![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Ethical Hacking: The Personality and Impacts
Subscribe/Renew Journal
The volatile growth of the Internet has brought many superior things, to name a few, e-commerce, easy access to reference materials, shared computing, e-mail, and new avenues for advertising and information distribution. With the most technological advances, there is also a darker side: criminal hackers. Governments, public and private companies, individuals around the world are worried to be a part of this insurgency, but they are scared that some hacker will break into their web server, read their e-mails, replace their logo with pornography, steal their credit card number from an on-line shopping site, or embed software that will transmit their organization's secrets to the open Internet. With these concerns and others, the ethical hackers can help to plug up. This paper describes ethical hacker’s skills, attitudes, and how they help their customers followed by the explanation of process along with the perceptions, timeline and impact on security, business, government on the whole society
Keywords
Hacking, Ethical Hacking Internet, Process, Timeline, Impacts, Perceptions.
User
Subscription
Login to verify subscription
Font Size
Information
![](https://i-scholar.in/public/site/images/abstractview.png)
Abstract Views: 269
![](https://i-scholar.in/public/site/images/pdfview.png)
PDF Views: 4