Open Access
Subscription Access
Open Access
Subscription Access
Department of Computer Applications, Sri Krishna Arts and Science College, Coimbatore.
Subscribe/Renew Journal
With the increased internet popularity, hacking has become threat to the security of the system or the network. The term “Hacker” represents a skilled programmer, who accesses the computer or penetrates deep into the network in unauthorized manner, in order to crack the password or disturb the network services. The hackers make use of the bugs or weakness in the software to achieve this. So, to safeguard the system or network application from being breached, the idea of ethical hacking has been introduced. Ethical hacking is the authoritative way of evading the system to identify possible threats and data breaches in the system/network. This paper, details the concept of ethical hacking and its types.
Keywords
Security, Hacker, Ethical hacking, Black Hat Hacker, White Hat Hacker, Grey Hat Hacker
User
Subscription
Login to verify subscription
Font Size
Information
- http://www.articlesbase.com/security- articles/ethical-hacking-anintroduction- 402282.html
- http://www.ehacking.net/2011/06/top-6-ethical- hackingtools. html#sthash.nszGZw4y.dpuf
- Bhawana Sahare , Ankit Naik , Shashikala Khandey,”Study of Ethical Hacking”, International Journal of Computer Science Trends and Technology (IJCST) – Vol 2, 2014.
- OWASP. “Web Application Penetration Testing,” http://www.owasp.org/index.php/Web_Application_Pen e tration_Testing.
- http://www.corecom.com/external/livesecurity/pen test.html
- http://www.networkdefense.com/papers/pentest.ht ml
- Internet Security Systems, Network and Host- based Vulnerability Assessment
- http://www.infosecinstitute.com/blog/ethicalhacking _computer_forensics.html
- http://searchnetworking.techtarget.com/generic/0,2 95582,sid7_gci1083715,00.html
- http://www.owasp.org/index.php/Testing:_Information_gathering
- . Stallman, Richard.
- Encyclopaedia Britannica. 2003. Encyclopaedia Britannica Premium Service. 28 Oct, 2003 .
- Cyber Terrorism. Online. Discovery Communications. 28Oct.2003.Quittner,Jeremy.
- Hacker Psych 101. Online. Discovery Communications. 28Oct.2003..
- Hackers: Methods of Attack and Defense. Online. Discovery Communications.28Oct.2003 .
- https://www.synopsys.com/glossary/what-is-ethical-hacking.html.
- Sunil Kumar, Dilip Agarwa, “Hacking Attacks, Methods, Techniques and their Protection Measures, IJSART – Vol. 4, 2018.
- Brijesh Kumar Pandey, Alok Singh, Lovely lakhmani Balani, “ETHICAL HACKING (Tools, Techniques and Approaches)”, Interna
- tional Conference on Advancement in IT and Management, 2015.
- http://eprints.binadarma.ac.id/1000/1/KEAMANAN%20SISTEM%20IN FORMASI%20MATERI%201.pdf
- Danish sharma,Rituraj Chandra, C.K Raina,” Review on Ethical Hacking”, International Journal of Creative Research Thoughts, Vol.6, 2018.
Abstract Views: 160
PDF Views: 0