A Survey on Ethical Hacking Techniques
J. Sathya1 , T. Manivannan2
Section:Survey Paper, Product Type: Journal Paper
Volume-07 ,
Issue-04 , Page no. 91-96, Feb-2019
Online published on Feb 28, 2019
Copyright © J. Sathya, T. Manivannan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: J. Sathya, T. Manivannan, “A Survey on Ethical Hacking Techniques,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.91-96, 2019.
MLA Style Citation: J. Sathya, T. Manivannan "A Survey on Ethical Hacking Techniques." International Journal of Computer Sciences and Engineering 07.04 (2019): 91-96.
APA Style Citation: J. Sathya, T. Manivannan, (2019). A Survey on Ethical Hacking Techniques. International Journal of Computer Sciences and Engineering, 07(04), 91-96.
BibTex Style Citation:
@article{Sathya_2019,
author = {J. Sathya, T. Manivannan},
title = {A Survey on Ethical Hacking Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {07},
Issue = {04},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {91-96},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=728},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=728
TI - A Survey on Ethical Hacking Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - J. Sathya, T. Manivannan
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 91-96
IS - 04
VL - 07
SN - 2347-2693
ER -
Abstract
Hacking is a task in which, a person utilize the weakness in a system for self-profit or indulgence. Ethical hacking is an indistinguishable activity which aims to find and rectify the weakness in a system. In the growing era of internet computer security is of utmost concern for the organizations and government. These companies are using Internet in their wide variety of applications such as marketing, electronic commerce, and database access. But at the same time, data and network security is a serious issue that has to be talked about. This paper attempts to discuss the overview of hacking and how ethical hacking disturbs the security. Also the Ethical Hackers and Malicious Hackers are different from each other and playing their important roles in security. This paper studied the different types of hacking with its phases. The hacking can also be categorized majorly in three categories such as white hat, black hat and grey hat hacking. This paper also presents a comparison of the hacking categories with different methods of penetration testing.
Key-Words / Index Term
Hackers, Ethical Hacking, Hacking Phases
References
[1] Agarwal, AnkitKumar, Hacking : Research paper, online http://ankitkumaragarwal.com /hacking-a-research- paper/ (visited on may2012)
[2] Wilhelm, Douglas. "2". Professional Penetration Testing.Syngress Press. p. 503.ISBN 978-1-59749-425-0
[3] Moore, Robert (2006). Cybercrime: Investigating High- Technology Computer Crime (1st ed.). Cincinnati, Ohio:
[4] Anderson Publishing. ISBN 978-1-59345-303-9
[5] EC-Council (n.d.). Ethical Hacking and Countermeasures, online http://www.eccouncil.org/ipdf/EthicalHacker.pdf (visited on may 2012)
[6] Ethical Hacking Basics Class part , online http://www.go4expert.com/forums/ showthread.php?t=11925 (visited on may 2012)
[7] Palmer, C.C.(2001,April 13). Ethical Hacking. IBM Systems Journal Vol. 40 No.3 2001
[8] Http://1000projects.org/how-is-ethical-hacking-done-cs- student-project-seminar.html
[9] en.wikipedia.org/wiki/Penetration_testing
[10] About Effective Penetration Testing Methodology byByeong-Ho KANG