|
7 | 7 |
|
8 | 8 | #set text(font: "Noto Sans Mono", weight: "regular", size: 20pt) |
9 | 9 | #show math.equation: set text(font: "Fira Math") |
10 | | -#set strong(delta: 100) |
11 | | -#set par(justify: true) |
12 | 10 |
|
13 | 11 | #title-slide( |
14 | 12 | title: [Module 01: Ethics], |
15 | | - subtitle: [Hacker Ethics - Guiding Principles in IT Security], |
| 13 | + subtitle: [Hacker Ethics – Guiding Principles in IT Security], |
16 | 14 | ) |
17 | 15 |
|
18 | | -#slide(title: "What is Hacker Ethics")[ |
19 | | -A framework for: |
| 16 | +#slide(title: "Outline")[ |
| 17 | + #metropolis-outline |
| 18 | +] |
| 19 | + |
| 20 | +#new-section-slide("Introduction to Hacker Ethics") |
20 | 21 |
|
| 22 | +#slide(title: "Definition")[ |
| 23 | + #defbox( |
| 24 | + title: [Hacker Ethics], |
| 25 | + [ |
| 26 | + *Hacker ethics* are moral values shaping how individuals in the cybersecurity community act. |
21 | 27 |
|
22 | | -- Ethical hacking |
| 28 | + They emphasize: |
23 | 29 |
|
| 30 | + - Curiosity, creativity, and freedom of information |
| 31 | + - Responsible behavior in the digital world |
| 32 | + - A tradition originating in the 1960s/70s, codified by Steven Levy (1984) |
24 | 33 |
|
25 | | -- Decision-making in IT security |
| 34 | + *Not about crime—about exploration and improving systems.* |
| 35 | + ], |
| 36 | + ) |
| 37 | +] |
26 | 38 |
|
| 39 | +#new-section-slide("Core Principles") |
27 | 40 |
|
28 | | -*Emphasizes integrity, information sharing, and non-malicious intent.* |
| 41 | +#slide(title: "Core Principles – Part 1")[ |
| 42 | + 1. *Information should be free* |
| 43 | + |
| 44 | + Open knowledge promotes innovation and transparency. |
29 | 45 |
|
30 | | -] |
| 46 | + 2. *Unlimited access to learning tools* |
| 47 | + |
| 48 | + Hands-on exploration (*tinkering*) fosters understanding. |
31 | 49 |
|
32 | | -#slide(title: "Key Principles")[ |
33 | | -1. *Free Information:* Knowledge as a universal good. |
| 50 | + 3. *Mistrust authority – promote decentralization* |
| 51 | + |
| 52 | + Power should be distributed, not centralized. |
34 | 53 |
|
| 54 | + #alert("Inspired by hacker subcultures at MIT and beyond.") |
| 55 | +] |
| 56 | + |
| 57 | +#slide(title: "Core Principles – Part 2")[ |
| 58 | + 4. *Judge by skill, not status* |
| 59 | + |
| 60 | + Merit over formal credentials. |
35 | 61 |
|
36 | | -2. *Open Access:* Encourage exploration. |
| 62 | + 5. *Code as art* |
| 63 | + |
| 64 | + Beauty in elegant solutions and creative hacks. |
37 | 65 |
|
| 66 | + 6. *Computers can improve lives* |
| 67 | + |
| 68 | + #alert("Ethical use of tech to empower people and fix broken systems.") |
| 69 | +] |
38 | 70 |
|
39 | | -3. *Decentralization:* Avoid single points of failure. |
| 71 | +#new-section-slide("Ethical Dilemmas") |
| 72 | + |
| 73 | +#slide(title: "Ethical Dilemmas Overview")[ |
| 74 | + #set table( |
| 75 | + stroke: none, |
| 76 | + gutter: 0.2em, |
| 77 | + fill: (x, y) => if x == 0 or y == 0 { |
| 78 | + gray |
| 79 | + }, |
| 80 | + inset: (right: 1.5em), |
| 81 | + ) |
| 82 | + #table( |
| 83 | + columns: 3, |
| 84 | + align: (left, left, left), |
| 85 | + [*Category*], [*Intent*], [*Typical Actions*], |
| 86 | + [White Hat], [Improve security], [Authorized testing, reporting], |
