To see the other types of publications on this topic, follow the link: Hackers.

Journal articles on the topic 'Hackers'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Hackers.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Hausken, Kjell. "Information Sharing Among Cyber Hackers in Successive Attacks." International Game Theory Review 19, no. 02 (May 2, 2017): 1750010. http://dx.doi.org/10.1142/s0219198917500104.

Full text
Abstract:
Supplementing the literature on information sharing between firms, the paper seeks to understand information sharing between hackers and how firms defend against increasingly sophisticated hackers. Each hacker seeks financial gain, mutually beneficial information exchange, and reputation gain. The two hackers’ attack and the firm’s defense are inverse U shaped in each other. A hacker shifts from attack to information sharing when attack is costly or the firm’s defense is cheap. The first hacker’s information sharing increases as both hackers focus increasingly on reputation gain. The two hackers largely increase their information sharing, with two exceptions. The second hacker’s attack is deterred by the first hacker’s reputation gain. The firm’s defense against the second hacker increases in the second hacker’s unit cost, decreases in the second hacker’s information sharing effectiveness and utilization of joint sharing, and also decreases in both hackers’ reputation gain. Policy and managerial implications are provided.
APA, Harvard, Vancouver, ISO, and other styles
2

Odemis, Murat, Cagatay Yucel, and Ahmet Koltuksuz. "Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System." Security and Communication Networks 2022 (January 27, 2022): 1–28. http://dx.doi.org/10.1155/2022/7620125.

Full text
Abstract:
This research demonstrates a design of an experiment of a hacker infiltrating a server where it is assumed that the communication between the hacker and the target server is established, and the hacker also escalated his rights on the server. Therefore, the honeypot server setup has been designed to reveal the correlation of a hacker’s actions with that of the hacker’s experience, personality, expertise, and psychology. To the best of our knowledge, such a design of experiment has never been tested rigorously on a honeypot implementation except for self-reporting tests applied to hackers in the literature. However, no study evaluates the actual data of these hackers and these tests. This study also provides a honeypot design to understand the personality and expertise of the hacker and displays the correlation of these data with the tests. Our Honeypsy system is composed of a Big-5 personality test, a cyber expertise test, and a capture-the-flag (CTF) event to collect logs with honeypot applied in this sequence. These three steps generate data on the expertise and psychology of known cyber hackers. The logs of the known hacker activities on honeypots are obtained through the CTF event that they have participated in. The design and deployment of a honeypot, as well as the CTF event, were specifically prepared for this research. Our aim is to predict an unknown hacker's expertise and personality by analyzing these data. By examining/analyzing the data of the known hackers, it is now possible to make predictions about the expertise and personality of the unknown hackers. The same logic applies when one tries to predict the next move of the unknown hackers attacking the server. We have aimed to underline the details of the personalities and expertise of hackers and thus help the defense experts of victimized institutions to develop their cyber defense strategies in accordance with the modus operandi of the hackers.
APA, Harvard, Vancouver, ISO, and other styles
3

Bátfai, Norbert, Renátó Besenczi, József Szabó, Péter Jeszenszky, András Buda, László Jármi, Rita Barbara Lovas, Marcell Kristóf Pál, Gergő Bogacsovics, and Enikő Tóthné Kovács. "DEAC-Hackers: játszó hackerek, hackelő játékosok." Információs Társadalom 18, no. 1 (April 6, 2018): 132. http://dx.doi.org/10.22503/inftars.xviii.2018.1.9.

Full text
Abstract:
Klasszikus értelmezésben a hacker a kifinomult problémákat kifinomultan kezelni képes szakértő. Tipikusan programozó, de ugyanúgy mutathat hacker attitűdöket, lehet hacker egy művész, egy feltaláló, egy tudós vagy egy sportoló is. Ebben a cikkben azt mutatjuk be, hogyan lehet hacker egy e-sportoló játékos. A hacker természetéből fakadóan autodidakta, de a tanulási folyamat formális eszközökkel segíthető, katalizálható. A mi ilyen formális keretünk a Debreceni Egyetem Atlétikai Clubjának (DEAC) nemrégiben megalakított e-sport szakosztálya, a cikkben bemutatott DEAC-Hackers. --- DEAC-Hackers - Playing Hackers and Hacking Gamers In the classic sense of the word, a hacker is an expert who can solve sophisticated problems in a sophisticated way. In most cases, a hacker is a programmer, but hacker attitudes can be demonstrated by an artist, an inventor, a scientist or even an athlete. In this paper, we show how an esport player can be a hacker. A hacker is self-educated in nature, but his learning process can be aided with formal tools. One of our formal tools is the recently founded DEAC-Hackers, the esport department of the University of Debrecen Athletic Club, which is also introduced in this article. Keywords: esport, gamer, hacker, esport department
APA, Harvard, Vancouver, ISO, and other styles
4

Hausken, Kjell. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers." International Game Theory Review 20, no. 01 (March 2018): 1750027. http://dx.doi.org/10.1142/s021919891750027x.

Full text
Abstract:
One firm defends proactively or retroactively against a first hacker, and thereafter against a second hacker, in four four-period games. The hackers share information for financial gain, mutual advantage, and reputation. The first hacker’s attack and information sharing are strategic substitutes. When the firm is proactive in period 1, the first hacker’s information sharing decreases as the second hacker’s attack cost increases. The deterring effort in eight corner solutions is proportional to the deterred player’s valuation and inverse proportional to the deterred player’s unit effort cost. When the first hacker exerts higher effort and shares more information, lower defense by the firm is sufficient to deter the second hacker. When the firm is deterred by the first hacker, the first hacker attacks less and shares more information than in the interior solution. For the first hacker and the firm, both players commonly prefer the disadvantaged player to move first. The exception is that the firm prefers to deter the first disadvantaged hacker when the two hackers benefit substantially from information sharing, reputation gain, or the second player is advantaged. The results contrast with the literature where the advantaged player commonly prefers to move first, with conflicting sequence preferences.
APA, Harvard, Vancouver, ISO, and other styles
5

Cekerevac, Zoran, Zdenek Dvorak, Ludmila Prigoda, and Petar Cekerevac. "Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking." Communications - Scientific letters of the University of Zilina 20, no. 2 (June 30, 2018): 83–87. http://dx.doi.org/10.26552/com.c.2018.2.83-87.

