Ethical hacking /:
"The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments. The line of transparency is moving by force. The twitter page for Wikileaks demonstrates this ethos through its motto "we open governments" and its location to be &qu...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
[Ottawa, Ontario, Canada] :
University of Ottawa Press,
2019.
|
Schriftenreihe: | Law, technology, and media.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments. The line of transparency is moving by force. The twitter page for Wikileaks demonstrates this ethos through its motto "we open governments" and its location to be "everywhere". At the same time, we see a battle between major technology companies such as Apple trying to make more secure products and to protect customer data, while at the same time governments moving to restrict and decrypt new secure encryption technologies. Meanwhile, the market for security vulnerabilities grows with computer security experts able to sell software vulnerabilities from key technologies such as Apple and Google from $10,000 to $1.5 million dollars. Security activism is on the rise. Ethical Hacking is the non-violent use of a technology in pursuit of a cause, political or otherwise which is often legally and morally ambiguous. Ethical hacking may involve the acts of professional penetration intrusion testers and computer security experts, as other forms of emerging actions such as hacktivism and online civil disobedience. Increasingly, Hacktivism is a form of ethical hacking and also a form of civil rights activism in the digital age. Hacktivists believe in two general but spirited principles: respect for human rights and fundamental freedoms including freedom of expression and personal privacy, and the responsibility of government to be open, transparent and fully accountable to the public. In practice, however, hacktivists are as diverse in their backgrounds as they are in their agendas. How courts and governments will deal with hacking attempts which operate in a grey zone of the law and where different ethical views collide remains to be seen, as there are no exceptions to the cybercrime/computer crime provisions for security research or public interest in most jurisdictions around the globe. It will be equally difficult to determine how civil rights will apply to hacktivism. A fundamental discussion of key societal questions."-- |
Beschreibung: | 1 online resource : color illustrations, color maps |
Bibliographie: | Includes bibliographical references. |
ISBN: | 9780776627922 0776627929 9780776627946 0776627945 9780776627939 0776627937 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1090539455 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 190325t20192019oncab ob 000 0 eng | ||
040 | |a NLC |b eng |e rda |e pn |c NLC |d YDX |d EBLCP |d N$T |d YDX |d OCLCF |d MERUC |d OCLCO |d UKAHL |d OCLCQ |d SFB |d OCLCQ |d UBY |d OCLCQ |d CN6UV |d OCLCO |d OCLCQ |d ORE |d OCLCO |d DEGRU |d JSTOR |d YWS |d OCLCQ |d HOPLA |d UEJ | ||
015 | |a 2019008748X |2 can | ||
019 | |a 1450639773 | ||
020 | |a 9780776627922 |q (electronic book) | ||
020 | |a 0776627929 |q (electronic book) | ||
020 | |a 9780776627946 |q (electronic book) | ||
020 | |a 0776627945 |q (electronic book) | ||
020 | |a 9780776627939 |q (electronic book) | ||
020 | |a 0776627937 |q (electronic book) | ||
035 | |a (OCoLC)1090539455 |z (OCoLC)1450639773 | ||
037 | |a 22573/ctv5vdbgn |b JSTOR | ||
042 | |a lac | ||
050 | 4 | |a HV6773 |b .M3835 2019 | |
055 | 0 | |a HV6773 |b .M38 2019 | |
072 | 7 | |a SOC |x 004000 |2 bisacsh | |
072 | 7 | |a LAW |x 099000 |2 bisacsh | |
082 | 7 | |a 364.16/8 |2 23 | |
084 | |a cci1icc |2 lacc | ||
049 | |a MAIN | ||
100 | 1 | |a Maurushat, Alana, |e author. |0 http://id.loc.gov/authorities/names/no2013101558 | |
245 | 1 | 0 | |a Ethical hacking / |c Alana Maurushat. |
264 | 1 | |a [Ottawa, Ontario, Canada] : |b University of Ottawa Press, |c 2019. | |
264 | 4 | |c ©2019 | |
300 | |a 1 online resource : |b color illustrations, color maps | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Law, technology and media | |
504 | |a Includes bibliographical references. | ||
505 | 0 | |a Why ethical hacking? -- Essential terms and concepts -- Methodology and quantitative studies of ethical hacking : evidence-based decision and policy-making -- Legal cases around the world (with Jelena Ardalic) -- Select ethical-hacking incidences : Anonymous -- Select ethical-hacking incidences : Chaos Computer Club, CyberBerkut, Lulzsec, Iranian Cyber Army, and others -- Online civil disobedience -- Hacktivism -- Penetration/intrusion testing and vulnerability disclosure -- Counterattack/hackback -- Security activism -- Ethical-hacking challenges in legal frameworks, investigation, prosecution, and sentencing -- Ethical hacking, whistle-blowing, and human rights and freedoms -- Toward an ethical-hacking framework. | |
