A Review on Issues and Benefits of Ethical Hacking
DOI:
https://doi.org/10.26438/ijcse/v8i10.8993Keywords:
Component, Formatting, Style, Styling, InsertAbstract
The condition of security on the web is extremely poor. Hacking is an action in which, an individual adventures the shortcoming in a framework for self-benefit or delight. Privately owned sectors often make newer and bigger amounts of their simple targets and applications, for example, electronic business, showcasing and database access to the Internet, at that point crackers consider the opportunity to be a better chance to access sensitive information. These actions of crackers in order to get sensitive information is caught by an white cap cracker who is also called an ethical hacker and Moral hacking is an indistinguishable action which plans to discover and redress the shortcoming and vulnerabilities in a framework. Moral hacking portrays the way toward hacking a system in a moral way, in this way with well-meaning plans. In This paper, hacking types with its different phase and ethical hackings techniques are discussed. Major problem in ethical hacking is to understand the insider issues. The usage of white-top software engineers limit dangers and additionally screen the conduct of moral programmers.
References
[1] Brijesh Pandey Alok Singh & Lovely Balani “Ethical Hacking Tools, Techniques and Approaches” 2015.
[2] Nicholson, Scott. "How ethical hacking can protect organisations from a greater threat." Computer Fraud & Security 2019, no. 5 15-19, 2019.
[3] B. Smith ; W. Yurcik ; D. Doss, “Ethical hacking: the security justification redux” In the Proceeding of : IEEE 2002 International Symposium on Technology and Society (ISTAS`02). Social Implications of Information and Communication Technology, USA, 2002.
[4] Prakash Chandra Behera and Chinmaya Dash, “Ethical Hacking: A Security Assessment Tool to Uncover Loopholes and Vulnerabilities in Network and to Ensure Protection to the System”, Volume 4, Special Issue9, pp.54-61. 2015.
[5] Georg, Thomas, Burmeister Oliver, and Low Gregory. "Issues of Implied Trust in Ethical Hacking." The ORBIT Journal 2, no. 1 :pp. 1-19, 2018.
[6] Akanksha Bansal and Monika Arora. "Ethical hacking and social security." Radix International Journal of Research in Social Science, volume 1, issue 11, pp.1-16, 2012.
[7] Dr. V SUBHASHINI (2014) `ETHICAL HACKING AND LEGAL SYSTEMS`, International Journal of Emerging Technology in Computer Science & Electronics , 11( 4 –NOVEMBER 2014.), pp. 1-6 [Online]. Available at: (Accessed: 10th January 2020).
[8] Cheng P, “A Security Architecture for Internet Protocol”, IBM Systems Journal no-1 1998.
[9] Endicott-Popovsky, B. (2003). Ethics and teaching information assurance. IEEE Security & Privacy .
[10] RD. Hartley, “Ethical Hacking: Teaching Students to Hack”, EastCarolina University, http://www.techspot.com/news/21942- universityoffers-ethical-hacking-course.html, , 2002.
[11] Logan and Clarkson, Is it Safe? Information Security Education: Are We Teaching a Dangerous Subject?, Proceedings of the 8th Colloquium for Information Systems Security Education, West Point, NY, 2004
[12] SA. Saleem, Ethical Hacking as a risk management technique, ACM New York, NY, USA, 2006.
[13] C.C. Palmer, “Ethical hacking”, IBM systems journal, volume 40, issue 3, pp. 769–780 , March 2001.
[14] N.B. Sukhai, “Hacking And Cybercrime”, AT&T, 2005.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
