Survey on Ethical Hacking Process in Network Security
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 7
Abstract
Hacking is a process in which, a person or team exploits the weakness in a system for self-proceeds or indulgence. Ethical Hacking is an activity which focuses on the vulnerability in a system and discovers the weakness and try to rectify the security weakness of a system. In the emergent field of internet, computer security is the ultimate concern for the organizations and governments. Ethical hacker plays a vital role in protecting the valuable and sensitive data in a system. This main o
Authors and Affiliations
U. Murugavel
DUE PROCESS IN THE PROCUREMENT SYSTEM: THE NIGERIA EXPERIENCE
With the upsurge in fraudulent activities in financial accounting and corrupt practices in the global economy especially Nigeria, due process in the procurement system has become an emerging topic of great importance fo...
SAFETY ANALYSIS AND RISK ASSESSMENT FOR BRIDGES HEALTH MONITORING WITH MONTE CARLO METHODS
With the increasing requirements of building safety in the past few decades, healthy monitoring and risk assessment of structures is of more and more importance. Especially since traffic loads are heavier, risk Ass...
ANALYSIS OF MULTIPLE PITTING DEFECTS ON SPUR GEAR USING ACOUSTIC SIGNALSGears are very important mechanical elements in industrial applications and it is generally made for high performance, efficiency and reliability. Any defect/fault in gear will reduce its operations/performance etc. Acoustic signal is the tool to detect fault and it is widely used for gear fault diagnostics in moving
Gears are very important mechanical elements in industrial applications and it is generally made for high performance, efficiency and reliability. Any defect/fault in gear will reduce its operations/performance et...
A REVIEW OF IMAGE WATERMARKING METHODS
Due to the recent progress in internet technology and evolution of very high speed networks operating everywhere, protection of digital content is must. So, it has become a tough task to protect copyright of an individua...
Research on Analysis of Different Image Steganography Techniques
Steganography means the process of thrashing information by embedding messages within other. Information can be in the form of text, audio, video. There are several approaches for the categorization of Steganogra...