Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Professional Hackers
Search
Jim Geovedi
June 12, 2009
Technology
0
120
Professional Hackers
Are hackers getting paid now, like a pro?
Jim Geovedi
June 12, 2009
Tweet
Share
More Decks by Jim Geovedi
See All by Jim Geovedi
Who's Smarter Than Machine?
geovedi
0
140
Unstructured Data is the New Gold: ML + NLP is the New Shiz!
geovedi
5
920
Machine Learning for Cybersecurity
geovedi
5
2.6k
Waluku: Answering Astronomy Questions through Social Media
geovedi
0
190
@begobet
geovedi
0
320
The 21st Century Bank Job
geovedi
0
150
Satellite Telephony Security
geovedi
0
91
Hacking a Bird in the Sky: The Revenge of Angry Birds
geovedi
0
140
Cloud Security - Security Aspects of Cloud Computing
geovedi
0
88
Other Decks in Technology
See All in Technology
SLI/SLO 導入で 避けるべきこと3選
yagikota
0
140
DDD×仕様駆動で回す高品質開発のプロセス設計
littlehands
5
2.1k
Escape from Excel方眼紙 ~マークダウンで繋ぐ、人とAIの架け橋~ /nikkei-tech-talk44
nikkei_engineer_recruiting
0
170
Windows ファイル共有(SMB)を再確認する
murachiakira
PRO
0
230
システム標準化PMOから ガバメントクラウドCoEへ
techniczna
1
170
事例から紐解くSHIFT流QA支援 ~大規模プロジェクトの品質管理支援、QA組織立ち上げ~ / 20260320 Nozomu Koketsu
shift_evolve
PRO
0
130
GitHub Copilot CLI で Azure Portal to Bicep
tsubakimoto_s
0
180
visionOS 開発向けの MCP / Skills をつくり続けることで XR の探究と学習を最大化
karad
1
1.2k
AIエージェント×GitHubで実現するQAナレッジの資産化と業務活用 / QA Knowledge as Assets with AI Agents & GitHub
tknw_hitsuji
0
170
Cortex Code CLI と一緒に進めるAgentic Data Engineering
__allllllllez__
0
620
中央集権型を脱却した話 分散型をやめて、連邦型にたどり着くまで
sansantech
PRO
1
200
Bill One 開発エンジニア 紹介資料
sansan33
PRO
5
18k
Featured
See All Featured
Understanding Cognitive Biases in Performance Measurement
bluesmoon
32
2.8k
GraphQLの誤解/rethinking-graphql
sonatard
75
11k
Getting science done with accelerated Python computing platforms
jacobtomlinson
2
150
Making the Leap to Tech Lead
cromwellryan
135
9.8k
職位にかかわらず全員がリーダーシップを発揮するチーム作り / Building a team where everyone can demonstrate leadership regardless of position
madoxten
62
52k
Future Trends and Review - Lecture 12 - Web Technologies (1019888BNR)
signer
PRO
0
3.3k
The Power of CSS Pseudo Elements
geoffreycrofte
82
6.2k
Evolving SEO for Evolving Search Engines
ryanjones
0
170
Building Experiences: Design Systems, User Experience, and Full Site Editing
marktimemedia
0
450
The Invisible Side of Design
smashingmag
302
51k
Reflections from 52 weeks, 52 projects
jeffersonlam
356
21k
Why Our Code Smells
bkeepers
PRO
340
58k
Transcript
jim geovedi information security troublemaker, professional script kiddy professional hackers
hackers
are hackers getting paid now, like a pro?
professional hackers
corporate hackers
corporate hackers programmer deals with programming operating systems or applications
corporate hackers administrator responsible for running special equipment or whole
infrastructures
corporate hackers operator sitting in front of a monitor (or
several) all days and evaluating output of logs and system messages
corporate hackers security officer writing the security policies and procedures
for the company decides what to do when security incident is happening defining security and access roles
corporate hackers it auditor independent organ within the organisation which
ensures the adequateness of it controls
corporate hackers consultant works for a consultant company (general consultant
companies, it consultant companies, or it security companies)
corporate hackers hacker check security of networks, review source code,
etc. hired to show to customers or press the company employ cool person
independent hackers
independent hackers operating system/software hacker develop and improve system based
on personal interest
independent hackers intrusion specialist concentrate primarily on how to break-
in the system or network
independent hackers vulnerability researcher discovering the vulnerability and how to
take advantage of it
independent hackers botnet owner take control of thousands of hosts
rent the botnet for ddos, anonymous proxy, spam, phising etc.
independent hackers rootkit/trojan/virus writer sometime work together with intrusion specialists
and botnet owner
independent hackers spammer/fraudster intend to result in financial or personal
gain
local hacking scene
how many professional hackers in indonesia? a question of ethics:
hackers behaviour real hackers vs. media whores local hacking scene
skill development certification for professional hackers valuing our own skills
local hacking scene
fin.