Spelling suggestions: "subject:"hackers"" "subject:"packers""
31 |
Hacktivismo e organizações midiáticas: hackeamento de narrativas em wikileaks e mídia ninjaLira, Isadora Teixeira de 21 August 2017 (has links)
Submitted by Leonardo Cavalcante (leo.ocavalcante@gmail.com) on 2018-04-06T19:36:10Z
No. of bitstreams: 1
Arquivototal.pdf: 2079200 bytes, checksum: 06b2527ecca826172c32b42bb3ef3e3c (MD5) / Made available in DSpace on 2018-04-06T19:36:10Z (GMT). No. of bitstreams: 1
Arquivototal.pdf: 2079200 bytes, checksum: 06b2527ecca826172c32b42bb3ef3e3c (MD5)
Previous issue date: 2017-08-21 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES / The maxim that says "information is power" takes on a larger and more complex dimension
when experienced in the era of the spread of Internet access and the revolution of microcomputing.
In this sense, we understand the hacktivist, as a political actor because of the
possibilities of activism that are tied to their technical expertise. For this study, we conducted
eight interviews, among researchers and hacktivists. We used A. Samuel (2004) to bring
typologies of practices and definitions of hacktivism, M. Castells (2003, 2013), to instruct the
research about internet legislation, M. Machado (2013, 2015) and S. Silveira (2010, 2015),
who approach and research hacktivism in Brazil, and e F. Malini e H. Antoun (2013), with the
definition about narrative hacker. Our research is centralized on the hacktivists organizations
media, such as WikiLeaks and Mídia Ninja, focusing on two specific cases in which the
organizations acted as narrative hackers: during the economic crisis in Iceland in 2008 and
during the June Journeys of 2013, in Brazil, respectively. We verify that the two cases of
hacking preceded and stressed the debate about digital rights and internet access, resulting in
digital rights laws in their respective countries. / A máxima que diz ―informação é poder‖ toma uma dimensão maior e mais complexa quando
vivenciada na era da propagação do acesso à internet e da revolução da microinformática.
Neste sentido, entendemos o hacktivista, como um ator político em razão das possibilidades
de ativismo que estão atreladas à sua perícia técnica. Para este estudo, realizamos oito
entrevistas, dentre pesquisadores e hacktivistas e como escopo teórico utilizamos A. Samuel
(2004), para trazer tipologias de práticas e definições de hacktivismo, M. Castells (2003,
2013), para tratar das pesquisas sobre legislação na internet, M. Machado (2013, 2015) e S.
Silveira (2010, 2015), que abordam e pesquisam o hacktivismo no Brasil, e F. Malini e H.
Antoun (2013), com sua definição de hacker de narrativas. Nossa pesquisa fica centrada nas
organizações midiáticas hacktivistas, tais como WikiLeaks e Mídia Ninja, focando em dois
casos específicos nos quais as organizações atuaram como hacker de narrativas: durante a
crise econômica da Islândia em 2008 e durante as Jornadas de Junho de 2013, no Brasil,
respectivamente. Constatamos que os dois hackeamentos predisseram e tensionaram o debate
acerca de direitos digitais e acesso à internet, resultando em legislações sobre direitos digitais
nos respectivos países.
