"Who was that masked man"?

System penetrations - friend or foe?

Research output: Book chapter/Published conference paperChapter in textbook/reference book

1 Citation (Scopus)

Abstract

This chapter explores a range of hacking techniques that can be used for either malicious or good purposes. It focuses on the role of the penetration tester, also known as a white hat hacker, or an ethical hacker. The discussion highlights the need to employ ethical hackers to expose system vulnerabilities so that they can be addressed before they are exploited by criminals or other threat actors. Because the techniques and methods used by ethical hackers are largely the same as those used by malicious hackers, there are some risks that need to be considered. Moreover, that there is a need for improving the standard of professionalism amongst ethical hackers, through certification, education and validation. Professionals in this area of IT assist organizations to mitigate cyber threats, not only by testing systems, but also in reviewing policies, procedures and controls. Ethical hackers are thus, an integral component of a mature security program.
Original languageEnglish
Title of host publicationCyber weaponry
Subtitle of host publicationIssues and implications of digital arms
EditorsHenry Prunckun
Place of PublicationNew York
PublisherSpringer
Chapter9
Pages113-124
Number of pages12
ISBN (Electronic)9783319741079
ISBN (Print)9783319741062
DOIs
Publication statusPublished - 2018

Publication series

NameAdvanced Sciences and Technologies for Security Applications
PublisherSpringer
ISSN (Electronic)1613-5113

Fingerprint

hacker
threat
certification
vulnerability

Cite this

Thomas, G., Low, G., & Burmeister, O. (2018). "Who was that masked man"? System penetrations - friend or foe? In H. Prunckun (Ed.), Cyber weaponry: Issues and implications of digital arms (pp. 113-124). (Advanced Sciences and Technologies for Security Applications). New York: Springer. https://doi.org/10.1007/978-3-319-74107-9_9
Thomas, Georg ; Low, Greg ; Burmeister, Oliver. / "Who was that masked man"? System penetrations - friend or foe?. Cyber weaponry: Issues and implications of digital arms. editor / Henry Prunckun. New York : Springer, 2018. pp. 113-124 (Advanced Sciences and Technologies for Security Applications).
@inbook{5bef27fc26d64ca1822519493e85c43a,
title = "{"}Who was that masked man{"}?: System penetrations - friend or foe?",
abstract = "This chapter explores a range of hacking techniques that can be used for either malicious or good purposes. It focuses on the role of the penetration tester, also known as a white hat hacker, or an ethical hacker. The discussion highlights the need to employ ethical hackers to expose system vulnerabilities so that they can be addressed before they are exploited by criminals or other threat actors. Because the techniques and methods used by ethical hackers are largely the same as those used by malicious hackers, there are some risks that need to be considered. Moreover, that there is a need for improving the standard of professionalism amongst ethical hackers, through certification, education and validation. Professionals in this area of IT assist organizations to mitigate cyber threats, not only by testing systems, but also in reviewing policies, procedures and controls. Ethical hackers are thus, an integral component of a mature security program.",
author = "Georg Thomas and Greg Low and Oliver Burmeister",
year = "2018",
doi = "10.1007/978-3-319-74107-9_9",
language = "English",
isbn = "9783319741062",
series = "Advanced Sciences and Technologies for Security Applications",
publisher = "Springer",
pages = "113--124",
editor = "Henry Prunckun",
booktitle = "Cyber weaponry",
address = "United States",

}

Thomas, G, Low, G & Burmeister, O 2018, "Who was that masked man"? System penetrations - friend or foe? in H Prunckun (ed.), Cyber weaponry: Issues and implications of digital arms. Advanced Sciences and Technologies for Security Applications, Springer, New York, pp. 113-124. https://doi.org/10.1007/978-3-319-74107-9_9

"Who was that masked man"? System penetrations - friend or foe? / Thomas, Georg; Low, Greg; Burmeister, Oliver.

Cyber weaponry: Issues and implications of digital arms. ed. / Henry Prunckun. New York : Springer, 2018. p. 113-124 (Advanced Sciences and Technologies for Security Applications).

Research output: Book chapter/Published conference paperChapter in textbook/reference book

TY - CHAP

T1 - "Who was that masked man"?

T2 - System penetrations - friend or foe?

AU - Thomas, Georg

AU - Low, Greg

AU - Burmeister, Oliver

PY - 2018

Y1 - 2018

N2 - This chapter explores a range of hacking techniques that can be used for either malicious or good purposes. It focuses on the role of the penetration tester, also known as a white hat hacker, or an ethical hacker. The discussion highlights the need to employ ethical hackers to expose system vulnerabilities so that they can be addressed before they are exploited by criminals or other threat actors. Because the techniques and methods used by ethical hackers are largely the same as those used by malicious hackers, there are some risks that need to be considered. Moreover, that there is a need for improving the standard of professionalism amongst ethical hackers, through certification, education and validation. Professionals in this area of IT assist organizations to mitigate cyber threats, not only by testing systems, but also in reviewing policies, procedures and controls. Ethical hackers are thus, an integral component of a mature security program.

AB - This chapter explores a range of hacking techniques that can be used for either malicious or good purposes. It focuses on the role of the penetration tester, also known as a white hat hacker, or an ethical hacker. The discussion highlights the need to employ ethical hackers to expose system vulnerabilities so that they can be addressed before they are exploited by criminals or other threat actors. Because the techniques and methods used by ethical hackers are largely the same as those used by malicious hackers, there are some risks that need to be considered. Moreover, that there is a need for improving the standard of professionalism amongst ethical hackers, through certification, education and validation. Professionals in this area of IT assist organizations to mitigate cyber threats, not only by testing systems, but also in reviewing policies, procedures and controls. Ethical hackers are thus, an integral component of a mature security program.

U2 - 10.1007/978-3-319-74107-9_9

DO - 10.1007/978-3-319-74107-9_9

M3 - Chapter in textbook/reference book

SN - 9783319741062

T3 - Advanced Sciences and Technologies for Security Applications

SP - 113

EP - 124

BT - Cyber weaponry

A2 - Prunckun, Henry

PB - Springer

CY - New York

ER -

Thomas G, Low G, Burmeister O. "Who was that masked man"? System penetrations - friend or foe? In Prunckun H, editor, Cyber weaponry: Issues and implications of digital arms. New York: Springer. 2018. p. 113-124. (Advanced Sciences and Technologies for Security Applications). https://doi.org/10.1007/978-3-319-74107-9_9