Slide 1

Slide 1 text

jim geovedi information security troublemaker, professional script kiddy professional hackers

Slide 2

Slide 2 text

hackers

Slide 3

Slide 3 text

are hackers getting paid now, like a pro?

Slide 4

Slide 4 text

professional hackers

Slide 5

Slide 5 text

corporate hackers

Slide 6

Slide 6 text

corporate hackers programmer deals with programming operating systems or applications

Slide 7

Slide 7 text

corporate hackers administrator responsible for running special equipment or whole infrastructures

Slide 8

Slide 8 text

corporate hackers operator sitting in front of a monitor (or several) all days and evaluating output of logs and system messages

Slide 9

Slide 9 text

corporate hackers security officer writing the security policies and procedures for the company decides what to do when security incident is happening defining security and access roles

Slide 10

Slide 10 text

corporate hackers it auditor independent organ within the organisation which ensures the adequateness of it controls

Slide 11

Slide 11 text

corporate hackers consultant works for a consultant company (general consultant companies, it consultant companies, or it security companies)

Slide 12

Slide 12 text

corporate hackers hacker check security of networks, review source code, etc. hired to show to customers or press the company employ cool person

Slide 13

Slide 13 text

independent hackers

Slide 14

Slide 14 text

independent hackers operating system/software hacker develop and improve system based on personal interest

Slide 15

Slide 15 text

independent hackers intrusion specialist concentrate primarily on how to break- in the system or network

Slide 16

Slide 16 text

independent hackers vulnerability researcher discovering the vulnerability and how to take advantage of it

Slide 17

Slide 17 text

independent hackers botnet owner take control of thousands of hosts rent the botnet for ddos, anonymous proxy, spam, phising etc.

Slide 18

Slide 18 text

independent hackers rootkit/trojan/virus writer sometime work together with intrusion specialists and botnet owner

Slide 19

Slide 19 text

independent hackers spammer/fraudster intend to result in financial or personal gain

Slide 20

Slide 20 text

local hacking scene

Slide 21

Slide 21 text

how many professional hackers in indonesia? a question of ethics: hackers behaviour real hackers vs. media whores local hacking scene

Slide 22

Slide 22 text

skill development certification for professional hackers valuing our own skills local hacking scene

Slide 23

Slide 23 text

fin.