jim geovedi
information security troublemaker, professional script kiddy
professional hackers
Slide 2
Slide 2 text
hackers
Slide 3
Slide 3 text
are hackers getting
paid now, like a pro?
Slide 4
Slide 4 text
professional hackers
Slide 5
Slide 5 text
corporate hackers
Slide 6
Slide 6 text
corporate hackers
programmer
deals with programming operating
systems or applications
Slide 7
Slide 7 text
corporate hackers
administrator
responsible for running special
equipment or whole infrastructures
Slide 8
Slide 8 text
corporate hackers
operator
sitting in front of a monitor (or several)
all days and evaluating output of logs
and system messages
Slide 9
Slide 9 text
corporate hackers
security officer
writing the security policies and
procedures for the company
decides what to do when security
incident is happening
defining security and access roles
Slide 10
Slide 10 text
corporate hackers
it auditor
independent organ within the
organisation which ensures the
adequateness of it controls
Slide 11
Slide 11 text
corporate hackers
consultant
works for a consultant company
(general consultant companies, it
consultant companies, or it security
companies)
Slide 12
Slide 12 text
corporate hackers
hacker
check security of networks, review
source code, etc.
hired to show to customers or press the
company employ cool person
Slide 13
Slide 13 text
independent hackers
Slide 14
Slide 14 text
independent hackers
operating system/software hacker
develop and improve system based on
personal interest
Slide 15
Slide 15 text
independent hackers
intrusion specialist
concentrate primarily on how to break-
in the system or network
Slide 16
Slide 16 text
independent hackers
vulnerability researcher
discovering the vulnerability and how to
take advantage of it
Slide 17
Slide 17 text
independent hackers
botnet owner
take control of thousands of hosts
rent the botnet for ddos, anonymous
proxy, spam, phising etc.
Slide 18
Slide 18 text
independent hackers
rootkit/trojan/virus writer
sometime work together with intrusion
specialists and botnet owner
Slide 19
Slide 19 text
independent hackers
spammer/fraudster
intend to result in financial or personal
gain
Slide 20
Slide 20 text
local hacking scene
Slide 21
Slide 21 text
how many professional hackers in
indonesia?
a question of ethics: hackers behaviour
real hackers vs. media whores
local hacking scene
Slide 22
Slide 22 text
skill development
certification for professional hackers
valuing our own skills
local hacking scene