CERIAS Tech Report 2005-43 THE DEVELOPMENT OF A MEANINGFUL HACKER TAXONOMY: A TWO DIMENSIONAL APPROACH
نویسنده
چکیده
The current paper extends and matures the earlier taxonomy framework of the author (Rogers, 1999), and provides a preliminary two dimensional classification model. While there is no one generic profile of a hacker, studies indicate that there are at least eight primary classification variables: Novices (NV), Cyber-Punks (CP), Internals (IN), Petty Thieves (PT), Virus Writers (VW), Old Guard hackers (OG), Professional Criminals (PC), and Information Warriors (IW), and 2 principal components, skill and motivation. Due to the complex nature and interactions of these variables and principal components, the traditional one-dimensional continuum is inadequate for model testing. A modified circular order circumplex is presented as a better method for developing a preliminary hacker taxonomy. The paper discusses the importance of developing a meaningful understanding of the hacker community and the various sub-groups. Directions for future research are also discussed.
منابع مشابه
CERIAS Tech Report 2005-67 SOFTWARE ENGINEERING FOR SECURE SOFTWARE - STATE OF THE ART: A SURVEY
This report contains a survey of the state of the art in software engineering for secure software. Secure software is defined and techniques used in each phase of the software lifecycle to engineer the development of secure software are described. Also identified are open questions and areas where further research is needed. The survey reported here was undertaken to understand how the practice...
متن کاملCERIAS Tech Report 2005-42 A POLICY FRAMEWORK FOR ACCESS MANAGEMENT IN FEDERATED INFORMATION SHARING
متن کامل
CERIAS Tech Report 2005-34 ON CONNECTING RED AND BLUE RECTANGLES WITH NONINTERSECTING MONOTONE RECTILINEAR PATHS
متن کامل
CERIAS Tech Report 2005-83 A THEORY BASED ON SECURITY ANALYSIS FOR COMPARING THE EXPRESSIVE POWER OF ACCESS CONTROL MODELS
Tripunitara, Mahesh V. Ph.D., Purdue University, December, 2005. A Theory Based on Security Analysis for Comparing the Expressive Power of Access Control Models. Major Professor: Ninghui Li. We present a theory for comparing the expressive power of access control models. Our theory is based on reductions that preserve the results of security analysis. Security analysis is an approach to the ver...
متن کاملCERIAS Tech Report 2002-31 REFERENCE MODELS FOR THE CONCEALMENT AND OBSERVATION OF ORIGIN IDENTITY IN STORE-AND-FORWARD NETWORKS
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005