Legal issues in computer security research

Legal issues in computer security research

Alternate title: How not to get busted for hacking if you're a security researcher

Presented at AtlSecCon 2014.

07feb1c4a2aaf22752c9924b95db944f?s=128

Mike Doherty

March 20, 2014
Tweet

Transcript

  1. 1.
  2. 3.
  3. 6.

    While the only secure computer is one that is turned

    off, the need for running systems overwhelms us.
  4. 9.
  5. 15.
  6. 17.
  7. 23.
  8. 26.

    “You may not do any of the following while accessing

    or using [Twitter]: ... probe, scan, or test the vulnerability of any system”
  9. 27.
  10. 29.
  11. 39.

    How

  12. 40.

    White hat hackers are hired by businesses... Black hat hackers,

    who work independently, are intent upon destruction
  13. 47.