520 | |a "The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments. The line of transparency is moving by force. The twitter page for Wikileaks demonstrates this ethos through its motto "we open governments" and its location to be "everywhere". At the same time, we see a battle between major technology companies such as Apple trying to make more secure products and to protect customer data, while at the same time governments moving to restrict and decrypt new secure encryption technologies. Meanwhile, the market for security vulnerabilities grows with computer security experts able to sell software vulnerabilities from key technologies such as Apple and Google from $10,000 to $1.5 million dollars. Security activism is on the rise. Ethical Hacking is the non-violent use of a technology in pursuit of a cause, political or otherwise which is often legally and morally ambiguous. Ethical hacking may involve the acts of professional penetration intrusion testers and computer security experts, as other forms of emerging actions such as hacktivism and online civil disobedience. Increasingly, Hacktivism is a form of ethical hacking and also a form of civil rights activism in the digital age. Hacktivists believe in two general but spirited principles: respect for human rights and fundamental freedoms including freedom of expression and personal privacy, and the responsibility of government to be open, transparent and fully accountable to the public. In practice, however, hacktivists are as diverse in their backgrounds as they are in their agendas. How courts and governments will deal with hacking attempts which operate in a grey zone of the law and where different ethical views collide remains to be seen, as there are no exceptions to the cybercrime/computer crime provisions for security research or public interest in most jurisdictions around the globe. It will be equally difficult to determine how civil rights will apply to hacktivism. A fundamental discussion of key societal questions."-- |c Provided by publisher | ||
588 | 0 | |a Online resource; title from digital title page (viewed on May 17, 2019). | |
650 | 0 | |a Hacking |x Moral and ethical aspects |v Case studies. | |
650 | 6 | |a Piratage informatique |x Aspect moral |v Études de cas. | |
650 | 7 | |a SOCIAL SCIENCE |x Criminology. |2 bisacsh | |
650 | 7 | |a LAW |x Science & Technology. |2 bisacsh | |
653 | |a Anonymous. | ||
653 | |a Chaos Club. | ||
653 | |a Data Analytics. | ||
653 | |a Ethical Hacking. | ||
653 | |a Ethical hacking. | ||
653 | |a Hacktivism. | ||
653 | |a Human Rights. | ||
653 | |a Law. | ||
653 | |a Piratage éthique. | ||
653 | |a Policy. | ||
653 | |a activism. | ||
653 | |a activisme. | ||
653 | |a cause politique. | ||
653 | |a cybercrimes. | ||
653 | |a gouvernements ouverts. | ||
653 | |a hacktivism. | ||
653 | |a open government. | ||
653 | |a political cause. | ||
653 | |a transparence. | ||
653 | |a transparency. | ||
655 | 7 | |a Case studies |2 fast | |
655 | 7 | |a Case studies. |2 lcgft |0 http://id.loc.gov/authorities/genreForms/gf2017026140 | |
655 | 7 | |a Études de cas. |2 rvmgf | |
773 | 0 | |t Books at JSTOR: Open Access |d JSTOR | |
773 | 0 | |t OAPEN (Open Access Publishing in European Networks) |d OAPEN | |
776 | 0 | 8 | |i Print version: |a Maurushat, Alana. |t Ethical hacking. |d Ottawa, Ontario : University of Ottawa Press, 2019 |z 0776627910 |z 9780776627915 |w (OCoLC)1047554254 |
830 | 0 | |a Law, technology, and media. |1 http://viaf.org/viaf/316545403 |0 http://id.loc.gov/authorities/names/no2015149755 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2107145 |3 Volltext |
938 | |a hoopla Digital |b HOPL |n MWT12366378 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH36278056 | ||
938 | |a De Gruyter |b DEGR |n 9780776627922 | ||
938 | |a EBSCOhost |b EBSC |n 2107145 | ||
938 | |a YBP Library Services |b YANK |n 306114313 | ||
938 | |a YBP Library Services |b YANK |n 16174863 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1090539455 |
---|---|
_version_ | 1816882488061984768 |
adam_text | |
any_adam_object | |
author | Maurushat, Alana |
author_GND | http://id.loc.gov/authorities/names/no2013101558 |
author_facet | Maurushat, Alana |
author_role | aut |
author_sort | Maurushat, Alana |
author_variant | a m am |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773 .M3835 2019 |
callnumber-search | HV6773 .M3835 2019 |
callnumber-sort | HV 46773 M3835 42019 |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-4-EBA |
contents | Why ethical hacking? -- Essential terms and concepts -- Methodology and quantitative studies of ethical hacking : evidence-based decision and policy-making -- Legal cases around the world (with Jelena Ardalic) -- Select ethical-hacking incidences : Anonymous -- Select ethical-hacking incidences : Chaos Computer Club, CyberBerkut, Lulzsec, Iranian Cyber Army, and others -- Online civil disobedience -- Hacktivism -- Penetration/intrusion testing and vulnerability disclosure -- Counterattack/hackback -- Security activism -- Ethical-hacking challenges in legal frameworks, investigation, prosecution, and sentencing -- Ethical hacking, whistle-blowing, and human rights and freedoms -- Toward an ethical-hacking framework. |
ctrlnum | (OCoLC)1090539455 |
dewey-full | 364.16/8 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.16/8 |
dewey-search | 364.16/8 |
