Abstract

This paper will discuss the topic of ethical hacking, which is also called penetration testing. It starts by briefing about the ethical hacking introduction and its key protocols. It will further discuss the varied classifications of hacking and explain the causes for the swift rise in the cyber-crimes and their impact on socio-economic growth. The advantages and limitations of ethical hacking are also listed. It will further discuss the steps involved in ethical hacking, who is allowed to conduct ethical hacking, and its importance in order to reduce the effect of these attacks, penetration tests are highly required, to consider an acceptable solution for this task. Results from the case study shows that there are negative impacts where the society suffers from cybercrimes and why the computer or networking tools are targeted for the crimes. Ethical hacking education can provide the future professionals to combat the future cyber security issues.

Highlights

  • The world constitutes people who are connected to each other through the internet for communication and the most important factor is when information is transferred from one end to other end causes harm so it is important to secure an individual online from varied threats on online (Hacking).Hacking refers to accessing information using a computer by either password cracker software or any other technique to get the data. [1]This can be achieved by pointing the loop holes in the security of a computer

  • It involves the same tools, techniques and tricks that hackers use, but with one major difference is that Ethical hacking is legal

  • Many kinds of ethics and conduct are available in the information security industry

Read more

Summary

INTRODUCTION

The world constitutes people who are connected to each other through the internet for communication and the most important factor is when information is transferred from one end to other end causes harm so it is important to secure an individual online from varied threats on online (Hacking). Ethical hack involves replicating strategies and actions of malevolent attackers Depending on importance of data the ethical hackers may have to accept to a non-disclosure agreement to other terms and conditions required by the assessed organization. Ethical hackers use their skills and knowledge to provide security and improve the technology of organizations. B) Black hat hackers: The complete contrast of White Hat Hackers are Black Hat Hackers who mainly focus on harming them but don’t take hacking jobs from companies They interrupt the systems so as to access information targeting bank information, personal details, phone numbers.

HACKING PHASES
ETHICAL HACKING
AVAILABLE CODES
VIII. ETHICAL HACKING IN GOVERNMENT ORGANISATIONS
CASES OF CYBER CRIMES IN THE PAST YEARS
VIII. REFERENCES
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.