Full text
Abstract:
Understanding the term hacking as any unconventional way of interacting with some system it is easy to conclude that there are enormous number of people who hacked or tried to hack someone or something. The article, as result of author research, analyses hacking from different points of view, including hacker’s point of view as well as the defender’s point of view. Here are discussed questions like: Who are the hackers? Why do people hack? Law aspects of hacking, as well as some economic issues connected with hacking. At the end, some questions about victim protection are discussed together with the weakness that hackers can use for their own protection. The aim of the article is to make readers familiar with the possible risks of hacker's attacks on the mobile phones and on possible attacks in the announced flood of the internet of things (next IoT) devices.
APA, Harvard, Vancouver, ISO, and other styles
6

Guo, Boyu. "Why Hackers Become Crackers – An Analysis of Conflicts Faced by Hackers." Public Administration Research 5, no. 1 (April 28, 2016): 29. http://dx.doi.org/10.5539/par.v5n1p29.

Full text
Abstract:
<p>Hacker culture is generally regarded as a subculture, and the public has a high degree of misunderstanding towards hackers. The media reports sometimes depict hackers overly negatively, possibly because hackers could gain a dominant position in the age of information and, therefore, threaten the existing balance of social power distribution. Moreover, those reports, whether intentionally or not, misunderstand the meaning of “hackers”: “Hackers” are people who want to identify and solve problems directly and effectively, but “crackers” are those who cause problems for society.</p>However, it is not merely a problem of media’s misnomer. This research shows that apart from the media distortion of hacker identity, even the hackers with positive intentions still have real potential to become crackers. Therefore, the aim of this paper is to understand why the transition from “hackers” to “crackers” takes place by identifying crucial factors that influence hackers’ behaviors. Specifically, the inherent conflicts between cyberspace and the real world can turn hackers into crackers. Through the research, two major conflicts are identified: the conflict between freedom and responsibility and the conflict between individuality and authority. To support the arguments, the history of hacker culture and specific cases of hacking events are studied and discussed. The research also brings a crucial issue: how do we co-exist with information technology in a society that is increasingly computerized and digitalized? To face this problem, we need to comprehensively understand situations faced by human civilization in the information era. Hacker culture is, therefore, a practical perspective of studying social transformations in the development of technology.
APA, Harvard, Vancouver, ISO, and other styles
7

Al-Ajlouni, Mahmoud Mohammad. "Human Resources and their Tendency to Information Security Crimes Based on Holland Theory." Information Resources Management Journal 31, no. 4 (October 2018): 44–58. http://dx.doi.org/10.4018/irmj.2018100103.

Full text
Abstract:
Security systems are often the target of cyber-criminals and professional hackers, but often they fail in hiding all traces of the attack, thereby leaving critical evidence that could lead to identifying and arresting the criminal. However, hacking skills vary from one hacker to another depending on the hacker's personal traits, behavior, and intellectual tendencies. The aim of this study is to develop a proposed descriptive model of the behavioral patterns and motives of hackers based on programmable psychological theories, modeled using object-oriented programming models. The study proposes a descriptive model of an inverse algorithm that simulates Holland's Theory of Behavioral Patterns. Findings show that this descriptive model is applicable to be produced as a code map for the human resources of an investigative nature.
APA, Harvard, Vancouver, ISO, and other styles
8

Scariot Esquivel, Nelson. "Hackers, política y revolución." Question/Cuestión 3, no. 72 (September 1, 2022): E716. http://dx.doi.org/10.24215/16696581e716.

Full text
Abstract:
El siguiente artículo está basado en el capítulo tres de mi tesina de grado La cultura hacker como filosofía de vida en la era del capitalismo cibernético. Una aproximación al caso en Mendoza. Aquí analizamos el potencial revolucionario de les hackers frente al actual sistema económico, político e informático que gobierna el mundo: el capitalismo cibernético (Tiqqun, 2016). Centrándonos en el aspecto político y filosófico de la cultura hacker. En efecto, buscamos responder a las siguientes preguntas: ¿Pueden los/as hackers constituirse en una clase política? ¿Por qué pensar a los/as hackers en términos revolucionarios? ¿Presentan efectivamente una actitud revolucionaria frente al capitalismo cibernético? ¿Cuáles son sus posibilidades para establecer una revolución? ¿Es correcto hablar de filosofía hacker?
APA, Harvard, Vancouver, ISO, and other styles
9

Bratus, Sergey. "Hacker Curriculum : How Hackers Learn Networking." IEEE Distributed Systems Online 8, no. 10 (October 2007): 2. http://dx.doi.org/10.1109/mdso.2007.4384582.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Banda, Raphael, Jackson Phiri, Mayumbo Nyirenda, and Monica M. Kabemba. "Technological Paradox of Hackers Begetting Hackers: A Case of Ethical and Unethical Hackers and their Subtle Tools." Zambia ICT Journal 3, no. 1 (March 7, 2019): 40–51. http://dx.doi.org/10.33260/zictjournal.v3i1.74.

Full text
Abstract:
Computer crimes have been in existence for a long time now and hacking is just another way or tool that hackers are now using to perpetrate crime in different form. Hackers Beget Ethical Hackers. A number of people have suffered the consequences of hacker actions. We need to know who these hackers are. We need to know why these hackers exist because hackers have been there and will be there and we can be victims of their existence. In essence hackers seem to beget hackers and the tools that they use are getting more and more advanced by the day. We shall take a quick analysis of selected tools from thousands of tools used by ethical and unethical hackers.We shall systematically review three major types of hackers that we can identify. It is not easy to draw a line between them. Three main hackers and minor hackers have been discussed in this paper. The three main hackers are black hat, grey hat and white hat hackers.We have adopted a systematic review of literature to discuss and analyse some of the common tools the black hat hackers have developed to hack into selected systems and commercial software and why they do it?
APA, Harvard, Vancouver, ISO, and other styles
11

Bellaby, Ross W. "An Ethical Framework for Hacking Operations." Ethical Theory and Moral Practice 24, no. 1 (February 12, 2021): 231–55. http://dx.doi.org/10.1007/s10677-021-10166-8.

