A Comprehensive Analysis of Ethical Hacking
Abstract
With the increased internet popularity, hacking has become threat to the security of the system or the network. The term “Hacker” represents a skilled programmer, who accesses the computer or penetrates deep into the network in unauthorized manner, in order to crack the password or disturb the network services. The hackers make use of the bugs or weakness in the software to achieve this. So, to safeguard the system or network application from being breached, the idea of ethical hacking has been introduced. Ethical hacking is the authoritative way of evading the system to identify possible threats and data breaches in the system/network. This paper, details the concept of ethical hacking and its types.
Keywords
Full Text:
PDFReferences
http://www.articlesbase.com/security- articles/ethical-hacking-an-introduction-402282.html
http://www.ehacking.net/2011/06/top-6-ethical- hacking-tools.html#sthash.nszGZw4y.dpuf
Bhawana Sahare , Ankit Naik , Shashikala Khandey,”Study of Ethical Hacking”, International Journal of Computer Science Trends and Technology (IJCST) – Vol 2, 2014.
OWASP. “Web Application Penetration Testing,” http://www.owasp.org/index.php/Web_Application_Pen e tration_Testing.
http://www.corecom.com/external/livesecurity/pen test.html
http://www.networkdefense.com/papers/pentest.ht ml
Internet Security Systems, Network and Host- based Vulnerability Assessment
http://www.infosecinstitute.com/blog/ethicalhacking _computer_forensics.html
http://searchnetworking.techtarget.com/generic/0,2 95582,sid7_gci1083715,00.html
http://www.owasp.org/index.php/Testing:_Information_gathering
. Stallman, Richard.
Encyclopaedia Britannica. 2003. Encyclopaedia Britannica Premium Service. 28 Oct, 2003 .
Cyber Terrorism. Online. Discovery Communications. 28Oct.2003.Quittner,Jeremy.
Hacker Psych 101. Online. Discovery Communications. 28Oct.2003..
Hackers: Methods of Attack and Defense. Online. Discovery Communications.28Oct.2003 .
https://www.synopsys.com/glossary/what-is-ethical-hacking.html.
Sunil Kumar, Dilip Agarwa, “Hacking Attacks, Methods, Techniques and their Protection Measures, IJSART – Vol. 4, 2018.
Brijesh Kumar Pandey, Alok Singh, Lovely lakhmani Balani, “ETHICAL HACKING (Tools, Techniques and Approaches)”, International Conference on Advancement in IT and Management, 2015.
http://eprints.binadarma.ac.id/1000/1/KEAMANAN%20SISTEM%20INFORMASI%20MATERI%201.pdf
Danish sharma,Rituraj Chandra, C.K Raina,” Review on Ethical Hacking”, International Journal of Creative Research Thoughts, Vol.6, 2018.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.