempt to systematize their sociopolitical and technological positions of the contemporary technological movement.
Mestrado
Mestre em Ciência Política
Gustafsson, Alexander. "Riskanalys inom intrångsäkerhet på webbplatser." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5377.
Full textPersson, Peter. "Säkerhetsanalys av plugin-kod till publiceringsplattformen WordPress." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-27529.
Full textNezirevic, Esmeralda. "Brandväggar för hemmakontor." Thesis, Jönköping University, School of Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-617.
Full textFirewalls protect network traffic and decide witch traffic to send further and witch traffic will be blocked. All this depends on the rules in the firewall. The firewall is installed between the internal network and the Internet. It is difficult to find a firewall that can protect us against different threats. Firewalls have both advantages and disadvantages and all this make them vulnerable. It is important to understand how the firewall protects the network and how to configure it. This paper gives the reader a clear idea how firewalls can protect against different attacks and improve the security.
Computers are not safe when connected to Internet. This paper is about how to use a personal firewall to protect a computer when connected to Internet. One of the firewalls in this examination is Norton Personal Firewall 2005.
Perkins, “Firewalls 24seven, 2nd Edition” and Brian Komar, Ronald Beekelaar and Joern Wettern “Firewalls for Dummies”. Information has also been collected from Apples home page.
It is important to have knowledge about different attacks against network traffic and also about how to protect against them. To know the risks is the first step to be able to evolve an own strategy; too defend network attack.
Breindl, Yana. "Hacking the law: an analysis of internet-based campaigning on digital rights in the European Union." Doctoral thesis, Universite Libre de Bruxelles, 2011. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/209836.
Full textThe belief in values of freedom, decentralisation, openness, creativity and progress inspires a particular type of activism, which promotes autonomy, participation and efficiency. The empirical evidence suggests that this set of principles can, at times, conflict with practices observed in the field. This has to do with the particular opportunity structure of the European Union and the characteristics of the movement. The EU favours functional integration of civil society actors who are expected to contribute technical and/or legal expertise. This configuration challenges internet-based protest networks that rely on highly independent and fluctuating engagement, and suffer from a lack of diversity and cohesion. The internet does not solve all obstacles to collective action. It provides, however, a networked infrastructure and tools for organising, coordinating and campaigning. Online and offline actions are not only supportive of each other. Internet-based campaigning can be successful once it reaches out beyond the internet, and penetrates the corridors of political institutions.
Doctorat en Information et communication
info:eu-repo/semantics/nonPublished
Gomez, Norberto Jr. "The Art of Perl: How a Scripting Language (inter)Activated the World Wide Web." VCU Scholars Compass, 2013. http://scholarscompass.vcu.edu/etd/472.
Full text"An effective methodology to traceback DDoS attackers." 2003. http://library.cuhk.edu.hk/record=b5891537.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 2003.
Includes bibliographical references (leaves 64-66).
Abstracts in English and Chinese.
Chapter 1 --- Introduction to Network Security via Efficient IP Traceback --- p.10
Chapter 1.1 --- Motivation --- p.10
Chapter 1.2 --- DDoS Attacker Traceback Problem --- p.11
Chapter 1.3 --- Document Roadmap --- p.13
Chapter 2 --- Background --- p.14
Chapter 2.1 --- Probabilistic Edge Marking Algorithm --- p.14
Chapter 2.1.1 --- Probabilistic Edge Marking Procedure --- p.15
Chapter 2.1.2 --- Attack Graph Construction Procedure --- p.17
Chapter 2.1.3 --- Advantages and Disadvantages of Algorithm --- p.19
Chapter 3 --- Attacker Traceback: Linear Topology --- p.22
Chapter 3.1 --- Determination of Local Traffic Rates --- p.23
Chapter 3.2 --- Determination of Minimum Stable Time tmin --- p.25
Chapter 3.3 --- Elimination of Attackers --- p.26
Chapter 4 --- Attacker Traceback: General Topology --- p.30
Chapter 4.1 --- Determination of Local Traffic Rates --- p.30
Chapter 4.2 --- Determination of Minimum Stable Time tmin --- p.33
Chapter 5 --- Simulations --- p.36
Chapter 5.1 --- Simulation 1 - Correctness and robustness of estimating the min- imum stable time tmin --- p.37
Chapter 5.1.1 --- Simulation l.A - Influence on tmin by different packet arrival processes --- p.37
Chapter 5.1.2 --- Simulation l.B - Influence on tmin by different packet arrival processes under MMPP --- p.38
Chapter 5.1.3 --- Simulation l.C - Influence on tmin and variance of traffic rate estimation by different pthreshold --- p.39
Chapter 5.2 --- Simulation 2 - Factors which influence the minimum stable time tmin --- p.40
Chapter 5.2.1 --- Simulation 2.A - Influence on tmin by different length of the attack path --- p.41
Chapter 5.2.2 --- Simulation 2.B - Influence on tmin by the relative posi- tions of the attackers --- p.42
Chapter 5.2.3 --- Simulation 2.C - Influence on tmin by different ATR and different length of the attack path --- p.43
Chapter 5.3 --- Simulation 3 - Extension to General Network Topology --- p.45