dewey-sort | 3364.16 18 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06420cam a2200949 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1090539455</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">190325t20192019oncab ob 000 0 eng </controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NLC</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">NLC</subfield><subfield code="d">YDX</subfield><subfield code="d">EBLCP</subfield><subfield code="d">N$T</subfield><subfield code="d">YDX</subfield><subfield code="d">OCLCF</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SFB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UBY</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">CN6UV</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ORE</subfield><subfield code="d">OCLCO</subfield><subfield code="d">DEGRU</subfield><subfield code="d">JSTOR</subfield><subfield code="d">YWS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">HOPLA</subfield><subfield code="d">UEJ</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">2019008748X</subfield><subfield code="2">can</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1450639773</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780776627922</subfield><subfield code="q">(electronic book)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0776627929</subfield><subfield code="q">(electronic book)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780776627946</subfield><subfield code="q">(electronic book)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0776627945</subfield><subfield code="q">(electronic book)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780776627939</subfield><subfield code="q">(electronic book)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0776627937</subfield><subfield code="q">(electronic book)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1090539455</subfield><subfield code="z">(OCoLC)1450639773</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">22573/ctv5vdbgn</subfield><subfield code="b">JSTOR</subfield></datafield><datafield tag="042" ind1=" " ind2=" "><subfield code="a">lac</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6773</subfield><subfield code="b">.M3835 2019</subfield></datafield><datafield tag="055" ind1=" " ind2="0"><subfield code="a">HV6773</subfield><subfield code="b">.M38 2019</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">SOC</subfield><subfield code="x">004000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">LAW</subfield><subfield code="x">099000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">364.16/8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">cci1icc</subfield><subfield code="2">lacc</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Maurushat, Alana,</subfield><subfield code="e">author.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2013101558</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ethical hacking /</subfield><subfield code="c">Alana Maurushat.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Ottawa, Ontario, Canada] :</subfield><subfield code="b">University of Ottawa Press,</subfield><subfield code="c">2019.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource :</subfield><subfield code="b">color illustrations, color maps</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Law, technology and media</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Why ethical hacking? -- Essential terms and concepts -- Methodology and quantitative studies of ethical hacking : evidence-based decision and policy-making -- Legal cases around the world (with Jelena Ardalic) -- Select ethical-hacking incidences : Anonymous -- Select ethical-hacking incidences : Chaos Computer Club, CyberBerkut, Lulzsec, Iranian Cyber Army, and others -- Online civil disobedience -- Hacktivism -- Penetration/intrusion testing and vulnerability disclosure -- Counterattack/hackback -- Security activism -- Ethical-hacking challenges in legal frameworks, investigation, prosecution, and sentencing -- Ethical hacking, whistle-blowing, and human rights and freedoms -- Toward an ethical-hacking framework.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments. The line of transparency is moving by force. The twitter page for Wikileaks demonstrates this ethos through its motto "we open governments" and its location to be "everywhere". At the same time, we see a battle between major technology companies such as Apple trying to make more secure products and to protect customer data, while at the same time governments moving to restrict and decrypt new secure encryption technologies. Meanwhile, the market for security vulnerabilities grows with computer security experts able to sell software vulnerabilities from key technologies such as Apple and Google from $10,000 to $1.5 million dollars. Security activism is on the rise. Ethical Hacking is the non-violent use of a technology in pursuit of a cause, political or otherwise which is often legally and morally ambiguous. Ethical hacking may involve the acts of professional penetration intrusion testers and computer security experts, as other forms of emerging actions such as hacktivism and online civil disobedience. Increasingly, Hacktivism is a form of ethical hacking and also a form of civil rights activism in the digital age. Hacktivists believe in two general but spirited principles: respect for human rights and fundamental freedoms including freedom of expression and personal privacy, and the responsibility of government to be open, transparent and fully accountable to the public. In practice, however, hacktivists are as diverse in their backgrounds as they are in their agendas. How courts and governments will deal with hacking attempts which operate in a grey zone of the law and where different ethical views collide remains to be seen, as there are no exceptions to the cybercrime/computer crime provisions for security research or public interest in most jurisdictions around the globe. It will be equally difficult to determine how civil rights will apply to hacktivism. A fundamental discussion of key societal questions."