Kim Crawley

Last updated

Kim Crawley is a Canadian author of books and articles on IT security specifically [1] [2] [3] [4] and on hacker and computer literacy in general. [5] [6] [7] Of Maltese descent, her first hand-on-experience with computers was with her novelist father's Windows 3.1 OEM PC. Her IT career proper began with being employed as customer support, which first piqued her interest in malware. A wide-ranging consultant, [8] free-lancer [9] and self-described generalist, she has written and consulted for tech companies such as AT&T, BlackBerry, NGINX, Synack, and Hack The Box. She has published with O'Reilly Media, Packt Publishing, John Wiley & Sons, Inc., etc., and lives in Toronto, Canada, where she assiduously maintains a punk/goth aesthetic and DIY ethos. She is an autistic with ADHD. [10] [11] [12] [13] [14]

Related Research Articles

The hacker culture is a subculture of individuals who enjoy—often in collective effort—the intellectual challenge of creatively overcoming the limitations of software systems or electronic hardware, to achieve novel and clever outcomes. The act of engaging in activities in a spirit of playfulness and exploration is termed hacking. However, the defining characteristic of a hacker is not the activities performed themselves, but how it is done and whether it is exciting and meaningful. Activities of playful cleverness can be said to have "hack value" and therefore the term "hacks" came about, with early examples including pranks at MIT done by students to demonstrate their technical aptitude and cleverness. The hacker culture originally emerged in academia in the 1960s around the Massachusetts Institute of Technology (MIT)'s Tech Model Railroad Club (TMRC) and MIT Artificial Intelligence Laboratory. Hacking originally involved entering restricted areas in a clever way without causing any major damage. Some famous hacks at the Massachusetts Institute of Technology were placing of a campus police cruiser on the roof of the Great Dome and converting the Great Dome into R2-D2.

<span class="mw-page-title-main">Steven Levy</span> American journalist (born 1951)

Steven Levy is an American journalist and editor at large for Wired who has written extensively for publications on computers, technology, cryptography, the internet, cybersecurity, and privacy. He is the author of the 1984 book Hackers: Heroes of the Computer Revolution, which chronicles the early days of the computer underground. Levy published eight books covering computer hacker culture, artificial intelligence, cryptography, and multi-year exposés of Apple, Google, and Facebook. His most recent book, Facebook: The Inside Story, recounts the history and rise of Facebook from three years of interviews with employees, including Chamath Palihapitiya, Sheryl Sandberg, and Mark Zuckerberg.

A white hat is an ethical security hacker. Ethical hacking is a term meant to imply a broader category than just penetration testing. Under the owner's consent, white-hat hackers aim to identify any vulnerabilities or security issues the current system has. The white hat is contrasted with the black hat, a malicious hacker; this definitional dichotomy comes from Western films, where heroic and antagonistic cowboys might traditionally wear a white and a black hat, respectively. There is a third kind of hacker known as a grey hat who hacks with good intentions but at times without permission.

A security hacker or security researcher is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers.

<span class="mw-page-title-main">Window Snyder</span> Computer security expert (born 1975)

Mwende Window Snyder, better known as Window Snyder, is an American computer security expert. She has been a top security officer at Square, Inc., Apple, Fastly, Intel and Mozilla Corporation. She was also a senior security strategist at Microsoft. She is co-author of Threat Modeling, a standard manual on application security.

<span class="mw-page-title-main">Cyberethics</span> Ethics of online activities

Cyberethics is "a branch of ethics concerned with behavior in an online environment". In another definition, it is the "exploration of the entire range of ethical and moral issues that arise in cyberspace" while cyberspace is understood to be "the electronic worlds made visible by the Internet." For years, various governments have enacted regulations while organizations have defined policies about cyberethics.

<span class="mw-page-title-main">Charlie Miller (security researcher)</span> American computer security researcher

Charles Alfred Miller is an American computer security researcher with Cruise Automation. Prior to his current employment, he spent five years working for the National Security Agency and has worked for Uber.

Offensive Security Certified Professional is an ethical hacking certification offered by Offensive Security that teaches penetration testing methodologies and the use of the tools included with the Kali Linux distribution. The OSCP is a hands-on penetration testing certification, requiring holders to successfully attack and penetrate various live machines in a safe lab environment. It is considered more technical than other ethical hacking certifications, and is one of the few certifications that requires evidence of practical penetration testing skills.

Michael Gregg is an American computer security specialist, businessman, author and co-author, some of his books include; Build Your Own Network Security Lab and Inside Network Security Assessment. He has also served as an expert witness before a congressional committee on cyber security and identity theft.

<span class="mw-page-title-main">Gabriella Coleman</span> Internet anthropologist

Enid Gabriella Coleman is an anthropologist, academic and author whose work focuses on politics and cultures of hacking and online activism, and has worked on distinct hacker communities, such as free and open-source software hackers, Anonymous and security hackers, among others. She holds the rank of full professor at Harvard University's Department of Anthropology.

