Open Access Open Access  Restricted Access Subscription or Fee Access

Ethical Hacking: The Personality and Impacts

Dr B Hari Prasad

Abstract


The volatile growth of the Internet has brought many superior things, to name a few, e-commerce, easy access to reference materials, shared computing, e-mail, and new avenues for advertising and information distribution. With the most technological advances, there is also a darker side: criminal hackers. Governments, public and private companies, individuals around the world are worried to be a part of this insurgency, but they are scared that some hacker will break into their web server, read their e-mails, replace their logo with pornography, steal their credit card number from an on-line shopping site, or embed software that will transmit their organization's secrets to the open Internet. With these concerns and others, the ethical hackers can help to plug up. This paper describes ethical hacker’s skills, attitudes, and how they help their customers followed by the explanation of process along with the perceptions, timeline and impact on security, business, government on the whole  society

Keywords


Hacking, Ethical Hacking Internet, Process, Timeline, Impacts, Perceptions.

Full Text:

PDF

References


Charles C. Palmer IBM SYSTEMS JOURNAL, VOL 40, NO 3, 2001.

Mr. Sushant Mangasuli ISSN 2277-1956/V1N3-1446-1448 www.ijecse.org

Regina D. HartleyEthical Hacking: Rationale for a hacking methodological Ethical Hacking: Rationale for a hacking methodological approach to network security,East Carolina University

http://www.symantec.com/specprog/threatreport/entwhitepaper_symantec_internet_security_ Symantec Internet Security Threat Report, Trends for January 06–June 06, Volume X. Sep. 2006.

E. S. Raymond, The New Hacker's Dictionary, MIT Press, Cambridge, MA (1991).

The ®rst use of the term ªethical hackersº appears to have been in an interview with John Patrick of IBM by Gary An- thens that appeared in a June 1995 issue of Computer World

P. A. Karger and R. R. Schell, Multics Security Evaluation: Vulnerability Analysis, ESD-TR-74-193, Vol. II, Headquar- ters Electronic Systems Division, Hanscom Air Force Base

Ethical Hacking: Student courseware. Ec-Council. www.eccouncil.org

Laudon, K. C. (1995). Ethical concepts and information technology. Communicationsof the ACM, 38, 33-39

Carl Endorf, Eugene Schultz and Jim Mellander "Intrusion Detection and Prevention", pp 215, 2004.

Guang Yang Introduction to TCP/IP Network Attacksunlight@cs.iastate.edu, Department of Computer Science, Iowa State University Ames, IA 50011

Clay Wilson, 2008, Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Specialist in Technology and National Security Foreign Affairs, Defense, and Trade Division.

James M. (2007), Ten Ways Hackers Breach Security, Global Knowledge Instructor. 1-800-COURSES www.globalknowledge.com.

A. Durant, "The Enemy Within", BusinessXL, pp 48-51, 2007.

RD. Hartley, “Ethical Hacking: Teaching Students to Hack”, EastCarolina University, http://www.techspot.com/news/21942- universityoffers-ethical-hacking-course.html, , 2002.

T. Wulf, “Teaching ethics in undergraduate network”, Consortium forComputing Sciences in College, Vol 19 Issue 1, 2003.

Lin, Y. “The Institutionalisation of Hacking Practices”. In Ubiquity 4(4), 18-24 March 2003. http://www.acm.org/ubiquity/views/y_lin_1.html.

Adorno, T.W. “Culture Industry Reconsidered”. In J.M. Bernstein (ed.), The Culture Industry ( Routledge, 2001, London) pp. 98-106.

SA. Saleem, Ethical Hacking as a risk management technique, ACM New York, NY, USA, 2006.

N.B. Sukhai, “Hacking And Cybercrime”, AT&T, 2005.

Levy, Steven. Hacking: Heroes of the Computer Revolution. Garden City, N.Y.: Anchor/Doubleday, 1984..

Slatalla, Michelle. A Brief History of Hacking. Online. Discovery Communications, 28 Oct.2003. .


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.