Open Access   Article Go Back

A Review on Issues and Benefits of Ethical Hacking

Aniket Kamat1 , Shuchita Beri2 , Mayank Kothari3

Section:Review Paper, Product Type: Journal Paper
Volume-8 , Issue-10 , Page no. 89-93, Oct-2020

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v8i10.8993

Online published on Oct 31, 2020

Copyright © Aniket Kamat, Shuchita Beri, Mayank Kothari . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Aniket Kamat, Shuchita Beri, Mayank Kothari, “A Review on Issues and Benefits of Ethical Hacking,” International Journal of Computer Sciences and Engineering, Vol.8, Issue.10, pp.89-93, 2020.

MLA Style Citation: Aniket Kamat, Shuchita Beri, Mayank Kothari "A Review on Issues and Benefits of Ethical Hacking." International Journal of Computer Sciences and Engineering 8.10 (2020): 89-93.

APA Style Citation: Aniket Kamat, Shuchita Beri, Mayank Kothari, (2020). A Review on Issues and Benefits of Ethical Hacking. International Journal of Computer Sciences and Engineering, 8(10), 89-93.

BibTex Style Citation:
@article{Kamat_2020,
author = {Aniket Kamat, Shuchita Beri, Mayank Kothari},
title = {A Review on Issues and Benefits of Ethical Hacking},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2020},
volume = {8},
Issue = {10},
month = {10},
year = {2020},
issn = {2347-2693},
pages = {89-93},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5237},
doi = {https://doi.org/10.26438/ijcse/v8i10.8993}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v8i10.8993}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5237
TI - A Review on Issues and Benefits of Ethical Hacking
T2 - International Journal of Computer Sciences and Engineering
AU - Aniket Kamat, Shuchita Beri, Mayank Kothari
PY - 2020
DA - 2020/10/31
PB - IJCSE, Indore, INDIA
SP - 89-93
IS - 10
VL - 8
SN - 2347-2693
ER -

VIEWS PDF XML
281 263 downloads 161 downloads
  
  
           

Abstract

The condition of security on the web is extremely poor. Hacking is an action in which, an individual adventures the shortcoming in a framework for self-benefit or delight. Privately owned sectors often make newer and bigger amounts of their simple targets and applications, for example, electronic business, showcasing and database access to the Internet, at that point crackers consider the opportunity to be a better chance to access sensitive information. These actions of crackers in order to get sensitive information is caught by an white cap cracker who is also called an ethical hacker and Moral hacking is an indistinguishable action which plans to discover and redress the shortcoming and vulnerabilities in a framework. Moral hacking portrays the way toward hacking a system in a moral way, in this way with well-meaning plans. In This paper, hacking types with its different phase and ethical hackings techniques are discussed. Major problem in ethical hacking is to understand the insider issues. The usage of white-top software engineers limit dangers and additionally screen the conduct of moral programmers.

Key-Words / Index Term

Component, Formatting, Style, Styling, Insert

References

[1] Brijesh Pandey Alok Singh & Lovely Balani “Ethical Hacking Tools, Techniques and Approaches” 2015.
[2] Nicholson, Scott. "How ethical hacking can protect organisations from a greater threat." Computer Fraud & Security 2019, no. 5 15-19, 2019.
[3] B. Smith ; W. Yurcik ; D. Doss, “Ethical hacking: the security justification redux” In the Proceeding of : IEEE 2002 International Symposium on Technology and Society (ISTAS`02). Social Implications of Information and Communication Technology, USA, 2002.
[4] Prakash Chandra Behera and Chinmaya Dash, “Ethical Hacking: A Security Assessment Tool to Uncover Loopholes and Vulnerabilities in Network and to Ensure Protection to the System”, Volume 4, Special Issue9, pp.54-61. 2015.
[5] Georg, Thomas, Burmeister Oliver, and Low Gregory. "Issues of Implied Trust in Ethical Hacking." The ORBIT Journal 2, no. 1 :pp. 1-19, 2018.
[6] Akanksha Bansal and Monika Arora. "Ethical hacking and social security." Radix International Journal of Research in Social Science, volume 1, issue 11, pp.1-16, 2012.
[7] Dr. V SUBHASHINI (2014) `ETHICAL HACKING AND LEGAL SYSTEMS`, International Journal of Emerging Technology in Computer Science & Electronics , 11( 4 –NOVEMBER 2014.), pp. 1-6 [Online]. Available at: (Accessed: 10th January 2020).
[8] Cheng P, “A Security Architecture for Internet Protocol”, IBM Systems Journal no-1 1998.
[9] Endicott-Popovsky, B. (2003). Ethics and teaching information assurance. IEEE Security & Privacy .
[10] RD. Hartley, “Ethical Hacking: Teaching Students to Hack”, EastCarolina University, http://www.techspot.com/news/21942- universityoffers-ethical-hacking-course.html, , 2002.
[11] Logan and Clarkson, Is it Safe? Information Security Education: Are We Teaching a Dangerous Subject?, Proceedings of the 8th Colloquium for Information Systems Security Education, West Point, NY, 2004
[12] SA. Saleem, Ethical Hacking as a risk management technique, ACM New York, NY, USA, 2006.
[13] C.C. Palmer, “Ethical hacking”, IBM systems journal, volume 40, issue 3, pp. 769–780 , March 2001.
[14] N.B. Sukhai, “Hacking And Cybercrime”, AT&T, 2005.