--</subfield><subfield code="c">Provided by publisher</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from digital title page (viewed on May 17, 2019).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hacking</subfield><subfield code="x">Moral and ethical aspects</subfield><subfield code="v">Case studies.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Piratage informatique</subfield><subfield code="x">Aspect moral</subfield><subfield code="v">Études de cas.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SOCIAL SCIENCE</subfield><subfield code="x">Criminology.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">LAW</subfield><subfield code="x">Science & Technology.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Anonymous.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Chaos Club.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Data Analytics.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Ethical Hacking.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Ethical hacking.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hacktivism.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Human Rights.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Law.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Piratage éthique.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Policy.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">activism.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">activisme.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cause politique.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cybercrimes.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">gouvernements ouverts.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">hacktivism.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">open government.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">political cause.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">transparence.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">transparency.</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Case studies</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Case studies.</subfield><subfield code="2">lcgft</subfield><subfield code="0">http://id.loc.gov/authorities/genreForms/gf2017026140</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Études de cas.</subfield><subfield code="2">rvmgf</subfield></datafield><datafield tag="773" ind1="0" ind2=" "><subfield code="t">Books at JSTOR: Open Access</subfield><subfield code="d">JSTOR</subfield></datafield><datafield tag="773" ind1="0" ind2=" "><subfield code="t">OAPEN (Open Access Publishing in European Networks)</subfield><subfield code="d">OAPEN</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Maurushat, Alana.</subfield><subfield code="t">Ethical hacking.</subfield><subfield code="d">Ottawa, Ontario : University of Ottawa Press, 2019</subfield><subfield code="z">0776627910</subfield><subfield code="z">9780776627915</subfield><subfield code="w">(OCoLC)1047554254</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Law, technology, and media.</subfield><subfield code="1">http://viaf.org/viaf/316545403</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2015149755</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2107145</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">hoopla Digital</subfield><subfield code="b">HOPL</subfield><subfield code="n">MWT12366378</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH36278056</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">De Gruyter</subfield><subfield code="b">DEGR</subfield><subfield code="n">9780776627922</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2107145</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">306114313</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">16174863</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Case studies fast Case studies. lcgft http://id.loc.gov/authorities/genreForms/gf2017026140 Études de cas. rvmgf |
genre_facet | Case studies Case studies. Études de cas. |
id | ZDB-4-EBA-on1090539455 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:29:24Z |
institution | BVB |
isbn | 9780776627922 0776627929 9780776627946 0776627945 9780776627939 0776627937 |
language | English |
oclc_num | 1090539455 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource : color illustrations, color maps |
psigel | ZDB-4-EBA |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | University of Ottawa Press, |
record_format | marc |
series | Law, technology, and media. |
series2 | Law, technology and media |
