Review on Teaching Ethical Hacking
DOI:
https://doi.org/10.55524/Keywords:
Ethical Hacking, Hacking, Hacking Education, Hacking Ethics, White Hat HackingAbstract
The word hacker generally characterize the practice or performance of investigating & carry out trial with computer networks as computer communications grew more ubiquitous with the emergence of the Internet. However, when devices with tools and connected network became more commercialized, the system also became assets with ostensible limitations, & violating such borders became illegal. The number of programs teaching ethical hacking is rapidly increasing. The requirement for a comprehensive understanding of tactics and assailants is at the heart of the case for training in ethical hacking field. Many peoples argue, however, that getting training in offensive hacking skills advances communal menace by promising followers to take part in illegitimate behaviour. Ethics instruction pervades associated curricula, according to proponents of teaching ethical hacking, giving students enough preparation to recognize the hazards and adopt healthy actions. This article looks at ways to reduce the danger of students using abilities learned in an ethical hacking course to perform illegal activities outside of the classroom.
Downloads
References
Is Ethical Hacking Ethical? Int J Eng Sci Technol. 2011;
Hartley R, Medlin D, Houlik Z. Ethical Hacking: Educating Future Cybersecurity Professionals. Proc EDSIG Conf. 2017;
Ghai W, Kumar S, Athavale VA. Using gaussian mixtures on triphone acoustic modelling-based punjabi continuous speech recognition. In: Advances in Intelligent Systems and Computing. 2021.
Khatri M, Kumar A. Stability Inspection of Isolated Hydro Power Plant with Cuttlefish Algorithm. In: 2020 International Conference on Decision Aid Sciences and Application, DASA 2020. 2020.
Sharma K, Goswami L. RFID based Smart Railway
Pantograph Control in a Different Phase of Power Line. In: Proceedings of the 2nd International Conference on Inventive Research in Computing Applications, ICIRCA 2020. 2020.
Goswami L, Kaushik MK, Sikka R, Anand V, Prasad Sharma K, Singh Solanki M. IOT Based Fault Detection of Underground Cables through Node MCU Module. In: 2020 International Conference on Computer Science, Engineering and Applications, ICCSEA 2020. 2020.
Munjal MN. Ethical Hacking: an Impact on Society. Cyber Times Int J Technol Manag. 2013;
Solanki MS, Sharma DKP, Goswami L, Sikka R, Anand V. Automatic Identification of Temples in Digital Images through Scale Invariant Feature Transform. In: 2020 International Conference on Computer Science, Engineering and Applications, ICCSEA 2020. 2020.
Kumar A, Jain A. Image smog restoration using oblique gradient profile prior and energy minimization. Front Comput Sci. 2021;
Gupta N, Vaisla KS, Jain A, Kumar A, Kumar R. Performance Analysis of AODV Routing for Wireless Sensor Network in FPGA Hardware. Comput Syst Sci Eng. 2021;
Gupta N, Jain A, Vaisla KS, Kumar A, Kumar R. Performance analysis of DSDV and OLSR wireless sensor network routing protocols using FPGA hardware and machine learning. Multimed Tools Appl. 2021;
Gupta B, Gola KK, Dhingra M. HEPSO: an efficient sensor node redeployment strategy based on hybrid optimization algorithm in UWASN. Wirel Networks. 2021;
Kumar Gola K, Chaurasia N, Gupta B, Singh Niranjan D. Sea lion optimization algorithm based node deployment strategy in underwater acoustic sensor network. Int J Commun Syst. 2021;
Trabelsi Z, McCoey M. Ethical hacking in information security curricula. Int J Inf Commun Technol Educ. 2016;
Khanna R, Verma S, Biswas R, Singh JB. Implementation of branch delay in Superscalar processors by reducing branch penalties. In: 2010 IEEE 2nd International Advance Computing Conference, IACC 2010. 2010.
Gupta H, Kumar S, Yadav D, Verma OP, Sharma TK, Ahn CW, et al. Data analytics and mathematical modeling for simulating the dynamics of COVID-19 epidemic—a case study of India. Electron. 2021;
Gupta H, Varshney H, Sharma TK, Pachauri N, Verma OP. Comparative performance analysis of quantum machine learning with deep learning for diabetes prediction. Complex Intell Syst. 2021;
Sharma TK. Enhanced butterfly optimization algorithm for reliability optimization problems. J Ambient Intell Humaniz Comput. 2021;
Hirawat A, Taterh S, Sharma TK. A dynamic window size based segmentation technique to detect driver entry and exit from a car. J King Saud Univ - Comput Inf Sci. 2021;
Hernández M, Baquero L, Gil C. Ethical Hacking on Mobile Devices: Considerations and practical uses. Int J Appl Eng Res. 2018;
Sahare B, Naik A, Khandey S. Study Of Ethical Hacking. Int J Comput Sci Trends Technol. 2014;
Dark M. Advancing cybersecurity education. IEEE Secur Priv. 2014;
Mcgettrick A. Toward effective cybersecurity education. IEEE Secur Priv. 2013;
Patil S, Jangra A, Bhale M, Raina A, Kulkarni P. Ethical hacking: The need for cyber security. In: IEEE International Conference on Power, Control, Signals and Instrumentation Engineering, ICPCSI 2017. 2018.
NortonLifeLock employee. Black Hat, White Hat & Grey Hat Hackers - Differences Explained. NortonLifeLock. 2017.