The 6 “Need- to- Knows” why and how to make use of Ethical Hacking

GDI.Foundation

A safer Internet for everybody and everywhere

GDI.Foundation

1. Why... The internet is plagued by criminal organizations. They take advantage of “simple” security problems than can be misused. Also the digital skills of criminals seems to develop rapidly. For example, in 2015 there were several digital attacks by criminals which were notable for their good organization, accurate implementation and technical sophistication1. In most cases criminals, and terrorists, want specific information to commit crime. Most often the main motivation is to gain financial benefit or to destabilize structures2. Ethical hacking is an additional instrument in IT security environment and can be deployed to prevent the digital misuse by criminals and minimize the opportunity to take away money or information due to the lack of IT security.

1 2

CyberSecurityAssesmentNetherlands (NCSC) Economic cyber espionage, cyberterrosisme, cyberextremisme (AIVD)

d.d. 16 feb. 2016

pag. 1

2. Ethical hacking organizations

is

applicable

for

all

types

of

Ethical hacking is applicable for all types of organizations to prevent fraud, digital terrorism, ransomware, malware infections, data breaches etc.. Not only the multinationals are a target but also smaller companies and individuals to gain financial benefit. However only a minority of organizations make use of the ethical hackers and their knowledge to prevent them self of criminal cases in various domains, or to develop intelligence how criminals can access the IT environment and data. The knowledge of the ethical hackers is often skipped in strategic analyses, threat assessment and during the evaluation of the vulnerabilities/ controls of their environment. This shows that the full potential of the ethical hacker is yet to be understood, developed and implemented.

d.d. 16 feb. 2016

pag. 2

3. Ethical Hacking is part of the IT Governance, Risk and Control & “Corporate Social Responsibility” Ideally, ethical hackers are involved in all stages of the IT governance to get more “in control” of the IT risk and controls. From a proactive identification of hacking threads (risk assessment), up to the most added value, evidence about the discovered “easy to get” vulnerabilities due to the lack of IT security. However in many cases the presence and know how of ethical hackers is not brought into the IT Governance, IT risk and control frameworks. Also rewarding a ethical hacker when being informed about a high risk vulnerability, is not yet part of the “Corporate Social Responsibility” of a company. Although the information (could have) saved the company and the community a lot of money a/o misuse of sensitive information, the reward for the work that's done is negligible or not even a thanks is being heard. This is a missed opportunity. By recognizing and involving the ethical hacker as a professional in all stages and as part of the Corporate Social Responsibility, the knowledge of the ethical hacker will be optimist in the advantage of everybody.

d.d. 16 feb. 2016

pag. 3

4. Wide-Ranging awareness about ethical hacking is essential The awareness about ethical hacking is needed at all levels in the organization: from basic- IT security awareness at the top of the organization to highly specialist (forensic) security expertise. To make the IT more secure it’s important that everybody in the organization is aware of the need to combine the knowledge of the different expertise. To unravel the vulnerabilities behind complex cross-border IT structures and to implement effective controls, the knowledge of all the different experts is needed. This includes the ethical hacker.

d.d. 16 feb. 2016

pag. 4

5. Cross-border is key to success in preventing hacking opportunities Criminals and terrorists are not limited by borders in the attacks to gain access. As long as there is Internet. In an everglobalizing world, organized crime (and terrorism) nearly always crosses borders. In 2015 many digital attacks were placed in a geopolitical context, such as the malware attacks related to the conflict in the Ukraine. Besides that, the outsourcing of IT across the world and the many connectives between devices and back office, makes it necessary to widen the view of risk and controls. The focus of a ethical hacker is also not limited by country borders, organizations or other limitations. Effective crossborder cooperation and exchange of information between the involved authorities, ethical hackers and organizations are essential to achieve success.

d.d. 16 feb. 2016

pag. 5

6. Global crime needs a global approach Besides cross-border cooperation, a global multidisciplinary approach is important to prevent the misuse of the data. The Internet opens up access to a world of information and resources, but also provides a global highway for organisations and criminals. The best results are delivered when all the different expertise are combined and the professionals work together by sharing the information and know how. The challenge is how to work together and inform each other in a global world. Agreements between governments how to act when a vulnerability response is being reported by an ethical hacker is an essential part in helping each other and sharing the information. Good agreements will give all the parties more assurance how to contribute to the common goal of increasing the security of information systems world wide. Embracing the guideline “Responsible Disclosure3” by the governments would be a good start in a global and multidisciplinary cooperation. It provides safeguards for hackers, researchers and organizations to inform each other and is a guideline about the do’s and dont’s for all the actors. With this it will be able to make use of the knowledge of everybody across the world who finds a vulnerability and wants to inform the ones that are at risk.

3

https://www.ncsc.nl/binaries/content/documents/ncsc-en/current-topics/news/responsibledisclosure-guideline/1/Responsible%2BDisclosure%2BENG.pdf

d.d. 16 feb. 2016

pag. 6

WILLING TO HELP..? We are a non profit organization that rely on contribution in the form of a donation, sponsorship and participating members. With your support we are able to continue our ethical hacking work and make it possible to reward others who helped in detecting, informing and advising organizations.

See for more information or if you want to help in any other way: GDI.Foundation/ Support Us

d.d. 16 feb. 2016

Mail [email protected] [email protected]

pag. 7

The _6 need-to-know_ why and how to make use of Ethical Hacking.pdf

The _6 need-to-know_ why and how to make use of Ethical Hacking.pdf. The _6 need-to-know_ why and how to make use of Ethical Hacking.pdf. Open. Extract.

845KB Sizes 0 Downloads 150 Views

Recommend Documents

Rational and ethical use of topical corticosteroids based on safety ...
Rational and ethical use of topical corticosteroids based on safety and efficacy.pdf. Rational and ethical use of topical corticosteroids based on safety and ...

English Brainstormers-Ready-to-Use Games and Activities that Make ...
English Brainstormers-Ready-to-Use Games and Activities that Make Language Skills.pdf. English Brainstormers-Ready-to-Use Games and Activities that Make ...

How to Use the MBTI.pdf
Personality Types and the MBTI Method. Use the MBTI To Understand Personality Types. This tool is a personality diagnosis based on the work of Carl Jung. It is a way for. you to understand your “preferred” personality and the personalities of oth

How to use the Axure libraries - GitHub
Open Axure RP 8. The libraries and template files are created using version 8, they won't work in version 7 or earlier. We suggest you upgrade to the latest ...

How professors use the language of “perception” to explain ...
Sep 15, 2016 - For example, a male associate professor said, “I guess there's a perception among a lot of women that a career in engineering isn't desirable.

PDF Download How to Make Use of a Useless Degree ...
ISBN-10 : 0425152987 q. ISBN-13 : 9780425152980 q. Book Synopsis. A unique career manual that takes into consideration the realities of the modern job market shares a candid guide to making a living through both traditional and alternative approaches

Read and Download How to Make Money Trading the Ichimoku ...
Charts PDF-Online Library. Books detail. Title : Read and Download How to Make Money q. Trading the Ichimoku System: Guide to Candlestick. Cloud Charts ...

How to Make Use of Such An Experience in Monetary ...
May 8, 2012 - Institute of Economic Research, Hitotsubashi University, Tokyo. 10. ... software package (EViews, ... production schedule of large companies. 2.

No title
Good to Great: Why Some Companies Make the Leap and Others Don't By Jim ... 2,000 pages of interview transcripts and created 384 megabytes of computer.