Chapter 5.3.1 --- Simulation 3.A - Influence on tmin by different ATR and different diameter of the network topology --- p.45
Chapter 5.3.2 --- Simulation 3.B - Influence on tmin by different number of attackers --- p.46
Chapter 5.4 --- Simulation 4 - Extension to Internet Topology --- p.47
Chapter 5.4.1 --- Simulation 4.A - Influence on tminby different diameter of the network topology --- p.49
Chapter 5.4.2 --- Simulation 4.B - Influence on tmin by different number of attackers --- p.50
Chapter 6 --- Experiments --- p.51
Chapter 6.1 --- Experiment 1: Simple DoS Attack --- p.53
Chapter 6.1.1 --- Experiment l.A - Influence on tmin by different types of DDoS attack --- p.54
Chapter 6.1.2 --- Experiment l.B - Influence on tmin by different length of the attack path --- p.55
Chapter 6.2 --- Experiment 2: Coordinated DoS Attack --- p.55
Chapter 6.2.1 --- Experiment 2.A - Influence on tmin by the relative posi- tions of the attackers --- p.56
Chapter 6.2.2 --- Experiment 2.B - Influence on tmin by different number of attackers --- p.58
Chapter 7 --- Related Work --- p.59
Chapter 8 --- Conclusion --- p.62
Bibliography --- p.64
Roos, Christiaan J. "Governance responses to hacking in the banking sector of South Africa : an exploratory study." Thesis, 2013. http://hdl.handle.net/10210/8642.
Full textOrganisations today are critically dependent on IT to enable business operations and ensure competitiveness in a growing international marketplace. At the same time, IT also introduces significant risks, such as hacking. The board of directors is ultimately responsible for mitigating IT risk as a component of business risk. This task is included in its corporate governance responsibilities, which, in the South African context, is underpinned by the King Code of Corporate Governance. The board of directors also plays a key role in identifying and enabling the most appropriate responses to IT risk, including hacking. This inevitably necessitates greater focus on and understanding of risks such as hacking. The determined and elusive nature of hackers makes them a significant threat to organisations today. Not only are hackers characterised by various profiles and motives, but they are also exceptionally skilled in exploiting weak security practices and software vulnerabilities, with attack techniques which range from non-technical social engineering to advanced technical attacks and exploits. Hackers are role-players in cybercrime and cyber warfare, as is evident from the media and information security survey results explored in this thesis, in particular within the banking sector, which is the financial backbone of the country. It is for this reason that the South African banking sector has been selected as the target population for this study. This study considers the meaning and nature of hacking, viewing it as either a risk or an event, which requires preventative or detective responses. The effect of hacking on business risks is explored next by identifying common business risks and common IT risks themes, where after the fundamental links between hacking and the IT risk themes are established. This study further argues that business risks are increased by IT risks, which implies that, by indirect association, business risks are increased by hacking. A response to this threat is required, in particular from a governance perspective, with the board of directors playing a fundamental role in supporting the appropriate responses. This study explores the advantages and disadvantages of various responses to hacking, highlighting the point that most traditional responses are not effective enough in fully mitigating the hacking threat. It is argued that ethical hacking is an effective response to the threat of hacking. The nature of ethical hacking is explored, including its objectives, motivation, advantages and disadvantages. The multi-faceted nature of the ethical hacking response is also considered. In order to explore the risks and responses to hacking in the banking sector in South Africa, an analysis of annual reports was conducted and two questionnaires were administered. The analysis of the annual reports of the 16 locally registered banks in South Africa highlighted differences in disclosure practices around IT risk, IT governance and hacking. This was followed by empirical testing in the local banking sector, by using a mixed-method approach in order to solicit mostly quantitative, but also qualitative, responses from company secretaries and individuals responsible for IT at the 16 locally registered banks. The results of the questionnaires indicated that the board of directors is not fully embracing its IT governance responsibilities and that IT matters are mostly dealt with by risk management committees at board level or IT steering committees at executive management level. The effect of IT risks on business risks such as human resource risk and physical risk is underestimated. Respondents were unclear about the effect of hacking on IT risks, such as IT human resource risk and lack of software development. The local banking sector is not fully aware of how hacking can affect organisations, and banks are not making enough use of ethical hacking as a response to the hacker threat. This is the first study of its kind to explore ethical hacking in the context of governance responses. The study breaks new ground by providing a unique in-depth analysis of the link between business risk, IT risk and hacking. It is also the first study into the various responses to hacking in the SA banking sector and will assist not only the banking industry but business at large in defining appropriate preventative and detective responses to hacking.
