Close Menu
    What's Hot
    – 20230173bccc501cd5ca1cb6d4e1a55309c444

    Child mental health forum to be held in Norristown

    May 13, 2024
    – 202309651575b3861327.14722519

    GameStop's stock prices surged when Roaring Kitty made a comeback on social media

    May 13, 2024
    – 202303van Jones 2023

    Van Jones criticized possible Trump VP candidates for avoiding 2024 election questions, saying it's like failing kindergarten

    May 13, 2024
    Facebook X (Twitter) Instagram Telegram
    Facebook X (Twitter) Instagram
    The Plaza JournalThe Plaza Journal
    Subscribe
    Sunday, June 22
    • Sports
      • American Football
      • Basketball
      • Baseball
      • Boxing
      • Cricket
      • Football
      • Hockey
      • Tennis
    • Politics
      – 2023102

      John Dean believes the hush money case against Trump is very strong

      May 13, 2024
      – 202405my screenshots 2024 05 13 at 85135am e1715608366191

      “Cruel and unfeeling” Trump assistant boasts about causing innocent homeless people to be arrested

      May 13, 2024
      – 202305stopthestealrally 01062021 getty

      Only 5 percent of people mention January 6th as the most important memory from Trump's presidency: Survey

      May 13, 2024
      – 202405AP24082659643362 e1714510107248

      7 in 10 say they’ve given a lot of thought to election: Gallup

      May 13, 2024
      – 202405AP24133009758539

      Trump: ‘Hannibal Lecter is a wonderful man’

      May 13, 2024
    • Technology
    • United States
    • United Kingdom
    • Business
    • Entertainment
    • Science
      1. Archaeology
      2. Anthropology
      3. Space
      4. Biology
      5. Ecology
      6. Geology
      7. Nanotechnology
      8. Neurology
      9. Paleontology
      10. Psychology
      11. Mathematics
      12. Geography
      13. Astrophysics
      14. Oceanography
      15. Physics
      Featured
      – 20240513unesco hunting cave

      How perspiration and endurance helped humans become excellent runners and hunters

      Biology May 13, 20244 Mins Read
      Recent
      – 20240513unesco hunting cave

      How perspiration and endurance helped humans become excellent runners and hunters

      May 13, 2024
      – 202405112024 aurora photos

      Amazing photos of colorful skies around the world as auroras shine in bright colors

      May 11, 2024
      – 20240510mosquitoes scotland

      Scotland has suddenly seen a large increase in mosquitoes

      May 10, 2024
    • Health
    Facebook X (Twitter) Instagram
    The Plaza JournalThe Plaza Journal
    Home»Technology

    How To Stop Hackers

    By Antoine SánchezMarch 18, 2019 Technology 7 Mins Read
    – 20190318IPWXIQOT5NHUJEVRPGP63ZOGUA
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Imagine a world where security guards learn to be robbers first. The guards take a class where they don black masks and smash through a glass case to appropriate jewels, or stick-up a bank and zip away.

    Once they’ve demonstrated their mastery of the challenges, and signed contracts vowing to never use their skills for evil, the guards graduate. If they choose, they can seek Ethical Bank Robbing certificates, or can hop right in to a career in security.

    That’s essentially how many young hackers (the friendly kind) are trained today. The first step for students, before moving into a government or Big Business job where they work to prevent hacks, is to learn the darker side of the trade: exploiting loopholes, thieving from servers, cracking passwords–and not just learning those techniques but actually performing them, in a classroom set up especially for the experience.

    The resulting classes–which have been cropping up at universities across the country for years now–are the closest thing around to official, sanctioned training grounds for hackers. With the Department of Defense and private industries looking to protect their secrets, the job’s only getting more important.

    * * *

    Pinning down when the first hacking class was taught, or even getting a count of them, is tough. For one thing, they go by different names: there are classes for “ethical hacking,” “penetration testing,” “topics in security,” and more.

    One reason for that fragmentation might be that it’s not always easy to start teaching one of these classes. Sam Bowne, a professor of ethical hacking at City College of San Francisco, encountered concerns at first with teaching students about what’s essentially criminal behavior in a free zone. Eventually, he told the administration that if any students strayed to the dark side, the university could “fire me and that would be the end of the class.”

    The students in that first class, and Bowne’s subsequent classes, didn’t use their powers for evil, at least as far as we know. “It’s possible that some of them are smart enough to be master criminals and smart enough to fool me, but I kind of doubt it.” He adds: “Really my students are not as dangerous as I wish they were.”

    Although it’s hard to find a case where a student in an ethical hacking class was caught up in a hacking scandal, other, similar classes have invoked ire. George Ledin, a professor at Sonoma State University, found himself in some controversy for teaching students how to create malware–the viruses that latch on to computers and surreptitiously steal information. Some anti-virus companies threatened to blacklist any of Ledin’s students from being hired. In some ways, what’s taught in ethical hacking classes is comparable to Ledin’s class, although more accepted in academics than making malware.

    ucsb security members in a room

    UCSB Security Lab

    Most of the ethical hacking classes share similar methods: a professor sets up a secure server, and only allows students to access it from computers in a designated lab. Those computers are connected to each other, but not to the internet at large. That turns them into the digital equivalent of dissection frogs–real-world learning tools placed in a not-quite-real-world setting. Professors can program the server with common vulnerabilities, and the students, as they learn the tricks of the trade, can hack inside using the skills they learn in the classroom. The names of those skills are esoteric–SQL injection, buffer overflow vulnerabilities, session hijacking–but can be broadly understood as people attempting to break in somewhere they wouldn’t normally be wanted.

