Ethical Hacking: The Story of a White Hat Hacker
Keywords:
Hacking, Hacker, , Hacking, Ethical Hacking, Red Hat HackerAbstract
Massive growth of the Internet has brought in many good things such as e-commerce, easy access to extensive sources of learning material, collaborative computing, e-mail, and new avenues for enlightenment and information distribution to name a few. Today, since almost all the work is done over the internet, crucial data is sent over the web and other information is placed over the internet. So ensuring data security over the internet is very important and should be taken care of at utmost priority. As with most technological advances, there is also a dark side attached to it, i.e. hacking. Hacking is an activity in which a person (namely hackers) exploits the weaknesses and vulnerabilities in a system for self profit or gratification. With the growing movement of the world from offline to online culture like shopping, banking, sharing information access to sensitive information through the web applications has increased. Thus the need of protecting the systems from hacking arises to promote the persons who will punch back the illegal attacks on the computer systems and will ensure data security. As every coin has two faces, this coin also has one another face which generally acts as a life saver for the victims of hacking. This lifeguard technique is called ethical hacking.
Ethical hacking is a technique which is used to identify the weaknesses and vulnerabilities in the system or computer network in order to strengthen the system further to prevent the data. The main reason behind studying ethical hacking is to evaluate target system security. This paper helps to generate a brief idea of ethical hacking and all aspects.
Downloads
References
Ethical Hacking by C.C. Palmer, IBM research division..
Internet Crime Complaint Center link: https://www.ic3.gov/default.aspx
Ethical Hacking by Deepak Kumar, Ankit Agarwal, Abhishek Bhardwaj, International Journal of Engineering And Computer Science ISSN: 2319- 7242, Volume 4 Issue 4 April 2015, Page No. 11466-
A Comprehensive Study On Ethical Hacking by Suriya Begum, Sujeeth Kumar, Ashhar, International Journal Of Engineering Sciences & Research, Technology, ISSN: 2277-9655 Impact Factor: 4.116
Study of Ethical Hacking by Bhawana Sahare, Ankit Naik, Shashikala Khandey,International Journal of Computer Science Trends and Technology (IJCST) – Volume 2 Issue 4, Nov-Dec 2014
Ethical Hacking by Susidharthaka Satapathy, Dr.Rasmi Ranjan Patra, International Journal of Scientific and Research Publications, Volume 5, Issue 6, June 2015 ISSN 2250-3153
ETHICAL HACKING: AN IMPACT ON SOCIETY by Meenaakshi N. Munjal, Cyber Times International Journal of Technology & Management Vol. 7 Issue 1, October 2013 – March 2014
Case Study on: ETHICAL HACKING, Department of Electronics & Telecommunication Engineering,VIVA Institute of technology, Virar(East), ISSN: 2581-8805
Conference Paper: Ethical Hacking(Tools, Techniques and approach) by Brijesh Kumar Pandey, Lovely lakhmani Balani, Alok Singh,Conference: ICAIM International Conference on Advancement in IT and Management, January 2015.
Review on Ethical Hacking by Neeru Ahuja, International Journal of Innovative Research in Computer and Communication Engineering
(An ISO 3297: 2007 Certified Organization),Vol. 3, Issue 9, September 2015.
Ethical Hacking: Types Of Ethical Hackers by V.Chandrika,International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353 Volume 11 Issue 1 –
November 2014.
Ethical Hacking & Security Against Cyber Crime by NEERAJ RATHORE, i-manager ’s , Vol. No. 1 l Journal on Information Technology 5 December 2015- February 2016.
Cyber Security and Ethical Hacking by P. Harika Reddy, Surapaneni Gopi Siva Sai Teja, International Journal for Research in Applied Science & Engineering Technology (IJRASET) , ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 6.887 Volume 6 Issue VI, June 2018
Ethical Hacking by Azhar Ushmani , International Journal of Information Technology (IJIT) – Volume 4 Issue 6, Nov-Dec 2018.
Conceptual Oriented Analysis on the Modern Tools and Techniques to Enrich Security Vulnerabilities in Ethical Hacking by Dr.K.Sai Manoj, Ms. K. Mrudula ,Mrs G.Maanasa, Prof.K.Phani Srinivas, International Journal of Computer Science Trends and Technology (IJCST) – Volume 7 Issue 3, May - Jun 2019