A COMPREHENSIVE STUDY ON ETHICAL HACKING

Abstract

 Explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: criminal hackers. An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. Governments, companies, and private citizens around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization's secrets to the open Internet. There are many techniques used to hack the information. This paper explores the ethics behind techniques of ethical hacking and whether there are problems that lie with this new field of work. In this paper we have discussed in detail history and types of hackers , different techniques used to hack the users, Operating System used in hacking , its pros and cons and a detail case study of J.P.Morgan.

Authors and Affiliations

Suriya Begum

Keywords

Related Articles

 IRIS RECOGNITION USING HOUGH’S TRANSFORM GAMMA CORRECTION AND HISTOGRAM THRESHOLDING METHOD

 In biometric identification, the Iris recognition system is a most popular research field in recent years. Due to iris biometric recognition reliability and nearly perfect recognition rates, used in high secur...

 A Solar Powered Air Conditioning System for Daytime Offices based on Ejector Cycle: An Alternate of Conventional Air Conditioning Systems

 Solar cooling is comprised of many attractive features and is one path towards a more sustainable energy system. The performance of solar cooling systems is strongly dependent on local conditions. Solar cooling sy...

 TESTING DATA TIME SERIES CONSUMPTION, FDI, GDP INDONESIA WITH SERIAL CORRELATION AND COINTEGRATION

 Purposive - The study was conducted by the authors to see how the correlation and cointegration in the long term between the variables of consumption, direct inventasi and GDP in Indonesia to test models of time s...

 NUMERICAL ANALYSIS OF ALTERNATIVE CURRENT ELECTROOSMOSIS MICROPUMP (ACEO) WITH PLANAR-INCLINED MICROELECTRODES

 Recent numerical and experimental studies have investigated the increase in efficiency of microfluidic ac electroosmosis (ACEO) pumps by introducing nonplanar geometries with raised steps on the electrodes. The cu...

INCREDIBLE INNOVATION IN VISIBLE LIGHT COMMUNICATION - LIGHT FIDELITY (LI - FI)

ight Fidelity (Li - Fi), high speed communication and networking variant of Visible Light Communication (VLC , aims to utilize a vast amount of unused electromagnetic spectrum in the visible light region. It provid...

Download PDF file
  • EP ID EP154324
  • DOI 10.5281/zenodo.59534
  • Views 95
  • Downloads 0

How To Cite

Suriya Begum (30).  A COMPREHENSIVE STUDY ON ETHICAL HACKING. International Journal of Engineering Sciences & Research Technology, 5(8), 214-219. https://europub.co.uk/articles/-A-154324