|
32 |
Os saberes desenvolvidos nas práticas em um hackerspace de Porto AlegreBurtet, Cecilia Gerhardt January 2014 (has links)
Na tentativa de compreender como os saberes são desenvolvidos nas práticas de um grupo em um hackerspace, este estudo parte da perspectiva da aprendizagem baseada em práticas pelo viés da abordagem teórico-metodológica da teoria atorrede para acompanhar a realização das atividades cotidianas de um coletivo em um hackerspace. Sem definições prévias estabelecidas acerca do conceito de hackerspace, o estudo tem como objetivo compreender como os saberes são desenvolvidos nas práticas de um grupo, em um hackerspace, e como são enactados pelas relações entre os diversos elementos heterogêneos da rede. Para isso, foi necessário, além da análise das práticas predominantes no cotidiano do coletivo, identificar e descrever – considerando humanos e não humanos de forma simétrica – como os processos de aprendizagem são engendrados nessas práticas, passando a constituir saberes. A fim de viabilizar a pesquisa, desenvolveu-se um estudo, orientado pela teoria ator-rede como método e lente de análise, entre os meses de dezembro de 2013 e setembro de 2014, em um hackerspace localizado em Porto Alegre, RS. Com o propósito de alcançar os objetivos formulados nesse trabalho, são descritas e analisadas as principais práticas predominantes na organização pesquisada e seus processos de aprendizagem, revelando que práticas, saberes e aprendizagem coexistem e se encontram imbricadas no constante organizar do coletivo. A incompletude de ser e as hibridizações enactadas nas práticas são discutidas posteriormente e denotam a agência dos não humanos, oriunda de arranjos momentaneamente estabelecidos entre os actantes da rede. A pesquisa revelou a complexidade dos saberes, que se encontram vinculados a um conjunto de práticas conectadas, uma vez que são constituídos por elas, ao mesmo tempo em que as constituem, sendo engendrados nas relações heterogêneas da rede. / In order to understand how the knowledge is developed in the practices of a hackerspace group, this research proceeds from the learning perspective of practices based on the theoretical and methodological approach of the actor-network theory bias to monitor daily activities of a collective in a hackerspace. Without previous definition of the concept of hackerspace, this study objective is to comprehend how the knowledge is developed in a group, in a hackerspace, and how it is accomplished by the relationship between the various heterogeneous network elements. For this, it was necessary, in addition to analyze the current practices in the daily life of the group, identify and describe – considering symmetrically humans and nonhumans – how the learning processes are fomented in these practices and built into knowledge. In order to accredit the research, a study was developed, based on the actor-network theory as the method of the analysis, from December 2013 to September 2014, in a hackerspace located in Porto Alegre, RS. With the purpose to achieve the goals of this research, the key practices and learning processes of the studied organization are described and analyzed, revealing that practice, knowledge and learning are intertwined and coexist in the group. The incompleteness of being and the hybridizations accomplished in the practices are discussed posteriorly and denote the agency of nonhumans, emerged from momentaneous arrangements established among the actants of the network. The study reveals the complexity of knowledge, which is linked to a group of practices, as it is constituted by them and in the same time it constitutes them, being engendered in the heterogeneous relations of the network.
|
33 |
Log analysis aided by latent semantic mappingBuys, Stephanus 14 April 2013 (has links)
In an age of zero-day exploits and increased on-line attacks on computing infrastructure, operational security practitioners are becoming increasingly aware of the value of the information captured in log events. Analysis of these events is critical during incident response, forensic investigations related to network breaches, hacking attacks and data leaks. Such analysis has led to the discipline of Security Event Analysis, also known as Log Analysis. There are several challenges when dealing with events, foremost being the increased volumes at which events are often generated and stored. Furthermore, events are often captured as unstructured data, with very little consistency in the formats or contents of the events. In this environment, security analysts and implementers of Log Management (LM) or Security Information and Event Management (SIEM) systems face the daunting task of identifying, classifying and disambiguating massive volumes of events in order for security analysis and automation to proceed. Latent Semantic Mapping (LSM) is a proven paradigm shown to be an effective method of, among other things, enabling word clustering, document clustering, topic clustering and semantic inference. This research is an investigation into the practical application of LSM in the discipline of Security Event Analysis, showing the value of using LSM to assist practitioners in identifying types of events, classifying events as belonging to certain sources or technologies and disambiguating different events from each other. The culmination of this research presents adaptations to traditional natural language processing techniques that resulted in improved efficacy of LSM when dealing with Security Event Analysis. This research provides strong evidence supporting the wider adoption and use of LSM, as well as further investigation into Security Event Analysis assisted by LSM and other natural language or computer-learning processing techniques. / LaTeX with hyperref package / Adobe Acrobat 9.54 Paper Capture Plug-in