<span class="mw-page-title-main">ZAP (software)</span> Open-source web application security scanner

ZAP is a dynamic application security testing tool published under the Apache License. When used as a proxy server it allows the user to manipulate all of the traffic that passes through it, including HTTPS encrypted traffic. It can also run in a daemon mode which is then controlled via a REST-based API.

Offensive Security is an American international company working in information security, penetration testing and digital forensics. Operating from around 2007, the company created open source projects, advanced security courses, the ExploitDB vulnerability database, and the Kali Linux distribution. The company was started by Mati Aharoni, and employs security professionals with experience in security penetration testing and system security evaluation. The company has provided security counseling and training to many technology companies.

Terry Cutler is a Canadian cyber security expert and teacher, often described as an "ethical hacker" for his long term work with cyber security and protection. Cutler is the founder, former CTO, and current CEO of Cyology Labs and the vice-president of cyber security at SIRCO. He is also the creator of "The Course On Internet Safety". Cyology Labs's focal point is cyber security and data safety. Prior to founding Cyology Labs in 2015, Cutler founded Digital Locksmiths, Inc. focusing on data security of cloud and mobile solutions. Cutler is an often cited source on Cyber security and has been featured on various televisions shows across Canada. He describes himself as a "cyologist", a trademarked term of his own invention for a person who works in cyber security.

<span class="mw-page-title-main">Eva Galperin</span> American cybersecurity, privacy and anti-stalkerware activist

Eva Galperin is the Director of Cybersecurity at the Electronic Frontier Foundation (EFF) and technical advisor for the Freedom of the Press Foundation. She is noted for her extensive work in protecting global privacy and free speech and for her research on malware and nation-state spyware.

<span class="mw-page-title-main">Charles Edge (computer scientist)</span> American computer scientist and author (died 2024)

Charles Edge was an American computer scientist, author, podcaster, and a contributing author for Inc.com and Huffington Post.

<span class="mw-page-title-main">Una-May O'Reilly</span> American computer scientist

Una-May O'Reilly is a Canadian computer scientist and leader of the Anyscale Learning For All (ALFA) group at the MIT Computer Science and Artificial Intelligence Laboratory.

<span class="mw-page-title-main">Robert Willis (hacker)</span> Ethical hacker and publisher of comics

Robert Willis, also known as rej_ex, is an American hacker and comic book writer. He is known for his work with the Sakura Samurai white-hat hacking group, and his contributions to the Wiley Tribe of Hackers book series. In 2015, he helped build a platform and strategy for news syndication for his client Natural News, a fake news website. The site was ultimately used to promote the candidacy of Donald Trump against Hillary Clinton across hundreds of sister websites; the pieces would reach over 30 million people a week prior to the 2016 election.

vx-underground, also known as VXUG, is an educational website about malware and cybersecurity. It claims to have the largest online repository of malware. The site was launched in May, 2019 and has grown to host over 35 million pieces of malware samples. On their account on Twitter, VXUG reports on and verifies cybersecurity breaches.

ExploitDB, sometimes stylized as Exploit Database or Exploit-Database, is a public and open source vulnerability database maintained by Offensive Security. It is one of the largest and most popular exploit databases in existence. While the database is publicly available via their website, the database can also be used by utilizing the searchsploit command-line tool which is native to Kali Linux.

References

  1. https://ieeexplore.ieee.org/abstract/document/9932369/authors#authors
  2. LibraryThing via www.librarything.com.
  3. Wylie, Phillip L.; Crawley, Kim (November 24, 2020). The Pentester BluePrint: Starting a Career as an Ethical Hacker. Wiley. ISBN   978-1119684305.
  4. Crawley, Kim (November 24, 2023). Cloud Penetration Testing for Red Teamers: Learn how to effectively pentest AWS, Azure, and GCP applications. Packt Publishing. ISBN   978-1803248486.
  5. Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World. John Wiley & Sons. 13 August 2019. ISBN   978-1-119-64337-1.
  6. "Chapter 16. Kim Crawley - Tribe of Hackers [Book]". www.oreilly.com.
  7. Crawley, Kim (December 12, 2023). Hacker Culture A to Z: A Fun Guide to the People, Ideas, and Gadgets That Made the Tech World. O'Reilly Media. ISBN   978-1098145675.
  8. "Kim Crawley". blogs.blackberry.com.
  9. O'Dea, Blathnaid (December 13, 2023). "'I want computer science and hacker culture to be accessible to everyone'". Silicon Republic.
  10. "Privacy in Action: Kim Crawley, Cybersecurity Researcher and Author". Startpage.com Blog. October 28, 2021.
  11. "Hacker Valley Studio: Hacker Culture and ADHD with Kim Crawley on Apple Podcasts". Apple Podcasts.
  12. "Neurodiversity in Cybersecurity - Kim Crawley - NeuroSec". neurosec.captivate.fm.
  13. Wylie, Phillip L.; Crawley, Kim (October 30, 2020). The Pentester BluePrint: Starting a Career as an Ethical Hacker. John Wiley & Sons. ISBN   978-1-119-68435-0 via Google Books.