Full text
Abstract:
AbstractIn recent years the power and reach of prominent hacker groups such as Anonymous and LulzSec has been clearly demonstrated. However, in a world where hackers are able to wield significant online power, can they do so ethically as legitimate agents? To answer this question this paper will develop an ethical framework based on the premise that hackers have exhibited instances where they have acted to protect people from harm at a time when there was no one else to do so. At its core this paper will argue that political hacking can be justified when it is done to protect the vital interests of oneself or others. Moreover, it will also argue that just because hackers are outside the state does not automatically discount them as ethical actors and that when the state fails to protect people – whether it is due to a lack of ability, political will or because the state is the source of the threat – hackers can fill the void. In order to achieve this, first it is necessary to highlight the space for hackers to operate; second, guide hacker activity by creating an ethical framework detailing what actions are justified towards what end; third, to offer mechanisms that can aid in reaching these ethically justified decisions; and as a result, inform further ethical debates on how to react to these political hackers. This means that the framework can be used to both justify and condemn hacking depending on the circumstances, allowing those on the outside to distil and evaluate a political hack, both past and present, while guiding hacker collectives by providing clearer ethical tools for determining the appropriate agendas and methods.
APA, Harvard, Vancouver, ISO, and other styles
12

Kulkarni, Atul, and Debajyoti Mukhopadhyay. "Data Spread among Vehicular Networks with Minimal Cost and Privacy." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 1 (January 1, 2018): 111. http://dx.doi.org/10.11591/ijeecs.v9.i1.pp111-114.

Full text
Abstract:
<p>Currently, choosing a node to carry the files via network is inefficient due to multiple end-users are requesting for packets at the same time. The problem is to identify the shortest path, traffic cost is high, and hackers enter the network to access the file. Whenever user requesting for packets to service provider, it has been carried out via router to provide security and effective way of transmission without any hackers. We proposed a VAN router that manages the transmission process. Once the packet enters router follows: (i) identifies the shortest path to transmit the packets, (ii) analyze the migration cost, (iii) when a hacker enters the network, the details of the hacker is send to the GPS to identify hackers location, (iv) provides the user requested packets back to the user without any modification. GPS work is to identify the hacker location in which node they are trying to access the files and that information has been sent to the user where hacker enters the network. Each packet sent by the service provider via router to end-user, the router intimates service provider with a confirmation message. Finally, VAN router provides security to the end-user by avoiding hackers to access the file and minimizes traffic cost, finds shortest path.</p>
APA, Harvard, Vancouver, ISO, and other styles
13

Isnarti, Rika. "The Role of China’s Patriotic Hackers and Their Relationship to the Government." Andalas Journal of International Studies (AJIS) 4, no. 2 (November 1, 2015): 161. http://dx.doi.org/10.25077/ajis.4.2.161-180.2015.

Full text
Abstract:
China is one of countries around the world known for the use of patriotic hackers who conduct many cyber-attacks. Patriotic hackers tend to be linked to nationalist movements or work for the government. For example, when ethnic Chinese were blamed for violent riots in Indonesia in 1998, Chinese patriotic hackers attacked Indonesian government websites in protest. Patriotic hackers also blocked CNN’s website during Beijing Olympics in 2008 because it reported protests in Tibet and reported bad news about China as Olympic host. They also attacked Vietnamese websites reporting conflict with China in 2014. China’s patriotic hackers struggle to control how China is represented in the cyber sphere and Chinese authorities condone their actions. There are many benefits that the government gains from patriotic hackers and it is possible that the government sponsors their actions. But there are also risks for the government. This paper assesses the role of china’s patriotic hackers.hackers. Keywords: China patriotic hacker, cyber, China government
APA, Harvard, Vancouver, ISO, and other styles
14

Warren, Matthew, and Shona Leitch. "Hacker Taggers: A new type of hackers." Information Systems Frontiers 12, no. 4 (August 7, 2009): 425–31. http://dx.doi.org/10.1007/s10796-009-9203-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Laksmiati, Dewi. "Vulnerability Assessment with Network-Based Scanner Method for Improving Website Security." Journal of Computer Networks, Architecture and High Performance Computing 5, no. 1 (January 19, 2023): 38–45. http://dx.doi.org/10.47709/cnahpc.v5i1.1991.

Full text
Abstract:
The digital world has seen a significant increase in security threats in recent years, with hacker attacks on websites being a major concern in cybersecurity. One platform that is particularly vulnerable is WordPress, which is widely used and therefore a popular target for hackers. About 95.62% hacked website in 2021 is WordPress based site. Therefore, to improve website security we conducted a vulnerability assessment on a WordPress based website, in order to identify vulnerabilities that may be exploited by hackers. To do the vulnerability assessment, we used the network-based scanner based to detect vulnerabilities on the WordPress website. Our results showed that the website had several vulnerabilities that needed to be addressed and fixed immediately. The conclusion of our research highlights the importance of conducting regular vulnerability assessments on WordPress-based websites to reduce the risk of vulnerabilities being exploited. By taking proactive measures to identify and fix vulnerabilities, website owners can better protect their sites from potential hacker attacks. It is crucial for website owners to be aware of the risks posed by security threats in the digital world and to take steps to mitigate these risks to protect their businesses and their customers.
APA, Harvard, Vancouver, ISO, and other styles
16

Manik, Burju Manik, and Imran Lubis. "Perbandingan Kinerja Ipcop dengan Honeypot dalam Mengamankan Server Linux dari Serangan Hacker." Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) 3, no. 1 (June 19, 2021): 34–41. http://dx.doi.org/10.35447/jikstra.v3i1.356.

Full text
Abstract:
Research to install IPCop and honeypot on server computers and implement IPCop by way of configuration to protect the server from unauthorized parties. The software used in this research is IPCop, Manjaro Linux, Shootpress, Windows 10, and Virtual Box. The results of this study indicate that the implementation of IPCop as a security system on the server can be done and can run well. IPCop is able to protect servers from hacker attacks very well, even using IPCop hackers are not able to ping the server, so hackers cannot find out information about the target server. Honeypot implementation as a security system on a linux server can be done and can run well. Honeypot is able to protect the server from hacker attacks well through its virtual server. So that hackers do not know where the original server is and the hacker will only attack the virtual server from the honeypot and think as if the server is the real server. In this case IPCop is better than the honeypot in the server security system
APA, Harvard, Vancouver, ISO, and other styles
17

Wu, Yong, Junlin Duan, Tao Dai, and Dong Cheng. "Managing Security Outsourcing in the Presence of Strategic Hackers." Decision Analysis 17, no. 3 (September 2020): 235–59. http://dx.doi.org/10.1287/deca.2019.0406.