|
34 |
Os saberes desenvolvidos nas práticas em um hackerspace de Porto AlegreBurtet, Cecilia Gerhardt January 2014 (has links)
Na tentativa de compreender como os saberes são desenvolvidos nas práticas de um grupo em um hackerspace, este estudo parte da perspectiva da aprendizagem baseada em práticas pelo viés da abordagem teórico-metodológica da teoria atorrede para acompanhar a realização das atividades cotidianas de um coletivo em um hackerspace. Sem definições prévias estabelecidas acerca do conceito de hackerspace, o estudo tem como objetivo compreender como os saberes são desenvolvidos nas práticas de um grupo, em um hackerspace, e como são enactados pelas relações entre os diversos elementos heterogêneos da rede. Para isso, foi necessário, além da análise das práticas predominantes no cotidiano do coletivo, identificar e descrever – considerando humanos e não humanos de forma simétrica – como os processos de aprendizagem são engendrados nessas práticas, passando a constituir saberes. A fim de viabilizar a pesquisa, desenvolveu-se um estudo, orientado pela teoria ator-rede como método e lente de análise, entre os meses de dezembro de 2013 e setembro de 2014, em um hackerspace localizado em Porto Alegre, RS. Com o propósito de alcançar os objetivos formulados nesse trabalho, são descritas e analisadas as principais práticas predominantes na organização pesquisada e seus processos de aprendizagem, revelando que práticas, saberes e aprendizagem coexistem e se encontram imbricadas no constante organizar do coletivo. A incompletude de ser e as hibridizações enactadas nas práticas são discutidas posteriormente e denotam a agência dos não humanos, oriunda de arranjos momentaneamente estabelecidos entre os actantes da rede. A pesquisa revelou a complexidade dos saberes, que se encontram vinculados a um conjunto de práticas conectadas, uma vez que são constituídos por elas, ao mesmo tempo em que as constituem, sendo engendrados nas relações heterogêneas da rede. / In order to understand how the knowledge is developed in the practices of a hackerspace group, this research proceeds from the learning perspective of practices based on the theoretical and methodological approach of the actor-network theory bias to monitor daily activities of a collective in a hackerspace. Without previous definition of the concept of hackerspace, this study objective is to comprehend how the knowledge is developed in a group, in a hackerspace, and how it is accomplished by the relationship between the various heterogeneous network elements. For this, it was necessary, in addition to analyze the current practices in the daily life of the group, identify and describe – considering symmetrically humans and nonhumans – how the learning processes are fomented in these practices and built into knowledge. In order to accredit the research, a study was developed, based on the actor-network theory as the method of the analysis, from December 2013 to September 2014, in a hackerspace located in Porto Alegre, RS. With the purpose to achieve the goals of this research, the key practices and learning processes of the studied organization are described and analyzed, revealing that practice, knowledge and learning are intertwined and coexist in the group. The incompleteness of being and the hybridizations accomplished in the practices are discussed posteriorly and denote the agency of nonhumans, emerged from momentaneous arrangements established among the actants of the network. The study reveals the complexity of knowledge, which is linked to a group of practices, as it is constituted by them and in the same time it constitutes them, being engendered in the heterogeneous relations of the network.
|
35 |
Contribuição do hacker para o desenvolvimento tecnológico da informáticaBach, Sirlei Lourdes January 2001 (has links)
Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Tecnológico. Programa de Pós-Graduação em Ciência da Computação. / Made available in DSpace on 2012-10-19T12:25:48Z (GMT). No. of bitstreams: 0Bitstream added on 2014-09-25T20:01:43Z : No. of bitstreams: 1
184565.pdf: 8279207 bytes, checksum: 24d5f3b085dc3ef82704a988dfaf46c0 (MD5) / Dada a enorme importância política, econômica e social da Internet, urge realizar-se um estudo sobre a evolução das formas de invasão dos chamados piratas eletrônicos. Para tal, buscou-se primeiramente classificá-los de acordo com a terminologia empregada no ambiente virtual, resgatando a origem do termo hacker, o qual tem sofrido mutações devido ao uso equivocado pela mídia. Na seqüência, as falhas que são exploradas pelos piratas eletrônicos são apresentadas, seus modus operandis e as tecnologias de defesa e de prevenção, as quais são divulgadas e passíveis de conhecimento, embora sejam ignoradas ou desconhecidas por muitos administradores e desenvolvedores de sistemas, já que a insegurança nos sistemas é decorrente de falhas amplamente conhecidas com soluções já determinadas. Por fim, buscou-se resgatar a contribuição que tais piratas exercem no desenvolvimento e no aprimoramento tecnológico, evidenciado em suas habilidades, agregadas à dedicação e ao trabalho cooperativo, exigindo assim qualidade nos produtos e serviços oferecidos. Uma maneira de minimizar a insegurança dos sistemas, é manter um conhecimento detalhado e atualizado das tecnologias existentes, característica inerente aos piratas eletrônicos. Assim, reconhecendo suas habilidades e incentivando-os a aprimorarem os sistemas de segurança, os esforços que hoje são despendidos nestes sistemas, poderão ser transferidos para outros desafios.
