A COMPREHENSIVE STUDY ON ETHICAL HACKING

Abstract

 Explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: criminal hackers. An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. Governments, companies, and private citizens around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization's secrets to the open Internet. There are many techniques used to hack the information. This paper explores the ethics behind techniques of ethical hacking and whether there are problems that lie with this new field of work. In this paper we have discussed in detail history and types of hackers , different techniques used to hack the users, Operating System used in hacking , its pros and cons and a detail case study of J.P.Morgan.

Authors and Affiliations

Suriya Begum

Keywords

Related Articles

 BULK EMAIL SENDER WITH MULTIPLE ATTACHMENTS: THROUGH NON GPRS MOBILE

 Email is one of the mostly used utility of Internet for communication. A person can communicate with any other person with email in seconds. Also various important documents, images, scanned documents etc. can be...

 IMPLEMENTATION OF DFA PARSER FOR MANUFACTURING QUERY LANGUAGE TOKENS

 Installing a manufacturing method might be very expensive and time consuming project. Organization should examine and decide on how best to make this decision of selecting appropriate process meeting their require...

 STUDY AND ANALYSIS OF WEAR AND MICRO STRUCTURAL CHANGES ON CAST IRON UNDER LASER TREATMENT

 In this thesis Fiber laser techniques are used for the surface engineering of engine cylinder liner. Laser hardening produces wear resistant tracks by microstructural transformations. In this work application of t...

 Enhancement the Performance of Condenser of Split type Air Conditioning System by using Evaporative Cooling: A Review

 The improvement of coefficient of performance and reduction of energy consumption of a split air conditioning system. When retrofitted with evaporative cooling in the condenser of split air conditioner is reviewed...

 JIT Manufacturing Systems in Indian Industries: A Review

 Most of people understand JIT as a system of reducing inventory and quality control but they do not realize that it is a system of highlighting the problems, and forcing the organization to find quick solutions. I...

Download PDF file
  • EP ID EP154324
  • DOI 10.5281/zenodo.59534
  • Views 72
  • Downloads 0

How To Cite

Suriya Begum (30).  A COMPREHENSIVE STUDY ON ETHICAL HACKING. International Journal of Engineering Sciences & Research Technology, 5(8), 214-219. https://europub.co.uk/articles/-A-154324