Almulhem, Ahmad. "Detection and analysis of connection chains in network forensics." Thesis, 2007. http://hdl.handle.net/1828/2474.
Full textLu, Zebin. "SECURE WEB APPLICATIONS AGAINST OFF-LINE PASSWORD GUESSING ATTACK: A TWO WAY PASSWORD PROTOCOL WITH CHALLENGE RESPONSE USING ARBITRARY IMAGES." 2013. http://hdl.handle.net/1805/3425.
Full textThe web applications are now being used in many security oriented areas, including online shopping, e-commerce, which require the users to transmit sensitive information on the Internet. Therefore, to successfully authenticate each party of web applications is very important. A popular deployed technique for web authentication is the Hypertext Transfer Protocol Secure (HTTPS) protocol. However the protocol does not protect the careless users who connect to fraudulent websites from being trapped into tricks. For example, in a phishing attack, a web user who connects to an attacker may provide password to the attacker, who can use it afterwards to log in the target website and get the victim’s credentials. To prevent phishing attacks, the Two-Way Password Protocol (TPP) and Dynamic Two-Way Password Protocol (DTPP) are developed. However there still exist potential security threats in those protocols. For example, an attacker who makes a fake website may obtain the hash of users’ passwords, and use that information to arrange offline password guessing attacks. Based on TPP, we incorporated challenge responses with arbitrary images to prevent the off-line password guessing attacks in our new protocol, TPP with Challenge response using Arbitrary image (TPPCA). Besides TPPCA, we developed another scheme called Rain to solve the same problem by dividing shared secrets into several rounds of negotiations. We discussed various aspects of our protocols, the implementation and experimental results.
Pritchard, Maritha. "The Gautrain : active communication research on the manifestations of the hacker ethic by citizen journalists." Thesis, 2010. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1001288.
Full textExplores the themes derived from the six tenets of the hacker ethic in blog posts about the Gautrain project over a one-year period. It also describes how citizen journalists express the six tenets of the hacker ethic when blogging about the Gautrain project.
Tekle, Solomon Mekonnen. "A Privacy-Preserving, Context-Aware, Insider Threat prevention and prediction model (PPCAITPP)." Thesis, 2018. http://hdl.handle.net/10500/25968.
Full textInformation Science
D. Phil. (Information Systems)
"A Hacker-Centric Perspective to Empower Cyber Defense." Doctoral diss., 2020. http://hdl.handle.net/2286/R.I.57382.
Full textDissertation/Thesis
Doctoral Dissertation Computer Science 2020
Ulrich, Neil. "Wetgewing teen elektroniese betreding." Diss., 1998. http://hdl.handle.net/10500/16234.
Full textParralel met die snelle groei van rekenaartegnologie en die groteiwordende rol wat rekenaars in ans alledaagse lewe speel, is daar ongelukkig 'n toename in die misbruik van rekenaars. Benewens die wyses om rekenaarmisbruik by wyse van remedies in die siviele reg aan te spreek, is dit hoofsaaklik die taak van die strafreg om sodanige misbruik te kriminaliseer en deur middel van straf sulke misbruik te voorkom en oortreders af te skrik. Uit 'n ontleding van die Suid-Afrikaanse strafreg het dit geblyk dat bestaande misdrywe, beide gemeenregtelik en statuter, nie voldoende rekenaarmisbruik kan kriminaliseer en aanspreek nie. Wetgewing blyk die mees gepaste optossing te wees. Uit 'n regsvergelykende studie van die hantering van rekenaarmisbruik in jurisdiksies waar die wetgewer verskillende benaderings toegepas het, het dit geblyk dat die mees gepaste wyse om rekenaarmisbruik te kriminaliseer sal wees om ongemagtigde rekenaarbetreding as moedermisdaad te bestraf aangesien dit die fondament is waarop enige verdere misbruik van 'n rekenaar gebaseer word. Daarbenewens moet verdere meer spesifieke misbruikshandelinge wyd omskryfword as misdrywe, ten opsigte van meer emstige misbruik na betreding van 'n rekenaar
Parallel with the growth in computer technology and increasing use of computers, there has been an increase in computer misuse. In addition to addressing different methods of computer misuse in terms of civil law remedies, it is mainly the task of the criminal law to criminalise such misuse, prevent computer misuse and deter offenders by means of punishment. It was clear from a study of South African criminal law that existing offences, both statutory and in terms of the common law, do not criminalise and address computer misuse effectively. It therefore seems that legislation would be the most appropriate solution. It appeared from a comparative study of jurisdictions where legislators approach computer misuse differently, that the most effective way of criminalising computer misuse would be to criminalise una1,1thorised computer accessing as basic offence. In addition thereto more specific further acts of serious computer misuse, defined broadly, should be criminalised
Criminal & Procedural Law
LL.M. (Criminal & Procedural Law)