Full text
Abstract:
Nowadays, firms tend to outsource security operations to professional managed security service providers (MSSPs) as a result of the sophistication of strategic hackers. Thus, how an MSSP makes security decisions according to a strategic hacker’s action is worth researching. Constructing a contract theory model, this paper examines the interaction between an MSSP and a strategic hacker based on both parties’ characteristics. We find that the hacker will give up less valuable information assets, and thus not all information assets are worth protecting for the MSSP. For both parties, their optimal efforts do not necessarily increase with their respective efficiency, and the firm’s reputation loss has an opposite effect on its respective efforts. Moreover, we distinguish two types of security externalities including MSSP-side externality and hacker-side externality, and we find that the two types of security externalities have different effects on both parties’ optimal efforts and expected payoffs. We also find that as a result of the trade-off between the integration effect of the MSSP and the effect of MSSP-side externality, firms are still willing to outsource their security operations to the MSSP even when an MSSP devotes fewer security efforts than those of firms that manage security in-house. Last, we extend our base model from two aspects to generalize the main results.
APA, Harvard, Vancouver, ISO, and other styles
18

Al-Tarawneh, Ahmed, and Ja’afer Al-Saraireh. "Efficient detection of hacker community based on twitter data using complex networks and machine learning algorithm." Journal of Intelligent & Fuzzy Systems 40, no. 6 (June 21, 2021): 12321–37. http://dx.doi.org/10.3233/jifs-210458.

Full text
Abstract:
Twitter is one of the most popular platforms used to share and post ideas. Hackers and anonymous attackers use these platforms maliciously, and their behavior can be used to predict the risk of future attacks, by gathering and classifying hackers’ tweets using machine-learning techniques. Previous approaches for detecting infected tweets are based on human efforts or text analysis, thus they are limited to capturing the hidden text between tweet lines. The main aim of this research paper is to enhance the efficiency of hacker detection for the Twitter platform using the complex networks technique with adapted machine learning algorithms. This work presents a methodology that collects a list of users with their followers who are sharing their posts that have similar interests from a hackers’ community on Twitter. The list is built based on a set of suggested keywords that are the commonly used terms by hackers in their tweets. After that, a complex network is generated for all users to find relations among them in terms of network centrality, closeness, and betweenness. After extracting these values, a dataset of the most influential users in the hacker community is assembled. Subsequently, tweets belonging to users in the extracted dataset are gathered and classified into positive and negative classes. The output of this process is utilized with a machine learning process by applying different algorithms. This research build and investigate an accurate dataset containing real users who belong to a hackers’ community. Correctly, classified instances were measured for accuracy using the average values of K-nearest neighbor, Naive Bayes, Random Tree, and the support vector machine techniques, demonstrating about 90% and 88% accuracy for cross-validation and percentage split respectively. Consequently, the proposed network cyber Twitter model is able to detect hackers, and determine if tweets pose a risk to future institutions and individuals to provide early warning of possible attacks.
APA, Harvard, Vancouver, ISO, and other styles
19

Maxigas. "Hackers against technology: Critique and recuperation in technological cycles." Social Studies of Science 47, no. 6 (October 30, 2017): 841–60. http://dx.doi.org/10.1177/0306312717736387.

Full text
Abstract:
I offer an interpretation of hackers’ technological choices through a theoretical framework of critique and recuperation in technological cycles, building on prior research that brings the pragmatic sociology of Boltanski and Chiapello to bear on matters in Science and Technology Studies. I argue that contextualizing technology choices in the development of capitalism through innovation illuminates their political significance. I start with the counterintuitive observation that some browser extensions popular with hackers, like RequestPolicy, make it considerably harder for them to look at websites. This observation showcases the Luddite aspects of hackerdom, in that they are willing to ‘break’ popular websites that would otherwise cheat on the user. In line with an undercurrent of hacker studies, in this case study I find hackers fighting technological progress they see as social decline.
APA, Harvard, Vancouver, ISO, and other styles
20

Jeong, Sarah, and Colin McSwiggen. "Hackers!" XRDS: Crossroads, The ACM Magazine for Students 20, no. 4 (June 2014): 38–42. http://dx.doi.org/10.1145/2604998.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Hollinger, Richard C. "Hackers." ACM SIGCAS Computers and Society 21, no. 1 (June 1991): 6–17. http://dx.doi.org/10.1145/122246.122248.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Wark, McKenzie. "Hackers." Theory, Culture & Society 23, no. 2-3 (May 2006): 320–22. http://dx.doi.org/10.1177/026327640602300242.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Dudchik, Andrei Yu. "Partisans go cyber: The hacker ethic and partisans’ legacy." Vestnik of Saint Petersburg University. Philosophy and Conflict Studies 39, no. 2 (2023): 322–39. http://dx.doi.org/10.21638/spbu17.2023.209.

Full text
Abstract:
The article discusses the role of hackers and hacktivists in modern hybrid conflicts, in particular the ‘localization’ patterns of hackerism, by focusing on the case of the Belarusian hacker group Cyber Partisans. The study shows the significance of the partisan movement for modern Belarusian identity and historical memory and discusses the attempts of appropriation of this topic by various political actors. The comparison between hacktivism and partisan warfare holds a certain heuristic potential, making it possible to build conceptual categories for the analysis of the hacktivists’ practices and their ethical norms. Parallels may be drawn between the hackers and partisans (along with more common analogies with the pirates and ‘social bandits’) to gain a better understanding of the historical and ideological roots of the hacker movement in the ethical sphere. One of the most famous interpretations of the concept partisan belongs to the German jurist and political theorist Carl Schmitt, whose approach accentuates the partisan’s connection with the local territory (the telluric nature of the partisan). An interesting way to compare the hacker and partisan ethic is to look at both of them from the game-related perspective. For example, the situations described in the ‘partisan’ literature have much in common with the prisoner’s dilemma — a popular game theory paradox. These situations of moral choice foster a particular kind of subjectivity which is closely entwined with keeping true and remaining loyal, a subjectivity that is apt to handle certain information with discretion and care. The study explores the heuristic potential of the concept nomos for the analysis of the partisan ethic and hacker ethic. The proposed concept nomos of the swamp develops Karl Schmitt’s ideas and can be applied to reveal the specifics of the partisan activity in Belarus and to analyze partisanship in connection to the historical and modern forms of ‘partisan’ hacktivism.
APA, Harvard, Vancouver, ISO, and other styles
24

Aguado, Alexandre Garcia, and Isabel Alvarez Canovas. "Cultura hacker e educação: percepções dos hackers sobre a vivência de elementos de sua cultura nas escolas." Perspectiva 39, no. 3 (June 28, 2021): 1–18. http://dx.doi.org/10.5007/2175-795x.2021.e81052.