|
36 |
Os saberes desenvolvidos nas práticas em um hackerspace de Porto AlegreBurtet, Cecilia Gerhardt January 2014 (has links)
Na tentativa de compreender como os saberes são desenvolvidos nas práticas de um grupo em um hackerspace, este estudo parte da perspectiva da aprendizagem baseada em práticas pelo viés da abordagem teórico-metodológica da teoria atorrede para acompanhar a realização das atividades cotidianas de um coletivo em um hackerspace. Sem definições prévias estabelecidas acerca do conceito de hackerspace, o estudo tem como objetivo compreender como os saberes são desenvolvidos nas práticas de um grupo, em um hackerspace, e como são enactados pelas relações entre os diversos elementos heterogêneos da rede. Para isso, foi necessário, além da análise das práticas predominantes no cotidiano do coletivo, identificar e descrever – considerando humanos e não humanos de forma simétrica – como os processos de aprendizagem são engendrados nessas práticas, passando a constituir saberes. A fim de viabilizar a pesquisa, desenvolveu-se um estudo, orientado pela teoria ator-rede como método e lente de análise, entre os meses de dezembro de 2013 e setembro de 2014, em um hackerspace localizado em Porto Alegre, RS. Com o propósito de alcançar os objetivos formulados nesse trabalho, são descritas e analisadas as principais práticas predominantes na organização pesquisada e seus processos de aprendizagem, revelando que práticas, saberes e aprendizagem coexistem e se encontram imbricadas no constante organizar do coletivo. A incompletude de ser e as hibridizações enactadas nas práticas são discutidas posteriormente e denotam a agência dos não humanos, oriunda de arranjos momentaneamente estabelecidos entre os actantes da rede. A pesquisa revelou a complexidade dos saberes, que se encontram vinculados a um conjunto de práticas conectadas, uma vez que são constituídos por elas, ao mesmo tempo em que as constituem, sendo engendrados nas relações heterogêneas da rede. / In order to understand how the knowledge is developed in the practices of a hackerspace group, this research proceeds from the learning perspective of practices based on the theoretical and methodological approach of the actor-network theory bias to monitor daily activities of a collective in a hackerspace. Without previous definition of the concept of hackerspace, this study objective is to comprehend how the knowledge is developed in a group, in a hackerspace, and how it is accomplished by the relationship between the various heterogeneous network elements. For this, it was necessary, in addition to analyze the current practices in the daily life of the group, identify and describe – considering symmetrically humans and nonhumans – how the learning processes are fomented in these practices and built into knowledge. In order to accredit the research, a study was developed, based on the actor-network theory as the method of the analysis, from December 2013 to September 2014, in a hackerspace located in Porto Alegre, RS. With the purpose to achieve the goals of this research, the key practices and learning processes of the studied organization are described and analyzed, revealing that practice, knowledge and learning are intertwined and coexist in the group. The incompleteness of being and the hybridizations accomplished in the practices are discussed posteriorly and denote the agency of nonhumans, emerged from momentaneous arrangements established among the actants of the network. The study reveals the complexity of knowledge, which is linked to a group of practices, as it is constituted by them and in the same time it constitutes them, being engendered in the heterogeneous relations of the network.