    At John Black’s class at the University of Colorado, Boulder, for instance, Black structures the class like a game: students work through a series of “levels,” where, after they reach a goal by hacking past defenses, they earn access to the next level. The students, meanwhile, can see what level the other students are on as they go.

    Students learn the tricks they need to break past a system’s defenses, but not when to use which tricks. In other words, they get the keys, not the locks. “We won’t tell them exactly how to do it–they have to go and figure it out,” Black says. A student might, for example, use programs to broadly search for vulnerabilities in a computer. Once they find the weak point, they dig in with the relevant tool.

    Students get the keys, not the locks.That think-fast concept is taken one step further by Giovanni Vigna, whose Advanced Topics in Security class at the University of California, Santa Barbara inspired Black’s. There the learning process is similar, but the class is also a proving ground for what’s ultimately a test: iCTF, or International Capture The Flag, a competition where hackers across the world compete in a head-to-head, real-time hack-off. Each team–there were 80 teams of about a dozen at this year’s competition–keeps a bit of code hidden on their computers, and every other team attempts to spirit away the other teams’ code, while simultaneously defending their own. To do that, they need to know the ins and outs of both offensive and defensive hacking strategies. After spending weeks learning to “think about the stuff that the guy didn’t think about,” as Vigna describes it, they go in for competing against actual hackers.

    “Usually they get annihilated, sometimes they do okay,” Vigna says.

    It’s easy, of course, to learn this sort of thing on your own. Sites like hackthissite.org let users learn the hacking process, too. That’s not so difficult. “You can be a 14-year-old child and clever and hack into these big, important companies,” Bowne says. What matters, he says, are the skills to understand those hackers, then lock them out. But to do that, you have to understand how they think.

    * * *

    Graduating with honors from these classes is one thing, but finding a job afterward is another. Students can take an unrelated class and receive certificates, like Certified Ethical Hacker. Some hirers (like the Department of Defense) require one or more of these certificates, but their merit’s debatable. “They’re good checklists, but I think that a good security expert is somebody who’s been in the field and has experience,” Vigna says.

    What hacker classes do is give some formality to the process. There are standardized tests in classes (usually), and at least employers have some guarantee their potential hire is on the up-and-up.

    As for students straight out of school? Well, they can tell recruiters in an interview that they’ve taken a class and learned X, Y, and Z. But some extracurricular activities couldn’t hurt.

    Skylar Sokol was a student in Black’s class. He was looking for a career in the industry, and started a hacking club at the university. The team competed in a 10-team, live competition, as part of the National Collegiate Cyber Defense Competition. They took second. Then, something else happened. “One of the people from the company I got hired at ended up coming into our room and giving me a business card,” he says.

    Sounds a little closer to baseball scouting than corporate recruiting, maybe, but that’s not without precedent: the NSA has even gone trolling at hacker conferences to pick up talent.

    “I see this as the next generation of locksmiths,” Vigna says. Just, you know, the kind of locksmiths that went to lock-picking school first.

    Education
    Antoine Sánchez

    Keep Reading

    – 202309651575b3861327.14722519

    GameStop's stock prices surged when Roaring Kitty made a comeback on social media

    – 20240513Depositphotos 241148346 L

    Chicken fat supercapacitors may be able to store future green energy

    – 2024051100 header 2

    Battle of the AI bots: Copilot vs ChatGPT vs Gemini

    – 20240509how to share icloud storage

    How to distribute iCloud storage

    Add A Comment
    Leave A Reply Cancel Reply

    Must Read
    Latest Posts
    – 20230173bccc501cd5ca1cb6d4e1a55309c444

    Child mental health forum to be held in Norristown

    May 13, 2024
    – 202309651575b3861327.14722519

    GameStop's stock prices surged when Roaring Kitty made a comeback on social media

    May 13, 2024
    – 202303van Jones 2023

    Van Jones criticized possible Trump VP candidates for avoiding 2024 election questions, saying it's like failing kindergarten

    May 13, 2024
    – 20240513Depositphotos 241148346 L

    Chicken fat supercapacitors may be able to store future green energy

    May 13, 2024
    – 202405antisemitism

    Most students at prestigious universities believe that there is an issue with antisemitism, as per a survey conducted by U.S. News & World Report

    May 13, 2024
    The Plaza Journal White Logo
    X-twitter Facebook Google Pinterest Telegram

    News

    • World
    • US Politics
    • EU Politics
    • Business
    • Opinions
    • Connections
    • Science

    Company

    • Information
    • Advertising
    • Classified Ads
    • Contact Info
    • Do Not Sell Data
    • GDPR Policy
    • Media Kits

    The Plaza Journal

    • Contact Us
    • Subscription
    • Submit an Anonymous Tip
    • Newsletters
    • Sponsored News
    • Advertise With Us
    • Privacy Notice

    Keep updated

    Get the latest creative news from FooBar about art, design and business.

    Copyright © 2025 The Plaza Journal. All rights reserved.
    • Privacy Policy
    • Terms of Use
    • Cookie Policy
    • Accessibility

    Type above and press Enter to search. Press Esc to cancel.