Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Ethical Hacking: The Personality and Impacts


Affiliations
1 Dept of MCA, Ballari Institute of Technology & Management, Ballari - 583104, India
     

   Subscribe/Renew Journal


The volatile growth of the Internet has brought many superior things, to name a few, e-commerce, easy access to reference materials, shared computing, e-mail, and new avenues for advertising and information distribution. With the most technological advances, there is also a darker side: criminal hackers. Governments, public and private companies, individuals around the world are worried to be a part of this insurgency, but they are scared that some hacker will break into their web server, read their e-mails, replace their logo with pornography, steal their credit card number from an on-line shopping site, or embed software that will transmit their organization's secrets to the open Internet. With these concerns and others, the ethical hackers can help to plug up. This paper describes ethical hacker’s skills, attitudes, and how they help their customers followed by the explanation of process along with the perceptions, timeline and impact on security, business, government on the whole  society

Keywords

Hacking, Ethical Hacking Internet, Process, Timeline, Impacts, Perceptions.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 171

PDF Views: 4




  • Ethical Hacking: The Personality and Impacts

Abstract Views: 171  |  PDF Views: 4

Authors

B. Hari Prasad
Dept of MCA, Ballari Institute of Technology & Management, Ballari - 583104, India

Abstract


The volatile growth of the Internet has brought many superior things, to name a few, e-commerce, easy access to reference materials, shared computing, e-mail, and new avenues for advertising and information distribution. With the most technological advances, there is also a darker side: criminal hackers. Governments, public and private companies, individuals around the world are worried to be a part of this insurgency, but they are scared that some hacker will break into their web server, read their e-mails, replace their logo with pornography, steal their credit card number from an on-line shopping site, or embed software that will transmit their organization's secrets to the open Internet. With these concerns and others, the ethical hackers can help to plug up. This paper describes ethical hacker’s skills, attitudes, and how they help their customers followed by the explanation of process along with the perceptions, timeline and impact on security, business, government on the whole  society

Keywords


Hacking, Ethical Hacking Internet, Process, Timeline, Impacts, Perceptions.