|
37 |
Governance responses to hacking in the banking sector of South Africa : an exploratory studyRoos, Christiaan J. 20 November 2013 (has links)
D.Comm. (Auditing) / Organisations today are critically dependent on IT to enable business operations and ensure competitiveness in a growing international marketplace. At the same time, IT also introduces significant risks, such as hacking. The board of directors is ultimately responsible for mitigating IT risk as a component of business risk. This task is included in its corporate governance responsibilities, which, in the South African context, is underpinned by the King Code of Corporate Governance. The board of directors also plays a key role in identifying and enabling the most appropriate responses to IT risk, including hacking. This inevitably necessitates greater focus on and understanding of risks such as hacking. The determined and elusive nature of hackers makes them a significant threat to organisations today. Not only are hackers characterised by various profiles and motives, but they are also exceptionally skilled in exploiting weak security practices and software vulnerabilities, with attack techniques which range from non-technical social engineering to advanced technical attacks and exploits. Hackers are role-players in cybercrime and cyber warfare, as is evident from the media and information security survey results explored in this thesis, in particular within the banking sector, which is the financial backbone of the country. It is for this reason that the South African banking sector has been selected as the target population for this study. This study considers the meaning and nature of hacking, viewing it as either a risk or an event, which requires preventative or detective responses. The effect of hacking on business risks is explored next by identifying common business risks and common IT risks themes, where after the fundamental links between hacking and the IT risk themes are established. This study further argues that business risks are increased by IT risks, which implies that, by indirect association, business risks are increased by hacking. A response to this threat is required, in particular from a governance perspective, with the board of directors playing a fundamental role in supporting the appropriate responses. This study explores the advantages and disadvantages of various responses to hacking, highlighting the point that most traditional responses are not effective enough in fully mitigating the hacking threat. It is argued that ethical hacking is an effective response to the threat of hacking. The nature of ethical hacking is explored, including its objectives, motivation, advantages and disadvantages. The multi-faceted nature of the ethical hacking response is also considered. In order to explore the risks and responses to hacking in the banking sector in South Africa, an analysis of annual reports was conducted and two questionnaires were administered. The analysis of the annual reports of the 16 locally registered banks in South Africa highlighted differences in disclosure practices around IT risk, IT governance and hacking. This was followed by empirical testing in the local banking sector, by using a mixed-method approach in order to solicit mostly quantitative, but also qualitative, responses from company secretaries and individuals responsible for IT at the 16 locally registered banks. The results of the questionnaires indicated that the board of directors is not fully embracing its IT governance responsibilities and that IT matters are mostly dealt with by risk management committees at board level or IT steering committees at executive management level. The effect of IT risks on business risks such as human resource risk and physical risk is underestimated. Respondents were unclear about the effect of hacking on IT risks, such as IT human resource risk and lack of software development. The local banking sector is not fully aware of how hacking can affect organisations, and banks are not making enough use of ethical hacking as a response to the hacker threat. This is the first study of its kind to explore ethical hacking in the context of governance responses. The study breaks new ground by providing a unique in-depth analysis of the link between business risk, IT risk and hacking. It is also the first study into the various responses to hacking in the SA banking sector and will assist not only the banking industry but business at large in defining appropriate preventative and detective responses to hacking.
|
38 |
A Psychosocial Behavioral Attribution Model: Examining the Relationship Between the “Dark Triad” and Cyber-Criminal Behaviors Impacting Social Networking SitesWithers, Kim 01 January 2019 (has links)
This study proposes that individual personality characteristics and behavioral triggering effects come together to motivate online victimization. It draws from psychology’s current understanding of personality traits, attribution theory, and criminological research. This study combines the current computer deviancy and hacker taxonomies with that of the Dark Triad model of personality mapping. Each computer deviant behavior is identified by its distinct dimensions of cyber-criminal behavior (e.g., unethical hacking, cyberbullying, cyberstalking, and identity theft) and analyzed against the Dark Triad personality factors (i.e., narcissism, Machiavellianism, and psychopathy). The goal of this study is to explore whether there are significant relationships among the Dark Triad personality traits and specific cyber-criminal behaviors within social network sites (SNSs).
