INSTITUTO POLITÉCNICO NACIONAL CENTRO DE INVESTIGACION EN COMPUTACION
Cyber security A-15
- Dr. Ponciano Jorge Escamilla Ambrosio
pescamilla@cic.ipn.mx http://www.cic.ipn.mx/~pescamilla/
Ciberseguridad Cyber security A-15 Dr. Ponciano Jorge Escamilla - - PowerPoint PPT Presentation
INSTITUTO POLITCNICO NACIONAL CENTRO DE INVESTIGACION EN COMPUTACION Laboratorio de Ciberseguridad Cyber security A-15 Dr. Ponciano Jorge Escamilla Ambrosio pescamilla@cic.ipn.mx http://www.cic.ipn.mx/~pescamilla/ CIC Cyber Cyber
INSTITUTO POLITÉCNICO NACIONAL CENTRO DE INVESTIGACION EN COMPUTACION
pescamilla@cic.ipn.mx http://www.cic.ipn.mx/~pescamilla/
CIC
2
CIC
ISSA = Information Systems Security Association
3
CIC
4
CIC
5
CIC
6
CIC
7
CIC
8
CIC
9
CIC
10
CIC
11
CIC
12
CIC
13
CIC
14
CIC
15
CIC
16
CIC
17
CIC
18
CIC
19
CIC
20
CIC
21
CIC
22
CIC
23
CIC
24
CIC
25
CIC
26
CIC
Traditionally, hackers like to tinker with software or
In recent years, hacker has taken on a new meaning —
27
CIC
28
CIC
29
CIC
30
CIC
31
CIC
32
CIC
http://www2.fiu.edu/~mizrachs/hackethic.html
33
CIC
34
CIC
35
CIC
36
CIC
37
CIC
38
CIC
39
CIC
40
CIC
41
CIC
42
CIC
White hackers
security weakness is found in that organisation’s systems.
Grey hackers
the situation, they might exploit or warn an organisation if a weakness is found in their system.
Black hackers
collecting and selling intellectual property or personal information.
43
CIC
44
CIC
45
CIC
46
CIC
47
CIC
Ethical Hacking: Ethical hacking is always carried out
These ethical hackers "have the ability to harm your
48
CIC
For ethical hackers, they will only hack and test on a
49
CIC
Unethical Hacking: Unethical hacking is a malicious
50
CIC
Unethical Hacking: For malicious hacking, the hackers
51
CIC
—FBI Director Robert Mueller RSA conference (March 1, 2012). 52
CIC
—Army Gen. Keith Alexander, Director of National Security Agency and Commander of U.S. Cyber Command DEF CON 20 (July 27, 2012). 53