Review on Teaching Ethical Hacking

Authors

  • Sushil Bhardwaj Assistant Professor, Department of Computer Applications, RIMT University, Mandi Gobindgarh, Punjab, India Author

DOI:

https://doi.org/10.55524/

Keywords:

Ethical Hacking, Hacking, Hacking Education, Hacking Ethics, White Hat Hacking

Abstract

The word hacker generally characterize  the practice or performance of investigating & carry out  trial with computer networks as computer communications  grew more ubiquitous with the emergence of the Internet.  However, when devices with tools and connected network  became more commercialized, the system also became  assets with ostensible limitations, & violating such borders  became illegal. The number of programs teaching ethical  hacking is rapidly increasing. The requirement for a  comprehensive understanding of tactics and assailants is at  the heart of the case for training in ethical hacking field.  Many peoples argue, however, that getting training in offensive hacking skills advances communal menace by  promising followers to take part in illegitimate behaviour.  Ethics instruction pervades associated curricula, according  to proponents of teaching ethical hacking, giving students  enough preparation to recognize the hazards and adopt  healthy actions. This article looks at ways to reduce the  danger of students using abilities learned in an ethical  hacking course to perform illegal activities outside of the  classroom. 

 

Downloads

Download data is not yet available.

References

Is Ethical Hacking Ethical? Int J Eng Sci Technol. 2011;

Hartley R, Medlin D, Houlik Z. Ethical Hacking: Educating Future Cybersecurity Professionals. Proc EDSIG Conf. 2017;

Ghai W, Kumar S, Athavale VA. Using gaussian mixtures on triphone acoustic modelling-based punjabi continuous speech recognition. In: Advances in Intelligent Systems and Computing. 2021.

Khatri M, Kumar A. Stability Inspection of Isolated Hydro Power Plant with Cuttlefish Algorithm. In: 2020 International Conference on Decision Aid Sciences and Application, DASA 2020. 2020.

Sharma K, Goswami L. RFID based Smart Railway

Pantograph Control in a Different Phase of Power Line. In: Proceedings of the 2nd International Conference on Inventive Research in Computing Applications, ICIRCA 2020. 2020.

Goswami L, Kaushik MK, Sikka R, Anand V, Prasad Sharma K, Singh Solanki M. IOT Based Fault Detection of Underground Cables through Node MCU Module. In: 2020 International Conference on Computer Science, Engineering and Applications, ICCSEA 2020. 2020.

Munjal MN. Ethical Hacking: an Impact on Society. Cyber Times Int J Technol Manag. 2013;

Solanki MS, Sharma DKP, Goswami L, Sikka R, Anand V. Automatic Identification of Temples in Digital Images through Scale Invariant Feature Transform. In: 2020 International Conference on Computer Science, Engineering and Applications, ICCSEA 2020. 2020.

Kumar A, Jain A. Image smog restoration using oblique gradient profile prior and energy minimization. Front Comput Sci. 2021;

Gupta N, Vaisla KS, Jain A, Kumar A, Kumar R. Performance Analysis of AODV Routing for Wireless Sensor Network in FPGA Hardware. Comput Syst Sci Eng. 2021;

Gupta N, Jain A, Vaisla KS, Kumar A, Kumar R. Performance analysis of DSDV and OLSR wireless sensor network routing protocols using FPGA hardware and machine learning. Multimed Tools Appl. 2021;

Gupta B, Gola KK, Dhingra M. HEPSO: an efficient sensor node redeployment strategy based on hybrid optimization algorithm in UWASN. Wirel Networks. 2021;

Kumar Gola K, Chaurasia N, Gupta B, Singh Niranjan D. Sea lion optimization algorithm based node deployment strategy in underwater acoustic sensor network. Int J Commun Syst. 2021;

Trabelsi Z, McCoey M. Ethical hacking in information security curricula. Int J Inf Commun Technol Educ. 2016;

Khanna R, Verma S, Biswas R, Singh JB. Implementation of branch delay in Superscalar processors by reducing branch penalties. In: 2010 IEEE 2nd International Advance Computing Conference, IACC 2010. 2010.

Gupta H, Kumar S, Yadav D, Verma OP, Sharma TK, Ahn CW, et al. Data analytics and mathematical modeling for simulating the dynamics of COVID-19 epidemic—a case study of India. Electron. 2021;

Gupta H, Varshney H, Sharma TK, Pachauri N, Verma OP. Comparative performance analysis of quantum machine learning with deep learning for diabetes prediction. Complex Intell Syst. 2021;

Sharma TK. Enhanced butterfly optimization algorithm for reliability optimization problems. J Ambient Intell Humaniz Comput. 2021;

Hirawat A, Taterh S, Sharma TK. A dynamic window size based segmentation technique to detect driver entry and exit from a car. J King Saud Univ - Comput Inf Sci. 2021;

Hernández M, Baquero L, Gil C. Ethical Hacking on Mobile Devices: Considerations and practical uses. Int J Appl Eng Res. 2018;

Sahare B, Naik A, Khandey S. Study Of Ethical Hacking. Int J Comput Sci Trends Technol. 2014;

Dark M. Advancing cybersecurity education. IEEE Secur Priv. 2014;

Mcgettrick A. Toward effective cybersecurity education. IEEE Secur Priv. 2013;

Patil S, Jangra A, Bhale M, Raina A, Kulkarni P. Ethical hacking: The need for cyber security. In: IEEE International Conference on Power, Control, Signals and Instrumentation Engineering, ICPCSI 2017. 2018.

NortonLifeLock employee. Black Hat, White Hat & Grey Hat Hackers - Differences Explained. NortonLifeLock. 2017.

Downloads

Published

2022-03-30

How to Cite

Review on Teaching Ethical Hacking . (2022). International Journal of Innovative Research in Computer Science & Technology, 10(2), 285–289. https://doi.org/10.55524/