| 87 | + [Grey Hat], [Ambiguous], [Unsolicited testing], |
| 88 | + [Black Hat], [Personal gain], [Exploitation, theft], |
| 89 | + ) |
| 90 | + |
| 91 | + #alert("Ethics are shaped not just by actions—but also by intent and context.") |
| 92 | +] |
40 | 93 |
|
| 94 | +#slide(title: "Dilemma 1: Vulnerability Disclosure")[ |
| 95 | + *What should you do when you find a vulnerability?* |
41 | 96 |
|
42 | | -4. *Meritocracy:* Skills over titles. |
| 97 | + - *Responsible disclosure:* Notify vendors, give time to fix |
| 98 | + - *Full disclosure:* Go public to pressure action |
| 99 | + - *Non-disclosure:* Risky but sometimes done |
43 | 100 |
|
| 101 | + #alert("⟶ Community norms favor responsible, coordinated disclosure.") |
44 | 102 | ] |
45 | 103 |
|
46 | | -#slide(title: "Creativity and Impact")[ |
47 | | -- *Artistic Expression:* Creativity through technology. |
| 104 | +#slide(title: "Dilemma 2: Privacy vs. Security")[ |
| 105 | + *How do we balance protection and freedom?* |
48 | 106 |
|
| 107 | + - Surveillance can prevent threats—but may violate privacy |
| 108 | + - Ethical hackers support: |
49 | 109 |
|
50 | | -- *Positive Change:* Technology as a catalyst for improvement. |
| 110 | + - Privacy-preserving tech (e.g., encryption) |
| 111 | + - Transparent oversight and accountability |
51 | 112 |
|
| 113 | + #alert("“Security” is not an excuse to erase rights.") |
52 | 114 | ] |
53 | 115 |
|
54 | | -#slide(title: "Ethical Dilemmas")[ |
55 | | -1. *Vulnerability Disclosure:* Immediate, notify, or private? |
| 116 | +#slide(title: "Dilemma 3: Gray Hat Behavior")[ |
| 117 | + **Is it okay to break rules for a good cause?** |
56 | 118 |
|
| 119 | + - Access without permission—then report flaws |
| 120 | + - Intention is good, but legality is unclear |
| 121 | + - Laws like the CFAA make this a risky path |
57 | 122 |
|
58 | | -2. *Privacy vs. Security:* Balancing individual rights. |
| 123 | + #alert("⚠️ Even good intentions can lead to legal consequences.") |
| 124 | +] |
| 125 | + |
| 126 | +#new-section-slide("Conclusion") |
| 127 | + |
| 128 | +#slide(title: "Conclusion")[ |
| 129 | + Hacker ethics are about #alert("how") and #alert("why") we hack. |
| 130 | + |
| 131 | + They call for: |
59 | 132 |
|
| 133 | + - Curiosity, creativity, and responsibility |
| 134 | + - Openness and meritocracy |
| 135 | + - Continuous reflection and legal awareness |
60 | 136 |
|
61 | | -3. *Gray Hat Activities:* Navigating ethical boundaries. |
| 137 | + #alert("Ethical hacking is about building a better, safer digital world.") |
| 138 | +] |
62 | 139 |
|
| 140 | +#slide(title: "Further Reading")[ |
| 141 | + - *Hackers* – Steven Levy (1984) |
| 142 | + - *The Hacker Ethic* – Pekka Himanen (2001) |
| 143 | + - *The Cathedral and the Bazaar* – Eric S. Raymond (1999) |
| 144 | + - *Coordinated Vulnerability Disclosure* – Householder et al. (2020) |
| 145 | + - *Economics of Privacy* – Acquisti et al. (2015) |
| 146 | + - *Ethical Analysis of Hacking* – Denning et al. (2014) |
63 | 147 | ] |
64 | 148 |
|
| 149 | +#title-slide( |
| 150 | + title: [Module 01: Ethics], |
| 151 | + subtitle: [Hacker Ethics – Guiding Principles in IT Security], |
| 152 | +) |
0 commit comments