Full text
Abstract:
Partindo da compreensão de que vivemos em sociedades em que as possibilidades e as opressões, em alguma medida, estão relacionadas às dinâmicas tecnológicas, e conscientes da necessidade de os processos educativos colocarem tais dinâmicas em perspectiva, neste artigo voltamos nosso olhar para os hackers e a percepção que possuem sobre a possibilidade de vivência de elementos da sua cultura nas escolas. Compreender quais elementos da cultura hacker, na percepção dos hackers de distintos movimentos e países, deveriam fazer parte do ambiente escolar é o objetivo principal deste trabalho. Um questionário misto, criado para uma pesquisa mais abrangente, sobre educação hacker e empoderamento, foi distribuído através de diversas listas de e-mail para comunidades de distintas vertentes e países. Neste artigo, focados no objetivo proposto, voltamos nosso olhar à análise de um único item dissertativo desse questionário: ‘De acordo com sua experiência, quais são as características da cultura hacker que podem ser levadas para as escolas ou universidades?’. Foram analisadas as respostas de 64 hackers. Através da construção de uma nuvem de palavras, destacamos os termos mais recorrentes e revisitamos cada uma dessas respostas, buscando aprofundar seus significados e relações, bem como construindo diálogo com um referencial teórico sobre educação hacker e pedagogia crítica. Os resultados revelam cinco aspectos: 1) lógica de compartilhamento aberto; 2) ecossistema comunitário de colaboração; 3) aprendizagem prática, valorizando os erros; 4) valorização das tecnologias livres e problematização das implicações sociais e humanas das tecnologias; e 5) respeito e valorização das curiosidades, somados ao estímulo do pensamento crítico.
APA, Harvard, Vancouver, ISO, and other styles
25

Etuh, Emmanuel, Francis S. Bakpo, George E. Okereke, and David Omagu. "Exploratory Data Analysis and Feature Selection for Social Media Hackers Prediction Problem." Computer Science & Engineering: An International Journal 13, no. 4 (August 27, 2023): 01–19. http://dx.doi.org/10.5121/cseij.2023.13401.

Full text
Abstract:
In machine learning, the intelligence of a developed model is greatly influenced by the dataset used for the target domain on which the developed model will be deployed. Social media platform has experienced more of hackers’ attacks on the platform in recent time. To identify a hacker on the platform, there are two possible ways. The first is to use the activities of the user while the second is to use the supplied details the user registered the account with. To adequately identify a social media user as hacker proactively, there are relevant user details called features that can be used to determine whether a social media user is a hacker or not. In this paper, an exploratory data analysis was carried out to determine the best features that can be used by a predictive model to proactively identify hackers on the social media platform. A web crawler was developed to mine the user dataset on which exploratory data analysis was carried out to select the best features for the dataset which could be used to correctly identify a hacker on a social media platform.
APA, Harvard, Vancouver, ISO, and other styles
26

Ulrich, Frank, Sune Müller, and Stephen Flowers. "The Professionalization of Hackers: A Content Analysis of 30 Years of Hacker Communication." Communications of the Association for Information Systems 52 (2023): 988–1016. http://dx.doi.org/10.17705/1cais.05246.

Full text
Abstract:
Underground hacking has evolved from its early countercultural roots to become a complex and varied phenomenon. By combining a historical review of the literature with a content analysis of 30 years of underground hacker communication, we show that hacking has evolved in three waves to embrace learning and creativity, intrusion and crime, as well as politics and cyberwarfare. We uncover a paradoxical relationship between hackers and society at large where underground hacking is considered a digital crime while at the same time inspiring and driving corporate innovation, cybersecurity, and even cyberwarfare. The outcome of our research provides a nuanced picture of the hacker underground by highlighting differences between competing discursive themes across time. Moreover, by translating these themes into a set of six contrasting personas of IS professionals, we discuss how knowledge, technologies, and creative practices of underground hackers are being professionalized. We use this discussion to provide implications and a research agenda for IS studies in cybersecurity, innovation, and cyberwarfare.
APA, Harvard, Vancouver, ISO, and other styles
27

Turgeman-Goldschmidt, Orly. "Hackers' Accounts." Social Science Computer Review 23, no. 1 (February 2005): 8–23. http://dx.doi.org/10.1177/0894439304271529.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Hathaway, Melissa. "Power Hackers." Scientific American 303, no. 4 (October 2010): 16. http://dx.doi.org/10.1038/scientificamerican1010-16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Butler, Janet. "Hackers Beware!" EDPACS 15, no. 9 (March 1988): 6–8. http://dx.doi.org/10.1080/07366988809450472.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Stephenson, Peter. "Hiring Hackers." Information Systems Security 8, no. 2 (June 1999): 10–13. http://dx.doi.org/10.1201/1086/43305.8.2.19990601/31059.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Crawley, Adrian. "Hiring hackers." Network Security 2016, no. 9 (September 2016): 13–15. http://dx.doi.org/10.1016/s1353-4858(16)30088-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Ball, Philip. "Medical hackers." Lancet 388, no. 10044 (August 2016): 554–55. http://dx.doi.org/10.1016/s0140-6736(16)31223-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Highland, Harold Joseph. "Hackers revisited." Computers & Security 7, no. 4 (August 1988): 339. http://dx.doi.org/10.1016/0167-4048(88)90565-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Schneier, B. "Airplane hackers." IEEE Security & Privacy 1, no. 6 (November 2003): 92. http://dx.doi.org/10.1109/msecp.2003.1266367.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Kera, Denisa, Zack Denfeld, and Cathrine Kramer. "Food Hackers." Gastronomica 15, no. 2 (2015): 49–56. http://dx.doi.org/10.1525/gfc.2015.15.2.49.