The study targets offensive security engineers and computer deviants from specific hacker conferences and from websites that discuss or promote computer deviant behavior (e.g., hacking). Additional sampling is taken from a general population of SNS users. Using a snowball sampling method, 235 subjects completed an anonymous, self-report survey that includes items measuring computer deviance, personality traits, and demographics. Results yield that there was no significant relationship between Dark Triad and cyber-criminal behaviors defined in the perceived hypotheses.
The final chapter of the study summarizes the results and discusses the mechanisms potentially underlying the findings. In the context of achieving the latter objective, exploratory analyses are incorporated and partly relied upon. It also includes a discussion concerning the implications of the findings in terms of providing theoretical insights on the Dark Triad traits and cyber-criminal behaviors more generally.
|
39 |
What Makes Them Click? Applying The Rational Choice Perspective To The Hacking UndergroundBachmann, Michael 01 January 2008 (has links)
The increasing dependence of modern societies, industries, and individuals on information technology and computer networks renders them ever more vulnerable to attacks on critical IT infrastructures. While the societal threat posed by hackers and other types of cyber-criminals has been growing significantly in the last decade, main-stream criminology has only recently begun to realize the significance of this threat. Cyber-criminology is slowly emerging as a subfield of criminological study and has yet to overcome many of the problems other areas of criminological research have already mastered. Aside from substantial methodological and theoretical problems, cyber-criminology currently also suffers from the scarcity of available data. As a result, scientific answers to crucial questions, such as who exactly the attackers are and why they engage in hacking activities, remain largely fragmentary. The present study begins to fill this remaining gap in the literature. It examines survey data about hackers, their involvement in hacking, their motivations to hack, and their hacking careers. The data for this study was collected during a large hacking convention in Washington D.C. in February 2008. The theoretical framework guiding the analyses is the rational choice perspective (Clarke & Cornish, 1985). Several hypotheses about hackers are derived from the theory and some of its models are transposed into the context of hackers. Results suggest that the rational choice perspective is a viable theory when applied to cyber-criminals. Findings also demonstrate that the creation of more effective countermeasures requires adjustments to our understanding of who hackers really are and why they hack.
|
40 |
Poliítica e resistências protocolares: torções e reforços no diagrama da sociedade de controle / Protocol resistance: twists and strengthen in the control society diagramRivero, Facundo Guerra 26 May 2006 (has links)
Made available in DSpace on 2016-04-25T20:21:37Z (GMT). No. of bitstreams: 1
resistenciasprotocololares.pdf: 1911757 bytes, checksum: fb058f2802dff579fdb7fabfd81640b0 (MD5)
Previous issue date: 2006-05-26 / This study investigates contemporary manifestations of resistance. The starting point
for such study is the flow of information - the Internet is deemed herein as the model
diagram and a fundamentally important mechanism, entwined in power relations in
the control society. Resistance and control are inevitably associated and therefore
operate through this mechanism. Hence, this study investigates not only contemporary
control, which operates through mechanisms of social subjection and mechanistic
servitude, where men are components of a machine, controlled and directed by a
superior unit, found in this study to be in protocols, operated in turn by molar and
molecular lines that seal the Internet s control grid, but escape lines are also
contemplated, represented by hackers, who assemble as war machines and throw
themselves against the State apparatus and the global war machines in search of
freedom / Este trabalho investiga expressões de resistências contemporâneas. O fluxo
informacional é um ponto de partida para o estudo destas resistências - a Internet é
aqui pensada como modelo de diagrama e mecanismo de suma importância que
atravessa as relações de poder na sociedade de controle. Resistências e controle
formam par indissociável e operam através deste mecanismo, portanto. Assim, não só
o controle contemporâneo é investigado neste estudo, controle que se dá através de
mecanismos de servidão maquínica e sujeição social, onde homens são peças
constituintes de uma máquina, sob controle e direção de uma unidade superior, aqui
encontrada nos protocolos, protocolos que por sua vez são operados por linhas molares
e linhas moleculares, que fecham as malhas de controle da Internet, mas também são
contempladas suas linhas de fuga, representadas pelos hackers, que formam máquinas
de guerra e lançam-se contra os aparelhos de Estado e as máquinas de guerra mundiais
em busca de liberdade
|
Page generated in 0.0279 seconds