Ethical Hacking: The Story of a White Hat Hacker

Authors

  • Shivanshi Sinha Student, Department of Computer Science and Engineering, Amity University, Gurugram, Haryana, India Author
  • Yojna Arora Assistant Professor, Department of Computer Science and Engineering, Amity University, Gurugram, Haryana, India, Author

Keywords:

Hacking, Hacker, , Hacking, Ethical Hacking, Red Hat Hacker

Abstract

Massive growth of the Internet has brought  in many good things such as e-commerce, easy access to  extensive sources of learning material, collaborative  computing, e-mail, and new avenues for enlightenment and  information distribution to name a few. Today, since almost  all the work is done over the internet, crucial data is sent  over the web and other information is placed over the  internet. So ensuring data security over the internet is very  important and should be taken care of at utmost priority. As  with most technological advances, there is also a dark side  attached to it, i.e. hacking. Hacking is an activity in which a  person (namely hackers) exploits the weaknesses and  vulnerabilities in a system for self profit or gratification.  With the growing movement of the world from offline to  online culture like shopping, banking, sharing information  access to sensitive information through the web applications  has increased. Thus the need of protecting the systems from  hacking arises to promote the persons who will punch back  the illegal attacks on the computer systems and will ensure  data security. As every coin has two faces, this coin also has  one another face which generally acts as a life saver for the  victims of hacking. This lifeguard technique is called ethical  hacking.  

Ethical hacking is a technique which is used to identify the  weaknesses and vulnerabilities in the system or computer  network in order to strengthen the system further to prevent  the data. The main reason behind studying ethical hacking  is to evaluate target system security. This paper helps to  generate a brief idea of ethical hacking and all aspects. 

Downloads

Download data is not yet available.

References

Ethical Hacking by C.C. Palmer, IBM research division..

Internet Crime Complaint Center link: https://www.ic3.gov/default.aspx

Ethical Hacking by Deepak Kumar, Ankit Agarwal, Abhishek Bhardwaj, International Journal of Engineering And Computer Science ISSN: 2319- 7242, Volume 4 Issue 4 April 2015, Page No. 11466-

A Comprehensive Study On Ethical Hacking by Suriya Begum, Sujeeth Kumar, Ashhar, International Journal Of Engineering Sciences & Research, Technology, ISSN: 2277-9655 Impact Factor: 4.116

Study of Ethical Hacking by Bhawana Sahare, Ankit Naik, Shashikala Khandey,International Journal of Computer Science Trends and Technology (IJCST) – Volume 2 Issue 4, Nov-Dec 2014

Ethical Hacking by Susidharthaka Satapathy, Dr.Rasmi Ranjan Patra, International Journal of Scientific and Research Publications, Volume 5, Issue 6, June 2015 ISSN 2250-3153

ETHICAL HACKING: AN IMPACT ON SOCIETY by Meenaakshi N. Munjal, Cyber Times International Journal of Technology & Management Vol. 7 Issue 1, October 2013 – March 2014

Case Study on: ETHICAL HACKING, Department of Electronics & Telecommunication Engineering,VIVA Institute of technology, Virar(East), ISSN: 2581-8805

Conference Paper: Ethical Hacking(Tools, Techniques and approach) by Brijesh Kumar Pandey, Lovely lakhmani Balani, Alok Singh,Conference: ICAIM International Conference on Advancement in IT and Management, January 2015.

Review on Ethical Hacking by Neeru Ahuja, International Journal of Innovative Research in Computer and Communication Engineering

(An ISO 3297: 2007 Certified Organization),Vol. 3, Issue 9, September 2015.

Ethical Hacking: Types Of Ethical Hackers by V.Chandrika,International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353 Volume 11 Issue 1 –

November 2014.

Ethical Hacking & Security Against Cyber Crime by NEERAJ RATHORE, i-manager ’s , Vol. No. 1 l Journal on Information Technology 5 December 2015- February 2016.

Cyber Security and Ethical Hacking by P. Harika Reddy, Surapaneni Gopi Siva Sai Teja, International Journal for Research in Applied Science & Engineering Technology (IJRASET) , ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 6.887 Volume 6 Issue VI, June 2018

Ethical Hacking by Azhar Ushmani , International Journal of Information Technology (IJIT) – Volume 4 Issue 6, Nov-Dec 2018.

Conceptual Oriented Analysis on the Modern Tools and Techniques to Enrich Security Vulnerabilities in Ethical Hacking by Dr.K.Sai Manoj, Ms. K. Mrudula ,Mrs G.Maanasa, Prof.K.Phani Srinivas, International Journal of Computer Science Trends and Technology (IJCST) – Volume 7 Issue 3, May - Jun 2019

Downloads

Published

2020-05-05

How to Cite

Ethical Hacking: The Story of a White Hat Hacker . (2020). International Journal of Innovative Research in Computer Science & Technology, 8(3), 131–136. Retrieved from https://acspublisher.com/journals/index.php/ijircst/article/view/13281