Ethical Hacking: The Story of a White Hat Hacker
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2020, Vol 8, Issue 3
Abstract
Massive growth of the Internet has brought in many good things such as e-commerce, easy access to extensive sources of learning material, collaborative computing, e-mail, and new avenues for enlightenment and information distribution to name a few. Today, since almost all the work is done over the internet, crucial data is sent over the web and other information is placed over the internet. So ensuring data security over the internet is very important and should be taken care of at utmost priority. As with most technological advances, there is also a dark side attached to it, i.e. hacking. Hacking is an activity in which a person (namely hackers) exploits the weaknesses and vulnerabilities in a system for self profit or gratification. With the growing movement of the world from offline to online culture like shopping, banking, sharing information access to sensitive information through the web applications has increased. Thus the need of protecting the systems from hacking arises to promote the persons who will punch back the illegal attacks on the computer systems and will ensure data security. As every coin has two faces, this coin also has one another face which generally acts as a life saver for the victims of hacking. This lifeguard technique is called ethical hacking. Ethical hacking is a technique which is used to identify the weaknesses and vulnerabilities in the system or computer network in order to strengthen the system further to prevent the data. The main reason behind studying ethical hacking is to evaluate target system security. This paper helps to generate a brief idea of ethical hacking and all aspects.
Authors and Affiliations
Shivanshi Sinha, Dr. Yojna Arora
A Review of Video Detection and Tracking Methods for Moving Objects
Object detection and tracking are widely utilized in today's society, especially for motion detection of different objects. The initial stage in object detection is to recognize objects in the video stream and cluster th...
Improved HMM by Deep Learning for Ear Classification
Ear recognition is one of the most relevant applications of image analysis. It’s a true challenge to build an automated system which exceeds human ability to recognize ears. Humans do not identify the ears ordinarily, so...
Automatic Crop Plantation Prediction Based on Meteorological Data using Wireless Sensor Network
Advanced technological development in wireless sensor network made it possible to use it in monitoring and control of Greenhouse parameters. In this paper, my aim is to develop a central monitoring and control system for...
Digital V-Card-The Future Security
The paper focuses on designing and developing a user interface to help out the community in making a secure and also a better use of ATM cards using virtual ATM card application. ATM cards are essential in everyday life....
Detection and Localization of Multiple Spoofing Attackers Using Asymmetric Key Cryptography Algorithm for Wireless Sensor Network
Due to the openness of the wireless transmission medium, adversaries can monitor any transmission. Further, adversaries can easily purchase low-cost wireless devices and use these commonly available platforms to launch a...