Full text
Abstract:
The emergence of food collectives, as well as movements identifying with makerspace and hackerspace cultures such as Food Hacking Base and Hackteria, supports various experimental and playful practices, which are often participatory. We discuss a case study of foodhacking practices (the 2012 workshop in Prague on issues of spices and globalization) to identify the functions of such playful food prototypes. These practices paradoxically revive the original ideas of Jean Anthelme Brillat-Savarin’s 1825 The Physiology of Taste, fusing gastronomy with global politics, science, business, and even philosophy. Present-day food hackers, like Savarin’s “political gastronomes,” use the “pleasures of the table” and gourmandism as an opportunity to rethink and experiment with both private and public systems around food and to question future scenarios.
APA, Harvard, Vancouver, ISO, and other styles
36

Martínez-Cazalla, María Dolors. "Cazando hackers. Un regalo del ‘convidado de piedra’." Revista de Humanidades de Valparaíso, no. 12 (December 20, 2018): 115. http://dx.doi.org/10.22370/rhv.2018.12.1344.

Full text
Abstract:
Podemos ser hackeados porque no hay preguntas indiscretas sino respuestas imprudentes. El objetivo principal de este artículo es aprender a crear las mejores respuestas posibles, las más prudentes, para permanecer los más seguros que podamos. Esto es lo que significa cazando hackers: pesar sobre qué pieza de información fue la relevante para el hacker y por qué lo fue esta y no, otra. Si podemos prever nuestras fisuras podremos mantener nuestra zona a salvo de los hackers. Con el fin de alcanzar este objetivo, analizaremos cómo funciona el lenguaje encriptado conocido como las Cartas Rusas. La intención de este estudio no es mostrar cómo romper el lenguaje encriptado, sino el provecho que hemos sacado del aprendizaje que nos ha regalado su punto débil en sí mismo. Precisamente es aprendiendo de este punto débil donde encontramos la respuesta al qué y al por qué podemos ser hackeados. En la medida en que dispongamos de esta información, estaremos preparados para cazar hackers: paralizar completamente o, al menos, debilitar un posible ataque.
APA, Harvard, Vancouver, ISO, and other styles
37

Lange, Antoine, and Jean-François Henrotte. "Piratage éthique : mise à jour du cadre législatif pour une Belgique 2.0 ?" Pin Code N° 16, no. 4 (December 18, 2023): 24–27. http://dx.doi.org/10.3917/pinc.016.0024.

Full text
Abstract:
En septembre 2019, dans le numéro inaugural de cette revue, avaient été abordées plusieurs des grandes questions juridiques que pose le piratage éthique ou le hacking éthique 1 . Pour rappel, cette pratique consiste à s’infiltrer au travers des systèmes de sécurité informatique d’une organisation, afin d’identifier les vulnérabilités 2 de ces systèmes et de les signaler à leurs propriétaires. Dans la culture anglo-saxonne, on dénomme ces acteurs « White Hat hackers », par opposition aux « Black Hat hackers » qui exploitent les vulnérabilités découvertes 3 . La Belgique ayant introduit une réforme importante depuis le 15 février 2023, il semble opportun de revenir sur ce sujet. À l'époque de la rédaction de notre précédent article, si l’intrusion était à l’initiative du hacker, celle-ci était nécessairement pénalisée en Belgique. Cependant, depuis le 15 février 2023, la législation belge a été modifiée 4 de telle sorte que la pratique du hacking éthique est maintenant admise dans certains cas précis. Cela signifie que, sous certaines conditions spécifiques, les hackers peuvent désormais prendre l’initiative d’effectuer des tests d’intrusion bienveillants sans craindre d'être poursuivis en justice.
APA, Harvard, Vancouver, ISO, and other styles
38

Asarudeen, S. Sheik, and R. Priya R. Priya. "Recruitment of Ethical Hackers." International Journal of Scientific Research 2, no. 1 (June 1, 2012): 145–46. http://dx.doi.org/10.15373/22778179/jan2013/50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Aji, Brian Budi. "TINDAKAN KEJAHATAN CYBER CRIME DALAM BENTUK DEFACE WEBSITE." Cyber Security dan Forensik Digital 6, no. 1 (August 16, 2023): 25–29. http://dx.doi.org/10.14421/csecurity.2023.6.1.4049.

Full text
Abstract:
Deface website merupakan tindakan yang dilakukan oleh seorang hacker atau peretas dengan tujuan untuk merusak atau mengubah tampilan homepage sebuah website. Tindakan ini sering dilakukan untuk menodai reputasi organisasi atau individu, mengeksploitasi kerentanan dalam sistem keamanan, atau menyampaikan pesan politik atau ideologis. Mempertimbangkan permasalahan tersebut, artikel ini mengkaji evolusi kejahatan dunia maya dalam bentuk website yang terdegradasi dengan menggunakan metode tinjauan sistematis. Dalam diskusi ini dilakukan kajian sistematis dengan terlebih dahulu memilih dan menentukan daftar jurnal yang relevan dengan cybercrime. Berdasarkan hasil penelitian yang dilakukan tentang studi deface web di beberapa website. deface website yang dilakukan peretas berupa menambahkan ataupun merubah keseluruhan tampilan website, Deface website merupakan tindakan yang dilakukan oleh seorang hacker atau peretas dengan tujuan untuk merusak atau mengubah tampilan homepage sebuah website. Tindakan ini sering dilakukan untuk menodai reputasi organisasi atau individu, mengeksploitasi kerentanan dalam sistem keamanan, atau menyampaikan pesan politik atau ideologis salah satu contohnya yang terjadi pada tahun 2020 di website DPR RI. Kata kunci: deface website, cyber crime, hacker -------------------------- Website defacement is an action taken by a hacker or hackers with the aim of destroying or changing the appearance of a website's homepage. These actions are often carried out to tarnish the reputation of organizations or individuals, exploit vulnerabilities in security systems, or convey political or ideological messages. Considering these problems, this article examines the evolution of cybercrimes in the form of degraded websites using a systematic review method. In this discussion, a systematic review is carried out by first selecting and determining a list of journals that are relevant to cybercrime. Based on the results of research conducted on web deface studies on several websites. website defacement by hackers in the form of adding or changing the overall appearance of a website Deface website is an action taken by a hacker or hackers with the aim of damaging or changing the appearance of a website's homepage. These actions are often carried out to tarnish the reputation of organizations or individuals, exploit vulnerabilities in security systems, or convey political or ideological messages, one example that occurred in 2020 on the DPR RI website. Keywords: deface website, cyber crime, hacker
APA, Harvard, Vancouver, ISO, and other styles
40

Ferenț, Darius-Antoniu. "The impact of DoS (Denial of Service) cyberattacks on a Local Area Network (LAN)." Intelligence Info 1, no. 1 (September 2022): 124–29. http://dx.doi.org/10.58679/ii52272.