spelling | Maurushat, Alana, author. http://id.loc.gov/authorities/names/no2013101558 Ethical hacking / Alana Maurushat. [Ottawa, Ontario, Canada] : University of Ottawa Press, 2019. ©2019 1 online resource : color illustrations, color maps text txt rdacontent computer c rdamedia online resource cr rdacarrier Law, technology and media Includes bibliographical references. Why ethical hacking? -- Essential terms and concepts -- Methodology and quantitative studies of ethical hacking : evidence-based decision and policy-making -- Legal cases around the world (with Jelena Ardalic) -- Select ethical-hacking incidences : Anonymous -- Select ethical-hacking incidences : Chaos Computer Club, CyberBerkut, Lulzsec, Iranian Cyber Army, and others -- Online civil disobedience -- Hacktivism -- Penetration/intrusion testing and vulnerability disclosure -- Counterattack/hackback -- Security activism -- Ethical-hacking challenges in legal frameworks, investigation, prosecution, and sentencing -- Ethical hacking, whistle-blowing, and human rights and freedoms -- Toward an ethical-hacking framework. "The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments. The line of transparency is moving by force. The twitter page for Wikileaks demonstrates this ethos through its motto "we open governments" and its location to be "everywhere". At the same time, we see a battle between major technology companies such as Apple trying to make more secure products and to protect customer data, while at the same time governments moving to restrict and decrypt new secure encryption technologies. Meanwhile, the market for security vulnerabilities grows with computer security experts able to sell software vulnerabilities from key technologies such as Apple and Google from $10,000 to $1.5 million dollars. Security activism is on the rise. Ethical Hacking is the non-violent use of a technology in pursuit of a cause, political or otherwise which is often legally and morally ambiguous. Ethical hacking may involve the acts of professional penetration intrusion testers and computer security experts, as other forms of emerging actions such as hacktivism and online civil disobedience. Increasingly, Hacktivism is a form of ethical hacking and also a form of civil rights activism in the digital age. Hacktivists believe in two general but spirited principles: respect for human rights and fundamental freedoms including freedom of expression and personal privacy, and the responsibility of government to be open, transparent and fully accountable to the public. In practice, however, hacktivists are as diverse in their backgrounds as they are in their agendas. How courts and governments will deal with hacking attempts which operate in a grey zone of the law and where different ethical views collide remains to be seen, as there are no exceptions to the cybercrime/computer crime provisions for security research or public interest in most jurisdictions around the globe. It will be equally difficult to determine how civil rights will apply to hacktivism. A fundamental discussion of key societal questions."-- Provided by publisher Online resource; title from digital title page (viewed on May 17, 2019). Hacking Moral and ethical aspects Case studies. Piratage informatique Aspect moral Études de cas. SOCIAL SCIENCE Criminology. bisacsh LAW Science & Technology. bisacsh Anonymous. Chaos Club. Data Analytics. Ethical Hacking. Ethical hacking. Hacktivism. Human Rights. Law. Piratage éthique. Policy. activism. activisme. cause politique. cybercrimes. gouvernements ouverts. hacktivism. open government. political cause. transparence. transparency. Case studies fast Case studies. lcgft http://id.loc.gov/authorities/genreForms/gf2017026140 Études de cas. rvmgf Books at JSTOR: Open Access JSTOR OAPEN (Open Access Publishing in European Networks) OAPEN Print version: Maurushat, Alana. Ethical hacking. Ottawa, Ontario : University of Ottawa Press, 2019 0776627910 9780776627915 (OCoLC)1047554254 Law, technology, and media. http://viaf.org/viaf/316545403 http://id.loc.gov/authorities/names/no2015149755 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2107145 Volltext |
spellingShingle | Maurushat, Alana Ethical hacking / Law, technology, and media. Why ethical hacking? -- Essential terms and concepts -- Methodology and quantitative studies of ethical hacking : evidence-based decision and policy-making -- Legal cases around the world (with Jelena Ardalic) -- Select ethical-hacking incidences : Anonymous -- Select ethical-hacking incidences : Chaos Computer Club, CyberBerkut, Lulzsec, Iranian Cyber Army, and others -- Online civil disobedience -- Hacktivism -- Penetration/intrusion testing and vulnerability disclosure -- Counterattack/hackback -- Security activism -- Ethical-hacking challenges in legal frameworks, investigation, prosecution, and sentencing -- Ethical hacking, whistle-blowing, and human rights and freedoms -- Toward an ethical-hacking framework. Hacking Moral and ethical aspects Case studies. Piratage informatique Aspect moral Études de cas. SOCIAL SCIENCE Criminology. bisacsh LAW Science & Technology. bisacsh |
subject_GND | http://id.loc.gov/authorities/genreForms/gf2017026140 |
title | Ethical hacking / |
title_auth | Ethical hacking / |
title_exact_search | Ethical hacking / |
title_full | Ethical hacking / Alana Maurushat. |
title_fullStr | Ethical hacking / Alana Maurushat. |
title_full_unstemmed | Ethical hacking / Alana Maurushat. |
title_short | Ethical hacking / |
title_sort | ethical hacking |
topic | Hacking Moral and ethical aspects Case studies. Piratage informatique Aspect moral Études de cas. SOCIAL SCIENCE Criminology. bisacsh LAW Science & Technology. bisacsh |
topic_facet | Hacking Moral and ethical aspects Case studies. Piratage informatique Aspect moral Études de cas. SOCIAL SCIENCE Criminology. LAW Science & Technology. Case studies Case studies. Études de cas. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2107145 |
work_keys_str_mv | AT maurushatalana ethicalhacking |