Open Access Open Access  Restricted Access Subscription or Fee Access

A Comprehensive Analysis of Ethical Hacking

P. Santhanalakshmi, P. DivyaBharathi, R. Roshini, G. Sharmila

Abstract


With the increased internet popularity, hacking has become threat to the security of the system or the network. The term “Hacker” represents a skilled programmer, who accesses the computer or penetrates deep into the network in unauthorized manner, in order to crack the password or disturb the network services. The hackers make use of the bugs or weakness in the software to achieve this. So, to safeguard the system or network application from being breached, the idea of ethical hacking has been introduced. Ethical hacking is the authoritative way of evading the system to identify possible threats and data breaches in the system/network. This paper, details the concept of ethical hacking and its types.


Keywords


Security, Hacker, Ethical hacking, Black Hat Hacker, White Hat Hacker, Grey Hat Hacker.

Full Text:

PDF

References


http://www.articlesbase.com/security- articles/ethical-hacking-an-introduction-402282.html

http://www.ehacking.net/2011/06/top-6-ethical- hacking-tools.html#sthash.nszGZw4y.dpuf

Bhawana Sahare , Ankit Naik , Shashikala Khandey,”Study of Ethical Hacking”, International Journal of Computer Science Trends and Technology (IJCST) – Vol 2, 2014.

OWASP. “Web Application Penetration Testing,” http://www.owasp.org/index.php/Web_Application_Pen e tration_Testing.

http://www.corecom.com/external/livesecurity/pen test.html

http://www.networkdefense.com/papers/pentest.ht ml

Internet Security Systems, Network and Host- based Vulnerability Assessment

http://www.infosecinstitute.com/blog/ethicalhacking _computer_forensics.html

http://searchnetworking.techtarget.com/generic/0,2 95582,sid7_gci1083715,00.html

http://www.owasp.org/index.php/Testing:_Information_gathering

. Stallman, Richard.

Encyclopaedia Britannica. 2003. Encyclopaedia Britannica Premium Service. 28 Oct, 2003 .

Cyber Terrorism. Online. Discovery Communications. 28Oct.2003.Quittner,Jeremy.

Hacker Psych 101. Online. Discovery Communications. 28Oct.2003..

Hackers: Methods of Attack and Defense. Online. Discovery Communications.28Oct.2003 .

https://www.synopsys.com/glossary/what-is-ethical-hacking.html.

Sunil Kumar, Dilip Agarwa, “Hacking Attacks, Methods, Techniques and their Protection Measures, IJSART – Vol. 4, 2018.

Brijesh Kumar Pandey, Alok Singh, Lovely lakhmani Balani, “ETHICAL HACKING (Tools, Techniques and Approaches)”, International Conference on Advancement in IT and Management, 2015.

http://eprints.binadarma.ac.id/1000/1/KEAMANAN%20SISTEM%20INFORMASI%20MATERI%201.pdf

Danish sharma,Rituraj Chandra, C.K Raina,” Review on Ethical Hacking”, International Journal of Creative Research Thoughts, Vol.6, 2018.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.