Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Professional Hackers
Search
Jim Geovedi
June 12, 2009
Technology
130
0
Share
Professional Hackers
Are hackers getting paid now, like a pro?
Jim Geovedi
June 12, 2009
More Decks by Jim Geovedi
See All by Jim Geovedi
Who's Smarter Than Machine?
geovedi
0
140
Unstructured Data is the New Gold: ML + NLP is the New Shiz!
geovedi
5
920
Machine Learning for Cybersecurity
geovedi
5
2.6k
Waluku: Answering Astronomy Questions through Social Media
geovedi
0
200
@begobet
geovedi
0
330
The 21st Century Bank Job
geovedi
0
150
Satellite Telephony Security
geovedi
0
93
Hacking a Bird in the Sky: The Revenge of Angry Birds
geovedi
0
140
Cloud Security - Security Aspects of Cloud Computing
geovedi
0
89
Other Decks in Technology
See All in Technology
LLM時代の検索アーキテクチャと技術的意思決定
shibuiwilliam
3
1.2k
コミュニティ・勉強会を作るのは目的じゃない
ohmori_yusuke
0
200
こんなアーキテクチャ図はいやだ / Anti-pattern in AWS Architecture Diagrams
naospon
1
450
Claude Code を安全に使おう勉強会 / Claude Code Security Basics
masahirokawahara
11
32k
2026年、知っておくべき最新 サーバレスTips10選/serverless-10-tips
slsops
13
5.2k
ワールドカフェI /チューターを改良する / World Café I and Improving the Tutors
ks91
PRO
0
320
EBS暗号化に失敗してEC2が動かなくなった話
hamaguchimmm
2
200
Data Hubグループ 紹介資料
sansan33
PRO
0
2.9k
AgentCore×VPCでの設計パターンn選と勘所
har1101
3
280
Keeping Ruby Running on Cygwin
fd0
0
150
Introduction to Bill One Development Engineer
sansan33
PRO
0
410
#jawsugyokohama 100 LT11, "My AWS Journey 2011-2026 - kwntravel"
shinichirokawano
0
350
Featured
See All Featured
Leo the Paperboy
mayatellez
7
1.7k
Discover your Explorer Soul
emna__ayadi
2
1.1k
SEO in 2025: How to Prepare for the Future of Search
ipullrank
3
3.4k
HU Berlin: Industrial-Strength Natural Language Processing with spaCy and Prodigy
inesmontani
PRO
0
320
Rails Girls Zürich Keynote
gr2m
96
14k
Design of three-dimensional binary manipulators for pick-and-place task avoiding obstacles (IECON2024)
konakalab
0
400
SEOcharity - Dark patterns in SEO and UX: How to avoid them and build a more ethical web
sarafernandez
0
170
DevOps and Value Stream Thinking: Enabling flow, efficiency and business value
helenjbeal
1
170
Evolution of real-time – Irina Nazarova, EuRuKo, 2024
irinanazarova
9
1.3k
Crafting Experiences
bethany
1
110
Visualizing Your Data: Incorporating Mongo into Loggly Infrastructure
mongodb
49
9.9k
The Curse of the Amulet
leimatthew05
1
11k
Transcript
jim geovedi information security troublemaker, professional script kiddy professional hackers
hackers
are hackers getting paid now, like a pro?
professional hackers
corporate hackers
corporate hackers programmer deals with programming operating systems or applications
corporate hackers administrator responsible for running special equipment or whole
infrastructures
corporate hackers operator sitting in front of a monitor (or
several) all days and evaluating output of logs and system messages
corporate hackers security officer writing the security policies and procedures
for the company decides what to do when security incident is happening defining security and access roles
corporate hackers it auditor independent organ within the organisation which
ensures the adequateness of it controls
corporate hackers consultant works for a consultant company (general consultant
companies, it consultant companies, or it security companies)
corporate hackers hacker check security of networks, review source code,
etc. hired to show to customers or press the company employ cool person
independent hackers
independent hackers operating system/software hacker develop and improve system based
on personal interest
independent hackers intrusion specialist concentrate primarily on how to break-
in the system or network
independent hackers vulnerability researcher discovering the vulnerability and how to
take advantage of it
independent hackers botnet owner take control of thousands of hosts
rent the botnet for ddos, anonymous proxy, spam, phising etc.
independent hackers rootkit/trojan/virus writer sometime work together with intrusion specialists
and botnet owner
independent hackers spammer/fraudster intend to result in financial or personal
gain
local hacking scene
how many professional hackers in indonesia? a question of ethics:
hackers behaviour real hackers vs. media whores local hacking scene
skill development certification for professional hackers valuing our own skills
local hacking scene
fin.