Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Department of Computer Applications, Sri Krishna Arts and Science College, Coimbatore.


Affiliations
1 Department of Computer Applications, Sri Krishna Arts and Science College, Coimbatore, Iceland
2 Department of Computer Applications, Sri Krishna Arts and Science College, Coimbatore, India
3 Department of Computer Applications, Sri Krishna Arts and Science College, Coimbatore, India
     

   Subscribe/Renew Journal


With the increased internet popularity, hacking has become threat to the security of the system or the network. The term “Hacker” represents a skilled programmer, who accesses the computer or penetrates deep into the network in unauthorized manner, in order to crack the password or disturb the network services. The hackers make use of the bugs or weakness in the software to achieve this. So, to safeguard the system or network application from being breached, the idea of ethical hacking has been introduced. Ethical hacking is the authoritative way of evading the system to identify possible threats and data breaches in the system/network. This paper, details the concept of ethical hacking and its types.

Keywords

Security, Hacker, Ethical hacking, Black Hat Hacker, White Hat Hacker, Grey Hat Hacker
User
Subscription Login to verify subscription
Notifications
Font Size

  • http://www.articlesbase.com/security- articles/ethical-hacking-anintroduction- 402282.html
  • http://www.ehacking.net/2011/06/top-6-ethical- hackingtools. html#sthash.nszGZw4y.dpuf
  • Bhawana Sahare , Ankit Naik , Shashikala Khandey,”Study of Ethical Hacking”, International Journal of Computer Science Trends and Technology (IJCST) – Vol 2, 2014.
  • OWASP. “Web Application Penetration Testing,” http://www.owasp.org/index.php/Web_Application_Pen e tration_Testing.
  • http://www.corecom.com/external/livesecurity/pen test.html
  • http://www.networkdefense.com/papers/pentest.ht ml
  • Internet Security Systems, Network and Host- based Vulnerability Assessment
  • http://www.infosecinstitute.com/blog/ethicalhacking _computer_forensics.html
  • http://searchnetworking.techtarget.com/generic/0,2 95582,sid7_gci1083715,00.html
  • http://www.owasp.org/index.php/Testing:_Information_gathering
  • . Stallman, Richard.
  • Encyclopaedia Britannica. 2003. Encyclopaedia Britannica Premium Service. 28 Oct, 2003 .
  • Cyber Terrorism. Online. Discovery Communications. 28Oct.2003.Quittner,Jeremy.
  • Hacker Psych 101. Online. Discovery Communications. 28Oct.2003..
  • Hackers: Methods of Attack and Defense. Online. Discovery Communications.28Oct.2003 .
  • https://www.synopsys.com/glossary/what-is-ethical-hacking.html.
  • Sunil Kumar, Dilip Agarwa, “Hacking Attacks, Methods, Techniques and their Protection Measures, IJSART – Vol. 4, 2018.
  • Brijesh Kumar Pandey, Alok Singh, Lovely lakhmani Balani, “ETHICAL HACKING (Tools, Techniques and Approaches)”, Interna
  • tional Conference on Advancement in IT and Management, 2015.
  • http://eprints.binadarma.ac.id/1000/1/KEAMANAN%20SISTEM%20IN FORMASI%20MATERI%201.pdf
  • Danish sharma,Rituraj Chandra, C.K Raina,” Review on Ethical Hacking”, International Journal of Creative Research Thoughts, Vol.6, 2018.

Abstract Views: 160

PDF Views: 0




  • Department of Computer Applications, Sri Krishna Arts and Science College, Coimbatore.

Abstract Views: 160  |  PDF Views: 0

Authors

P Santhanalakshmi
Department of Computer Applications, Sri Krishna Arts and Science College, Coimbatore, Iceland
P DivyaBharathi
Department of Computer Applications, Sri Krishna Arts and Science College, Coimbatore, India
R Roshini
Department of Computer Applications, Sri Krishna Arts and Science College, Coimbatore, India
G Sharmila
Department of Computer Applications, Sri Krishna Arts and Science College, Coimbatore, India

Abstract


With the increased internet popularity, hacking has become threat to the security of the system or the network. The term “Hacker” represents a skilled programmer, who accesses the computer or penetrates deep into the network in unauthorized manner, in order to crack the password or disturb the network services. The hackers make use of the bugs or weakness in the software to achieve this. So, to safeguard the system or network application from being breached, the idea of ethical hacking has been introduced. Ethical hacking is the authoritative way of evading the system to identify possible threats and data breaches in the system/network. This paper, details the concept of ethical hacking and its types.

Keywords


Security, Hacker, Ethical hacking, Black Hat Hacker, White Hat Hacker, Grey Hat Hacker

References