Full text
Abstract:
In this paper I will highlight a modus operandi of hackers launching Denial of Service (DoS) cyberattacks. I will theoretically show how CAM Overflow and TCP SYN Flood attacks can be performed, using Kali Linux, a Linux distribution used by cyber criminals to launch MitM (Man-in-the-Middle) attacks, DoS attacks, observing traffic in a computer network, etc. Hackers can affect the functioning of devices on an organization’s local network (server, router, switch, etc.) by sending thousands of packets per second to the target device. CAM Overflow is an attack where a hacker aims to overcrowd the CAM table of a switch with MAC addresses, and TCP SYN Flood is an attack that can be launched against a server in the computer network.
APA, Harvard, Vancouver, ISO, and other styles
41

Mohd Yunus, Mohd Amin, Muhammad Zainulariff Brohan, Nazri Mohd Nawi, Ely Salwana Mat Surin, Nurhakimah Azwani Md Najib, and Chan Wei Liang. "Review of SQL Injection : Problems and Prevention." JOIV : International Journal on Informatics Visualization 2, no. 3-2 (June 6, 2018): 215. http://dx.doi.org/10.30630/joiv.2.3-2.144.

Full text
Abstract:
SQL injection happened in electronic records in database and it is still exist even after two decades since it first happened. Most of the web-based applications are still vulnerable to the SQL injection attacks. Although technology had improved a lot during these past years, but, hackers still can find holes to perform the SQL injection. There are many methods for this SQL injection to be performed by the hackers and there is also plenty of prevention for the SQL injection to be happened. The vulnerability to SQL injection is very big and this is definitely a huge threat to the web based application as the hackers can easily hacked their system and obtains any data and information that they wanted anytime and anywhere. This paper can conclude that several proposed techniques from existing journal papers used for preventing SQL injection. Then, it comes out with Blockchain concept to prevent SQL injection attacks on database management system (DBMS) via IP.
APA, Harvard, Vancouver, ISO, and other styles
42

Prasetyo, Stefanus Eko, Haeruddin Haeruddin, and Kelvin Ariesryo. "Website Security System from Denial of Service attacks, SQL Injection, Cross Site Scripting using Web Application Firewall." Antivirus : Jurnal Ilmiah Teknik Informatika 18, no. 1 (May 10, 2024): 27–36. http://dx.doi.org/10.35457/antivirus.v18i1.3339.

Full text
Abstract:
The Internet and web applications play an important role in our modern life today. Some of our day-to-day activities like browsing, booking flights or ships, paying bills are becoming easier and easier using a web application. Nowadays a lot of people are using web applications for the desired product or service. Users who provide names, personal data, payment data, can be a source of income for hackers targeting user sensitive information. Hackers can not only steal confidential user data, but can also insert malware into the attacked website. In another study, it was mentioned that a server is very vulnerable if it does not have a good firewall or security. The solution proposed by the author is to add a service between the user and the server as an intermediary so that the hacker cannot directly enter the server of a web application. In this study, researchers will use cloudflare-protected websites as targets for penetration testing using Kali Linux. By using cloudflare, we can set the rules and the level of security of the website so that we can easily prevent attacks by hackers.
APA, Harvard, Vancouver, ISO, and other styles
43

Cheng, Xiaogang, Ren Guo, and Yonghong Chen. "Randomized quantum oblivious transfer with application in hacker-resistant computation." International Journal of Quantum Information 16, no. 04 (June 2018): 1850039. http://dx.doi.org/10.1142/s0219749918500399.

Full text
Abstract:
OT (Oblivious transfer) is a fundamental primitive in cryptography. But it is well known that in quantum cryptography, unconditionally secure OT is impossible. A variant of OT, i.e. randomized OT, is presented. We then show how to realize this variant in quantum cryptography with some security relaxations, which is inevitable because of the well-known impossible result in quantum cryptography. We also present a new secure computational model, namely HRC (Hacker-Resistant Computation) model. Since on today’s Internet there are more and more hackers and increased cyber threat, knowing how to protect the information and privacy stored on our computer and on cloud servers is very important, even when the computer or server has been breached by hackers. Finally, some interesting applications of the randomized OT variant to HRC are discussed.
APA, Harvard, Vancouver, ISO, and other styles
44

Esquivel-Sada, Daphne. "Les matériaux vivants entre les mains hackers." Matériaux vivants 49 (2024): 81–98. http://dx.doi.org/10.4000/11yyb.

Full text
Abstract:
À l’heure où les communautés bio-hackers des quatre coins de la planète s’approprient le monde des biotechnologies, cet article propose de réfléchir à leur rapport aux matériaux vivants. Il s’agit de saisir certaines particularités de ces derniers à partir de leur existence technique en tant que vivant biotechnologique (VB). À la croisée des études sur les sciences et de la théorie critique, l’article propose une analyse de discours d’entretiens conduits auprès de bio-hackers, majoritairement canadiens. L’analyse fait ressortir le mode d’existence du VB selon trois figures principales : l’imaginaire bio-hacker du VB conçu comme la bio-infrastructure commune au bio-hacking, à la biologie synthétique et à la bioéconomie ; le défi que les finalités normatives biologiques constituent pour la matérialisation du VB ; et la fabrique d’une distinction inégalitaire, souvent circonstancielle, entre des organismes, qui participe à la légitimation sociale du mode d’existence du VB.
APA, Harvard, Vancouver, ISO, and other styles
45

Nikitina, Svetlana. "Hackers as Tricksters of the Digital Age: Creativity in Hacker Culture." Journal of Popular Culture 45, no. 1 (February 2012): 133–52. http://dx.doi.org/10.1111/j.1540-5931.2011.00915.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Scariot Esquivel, Nelson. "¿Qué es ser hacker?" Question/Cuestión 3, no. 71 (May 10, 2022): E661. http://dx.doi.org/10.24215/16696581e661.

