A Review on Issues and Benefits of Ethical Hacking
Aniket Kamat1 , Shuchita Beri2 , Mayank Kothari3
Section:Review Paper, Product Type: Journal Paper
Volume-8 ,
Issue-10 , Page no. 89-93, Oct-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i10.8993
Online published on Oct 31, 2020
Copyright © Aniket Kamat, Shuchita Beri, Mayank Kothari . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Aniket Kamat, Shuchita Beri, Mayank Kothari, “A Review on Issues and Benefits of Ethical Hacking,” International Journal of Computer Sciences and Engineering, Vol.8, Issue.10, pp.89-93, 2020.
MLA Style Citation: Aniket Kamat, Shuchita Beri, Mayank Kothari "A Review on Issues and Benefits of Ethical Hacking." International Journal of Computer Sciences and Engineering 8.10 (2020): 89-93.
APA Style Citation: Aniket Kamat, Shuchita Beri, Mayank Kothari, (2020). A Review on Issues and Benefits of Ethical Hacking. International Journal of Computer Sciences and Engineering, 8(10), 89-93.
BibTex Style Citation:
@article{Kamat_2020,
author = {Aniket Kamat, Shuchita Beri, Mayank Kothari},
title = {A Review on Issues and Benefits of Ethical Hacking},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2020},
volume = {8},
Issue = {10},
month = {10},
year = {2020},
issn = {2347-2693},
pages = {89-93},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5237},
doi = {https://doi.org/10.26438/ijcse/v8i10.8993}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v8i10.8993}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5237
TI - A Review on Issues and Benefits of Ethical Hacking
T2 - International Journal of Computer Sciences and Engineering
AU - Aniket Kamat, Shuchita Beri, Mayank Kothari
PY - 2020
DA - 2020/10/31
PB - IJCSE, Indore, INDIA
SP - 89-93
IS - 10
VL - 8
SN - 2347-2693
ER -
![]() |
![]() |
![]() |
281 | 263 downloads | 161 downloads |
![](icone_social/Facebook.png)
![](icone_social/Twitter.png)
![](icone_social/Linkedin.png)
![](icone_social/Google+.png)
Abstract
The condition of security on the web is extremely poor. Hacking is an action in which, an individual adventures the shortcoming in a framework for self-benefit or delight. Privately owned sectors often make newer and bigger amounts of their simple targets and applications, for example, electronic business, showcasing and database access to the Internet, at that point crackers consider the opportunity to be a better chance to access sensitive information. These actions of crackers in order to get sensitive information is caught by an white cap cracker who is also called an ethical hacker and Moral hacking is an indistinguishable action which plans to discover and redress the shortcoming and vulnerabilities in a framework. Moral hacking portrays the way toward hacking a system in a moral way, in this way with well-meaning plans. In This paper, hacking types with its different phase and ethical hackings techniques are discussed. Major problem in ethical hacking is to understand the insider issues. The usage of white-top software engineers limit dangers and additionally screen the conduct of moral programmers.
Key-Words / Index Term
Component, Formatting, Style, Styling, Insert
References
[1] Brijesh Pandey Alok Singh & Lovely Balani “Ethical Hacking Tools, Techniques and Approaches” 2015.
[2] Nicholson, Scott. "How ethical hacking can protect organisations from a greater threat." Computer Fraud & Security 2019, no. 5 15-19, 2019.
[3] B. Smith ; W. Yurcik ; D. Doss, “Ethical hacking: the security justification redux” In the Proceeding of : IEEE 2002 International Symposium on Technology and Society (ISTAS`02). Social Implications of Information and Communication Technology, USA, 2002.
[4] Prakash Chandra Behera and Chinmaya Dash, “Ethical Hacking: A Security Assessment Tool to Uncover Loopholes and Vulnerabilities in Network and to Ensure Protection to the System”, Volume 4, Special Issue9, pp.54-61. 2015.
[5] Georg, Thomas, Burmeister Oliver, and Low Gregory. "Issues of Implied Trust in Ethical Hacking." The ORBIT Journal 2, no. 1 :pp. 1-19, 2018.
[6] Akanksha Bansal and Monika Arora. "Ethical hacking and social security." Radix International Journal of Research in Social Science, volume 1, issue 11, pp.1-16, 2012.
[7] Dr. V SUBHASHINI (2014) `ETHICAL HACKING AND LEGAL SYSTEMS`, International Journal of Emerging Technology in Computer Science & Electronics , 11( 4 –NOVEMBER 2014.), pp. 1-6 [Online]. Available at: (Accessed: 10th January 2020).
[8] Cheng P, “A Security Architecture for Internet Protocol”, IBM Systems Journal no-1 1998.
[9] Endicott-Popovsky, B. (2003). Ethics and teaching information assurance. IEEE Security & Privacy .
[10] RD. Hartley, “Ethical Hacking: Teaching Students to Hack”, EastCarolina University, http://www.techspot.com/news/21942- universityoffers-ethical-hacking-course.html, , 2002.
[11] Logan and Clarkson, Is it Safe? Information Security Education: Are We Teaching a Dangerous Subject?, Proceedings of the 8th Colloquium for Information Systems Security Education, West Point, NY, 2004
[12] SA. Saleem, Ethical Hacking as a risk management technique, ACM New York, NY, USA, 2006.
[13] C.C. Palmer, “Ethical hacking”, IBM systems journal, volume 40, issue 3, pp. 769–780 , March 2001.
[14] N.B. Sukhai, “Hacking And Cybercrime”, AT&T, 2005.