Full text
Abstract:
Este artículo está basado en el primer capítulo de mi tesina de grado La cultura hacker como filosofía de vida en la era del capitalismo cibernético. Una aproximación al caso en Mendoza. Aquí buscamos responder a la pregunta: ¿qué es ser hacker? Para responderla, es necesario un recorrido por el origen del término, comprender su tergiversación a lo largo del tiempo a manos del poder hegemónico, y analizar la diferencia entre hackers y crackers. Esto nos llevará a precisar, ampliar y resignificar el concepto hacker como aquella persona que difiera, crea, comparte y expresa su pasión creativa libremente en pos del bien común.
APA, Harvard, Vancouver, ISO, and other styles
47

Pradana Aji, Rio, Yudi Prayudi, and Ahmad Luthfi. "ANALYSIS OF BRUTE FORCE ATTACK LOGS TOWARD NGINX WEB SERVER ON DASHBOARD IMPROVED LOG LOGGING SYSTEM USING FORENSIC INVESTIGATION METHOD." Jurnal Teknik Informatika (Jutif) 4, no. 1 (February 10, 2023): 39–48. http://dx.doi.org/10.52436/1.jutif.2023.4.1.644.

Full text
Abstract:
Since it was first launched in 1990, the Web Server is still in use today. No exception, almost all companies entering industry 4.0 use Web Servers to show the existence of the company's website and its products. Starting from the websites provided for free by WordPress and Blogspot to independent websites created by their respective companies. The web server itself is available in several types, ranging from apache, nginx, litespeed, etc. Of course, the use of a Web Server for websites cannot be separated from internet crimes or cyber crimes. One of the crimes committed is the hacker's attempt to login to the website Administrator page. The loophole used by hackers is brute force or forced entry by trying every combination of existing Administrator User and Password. This research focuses on building and updating a website monitoring dashboard system with Wazuh technology. The method used in this study is the Quantitative Forensic Investigation Method by examining the logs generated by the System Dashboard using Digital Forensic procedures. This monitoring process aims to detect brute force threats on managed websites by showing the website Administrator login activity log. The results of the metadata log shown by the optimized dashboard show the number of brute force attacks on managed websites. The number of attacks recorded was 259646 attacks on the first cluster and 288676 attacks on the second cluster. In addition, the results of the metadata log can be investigated further to find the location of the Hacker. The location of the hackers found was only limited to the VPN (Virtual Private Network) server used. One of the VPN servers used in this case is Amazon Data Center.
APA, Harvard, Vancouver, ISO, and other styles
48

Holt, Thomas J., Joshua D. Freilich, and Steven M. Chermak. "Exploring the Subculture of Ideologically Motivated Cyber-Attackers." Journal of Contemporary Criminal Justice 33, no. 3 (April 4, 2017): 212–33. http://dx.doi.org/10.1177/1043986217699100.

Full text
Abstract:
Research on physical, that is, violent, terror attacks and extremism has increased dramatically over the last decade. The growth of the Internet and computer technology has also led to concern over the use of cyberattacks by ideologically motivated offenders to cause harm and further their political and social agendas. There is, however, a lack of empirical research on cyber-attackers limiting our knowledge of the factors that affect their behavior. This study addresses this empirical gap through a qualitative analysis of 10 interviews conducted with ideologically motivated Turkish computer hackers. The findings demonstrated that Turkish hackers motivated by an ideological agenda reflected the larger values of the hacker subculture, though the targets for their attacks were shaped directly by religious or political beliefs. We conclude by discussing in depth our findings and implications for counterterror and cybersecurity policy and practice.
APA, Harvard, Vancouver, ISO, and other styles
49

Fitroh, Qorry Aina, and Bambang Sugiantoro. "PERAN ETHICAL HACKING DALAM MEMERANGI CYBERTHREATS." JURNAL ILMIAH INFORMATIKA 11, no. 01 (March 10, 2023): 27–31. http://dx.doi.org/10.33884/jif.v11i01.6593.

Full text
Abstract:
Upaya digitalisasi dan optimalisasi berbagai hal dalam dunia modern tentunya akan menyoroti berbagai isu yang berkaitan dengan cybersecurity seperti pelanggaran data, pelanggaran keamanan, dan sebagainya. Ethical hacking dan kebutuhannya di masa mendatang tidak dapat dihindari. Teknologi ethical hacking menyebar hampir dalam setiap aspek kehidupan, terutama industri komputer yang membutuhkan perlindungan terhadap data penting dan harus ditangani dengan teknologi yang tepat. Ethical hacking bertujuan menemukan kelemahan dalam sistem keamanan dan menemukan kemungkinan potensi pelanggaran data. Hal ini kontras dengan pengertian hacking yang umum beredar di masyarakat yaitu black hat hackers yang merusak sistem dengan niat jahat dan mencuri data serta menanamkan virus. Ethical hacking merupakan cara untuk memerangi dan menetralkan black hat hackers. Mengajarkan ethical hacking merupakan mempersiapkan professional dalam bidang keamanan informasi dengan alat dan keahlian untuk memerangi serta mencegah ancaman cybersecurity. Mengajarkan orang yang belum berpengalaman dalam keamanan informasi dengan metode yang agresif dapat dipandang sebagai hal yang baik maupun buruk. Hal ini disebabkan oleh metode yang sama digunakan oleh hacker jahat sehingga mendidik professional dalam keamanan informasi dapat dianggap menambah hacker jahat. Menggunakan metode studi literatur, artikel ini membahas berbagai hal yang berkaitan dengan ethical hacking.
APA, Harvard, Vancouver, ISO, and other styles
50

Goldstein, Gordon, and Laurent Saintonge. "Les États hackers." Books N° 64, no. 4 (April 1, 2015): 37–38. http://dx.doi.org/10.3917/books.064.0037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography