Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)
…
6 pages
1 file
Security of computers connected to the Internet is bad and becoming worse. One reaction to this state of affairs is a behavior termed "Ethical Hacking" which attempts to proactively increase security protection by identifying and subsequently encouraging the patching of known security vulnerabilities on systems owned by other parties. Ethical hackers may beta test unreleased software, stress test released software, and scan networks of computers for vulnerabilities. Previous work has emphasized ethical hacking as an altruistic behavior but we find ethical hackers act rationally, in self-interest, to secure systems that are within their own community (sometimes for pay) -networked systems are only as secure as the weakest system within perimeter defenses.
International Journal of Multidisciplinary Research and Modern Education (IJMRME), 2015
The research objective of this study is to demystify ethical hacking by examining its principles, methodologies, and impacts on organizational cybersecurity. A qualitative methodology was utilized, analyzing case studies, industry reports, and prior literature on ethical hacking practices, which include vulnerability scanning, network monitoring, and social engineering. Major findings revealed that ethical hacking significantly reduces breach response times, with average times dropping from 72 hours in 2010 to 42 hours in 2015. Statistical analyses show that investment in ethical hacking positively correlates with breach reduction (r = -0.85, p < 0.001) and a high mitigation rate for vulnerabilities such as CSRF, achieving up to 96%. The study concludes that ethical hacking enhances cybersecurity resilience and recommends increased investment, standardized legal frameworks, regular vulnerability assessments, and ethical hacking training
International Journal of Innovative Research in Science, Engineering and Technology, 2013
The state of security on the internet is bad and getting worse. One reaction to this state of affairs is termed as Ethical Hacking which attempts to increase security protection by identifying and patching known security vulnerabilities on systems owned by other parties. As public and private organizations migrate more of their critical functions to the Internet, criminals have more opportunity and incentive to gain access to sensitive information through the Web application. Thus the need of protecting the systems from the nuisance of hacking generated by the hackers is to promote the persons who will punch back the illegal attacks on our computer systems. So, Ethical hacking is an assessment to test and check an information technology environment for possible weak links and vulnerabilities. Ethical hacking describes the process of hacking a network in an ethical way, therefore with good intentions. This paper describes what ethical hacking is, what it can do, an ethical hacking me...
Australasian Journal of Information Systems, 2002
It is estimated that losses due to computer break-ins by malicious 'crackers' (who might be external intruders or disgruntled employees intent on personal gain or revenge) are costing companies billions of dollars each year. But former hackers are now assisting the computer security industry to track down such intruders, and to develop sound security practices in order to ward off future attacks. It is argued that in recent times computer programming has moved from a craft-based, bricolage activity to a scientific approach which has led to a knowledge gap developing between the former fraternity of hackers and the computer security industry. The current inadequacies of the security industry have made this co-operation with hackers necessary but problematic, that is, should hackers who have developed their unique skill by breaking into company and government systems now be used for the rightful purposes of strengthening computer security? However, this relationship might also suggest that the hacker ethos, which has developed through the membership of a 'community of practice', and which has as its cornerstone the moral custodianship of computers and the information they contain, may represent the best way of developing ethical practice in the computer industry.
International Journal of Scientific Research in Science and Technology, 2023
There are many positive aspects to the Internet's fast expansion, such as e-commerce, banking, email, and cloud computing, but there is also a negative aspect, such as hacking and backdoors. The first significant issue that governments, businesses, and ordinary people confront globally is hacking, which includes reading other people's emails, stealing their credit card information from an online store, and covertly disclosing secrets to the public Internet. The victims of these hackings might receive assistance from an ethical hacker. This essay discusses ethical hackers, their techniques, attitudes, and methods for assisting clients in identifying and closing security flaws.
Pakistan Journal of Engineering and Technology
Hacking is a typical method for breaching personal and confidential information. As a result, hacking is also known as infiltration. Intrusions, on the other hand, were not always recognized as theft and were employed for productive purposes. A person or corporation that does ethical hacking and receives incentives from a network or system owner for testing can enter an apparatus (system or network) to locate, repair, and expose network flaws. Most ethical hackers, also known as black hat hackers, test systems using different approaches, methodologies, and tools. Because today's life is lived in a digital world, we need to protect our privacy from cyber-attacks. The proposed paper discussed ethical hacking and its ramifications, in which black hackers "hack" networks. The proposed research emphasizes ethical hacking tactics. This research also examines the impact of ethical hacking on business, education, health, society, the workplace, technology, sensitive informatio...
2015
The purpose of this study is to address the issues and concerns of network security professionals due to the prominence of information technologies and growing dependence on the Internet. Growing concern stems from the apparent lack of security inherent within information technologies and information systems. Such topics as identity theft and the latest computer virus are addressed in light of inherent dangers and implications from attackers world wide. Particular emphasis is placed upon the need for determining a potential proactive measure to improve network security. Measures consisting of a hacking methodology in network security to combat the exacerbating topics associated with the Internet and computer networks world wide are examined. The study includes a history of hacking, investigation into present day issues and concerns, and topics such as cyber terrorism, identity theft, and economical considerations are focused on. The study concludes by examining ethical hacking as a ...
Ethical hackers use the same methods and techniques to test and bypass a system's defenses as their less-principled counterparts, but rather than taking advantage of any vulnerabilities found, they document them and provide actionable advice on how to fix them so the organization can improve its overall security. The purpose of ethical hacking is to evaluate the security of a network or system's infrastructure. It entails finding and attempting to exploit any vulnerabilities to determine whether unauthorized access or other malicious activities are possible. Vulnerabilities tend to be found in poor or improper system configuration, known and unknown hardware or software flaws, and operational weaknesses in process or technical countermeasures. One of the first examples of ethical hacking occurred in the 1970s, when the United States government used groups of experts called "red teams" to hack its own computer systems. It has become a sizable sub-industry within the information security market and has expanded to also cover the physical and human elements of an organization's defenses. A successful test doesn't necessarily mean a network or system is 100% secure, but it should be able to withstand automated attacks and unskilled hackers.
International Journal of Innovative Research in Computer Science & Technology, 2020
Massive growth of the Internet has brought in many good things such as e-commerce, easy access to extensive sources of learning material, collaborative computing, e-mail, and new avenues for enlightenment and information distribution to name a few. Today, since almost all the work is done over the internet, crucial data is sent over the web and other information is placed over the internet. So ensuring data security over the internet is very important and should be taken care of at utmost priority. As with most technological advances, there is also a dark side attached to it, i.e. hacking. Hacking is an activity in which a person (namely hackers) exploits the weaknesses and vulnerabilities in a system for self profit or gratification. With the growing movement of the world from offline to online culture like shopping, banking, sharing information access to sensitive information through the web applications has increased. Thus the need of protecting the systems from hacking arises to promote the persons who will punch back the illegal attacks on the computer systems and will ensure data security. As every coin has two faces, this coin also has one another face which generally acts as a life saver for the victims of hacking. This lifeguard technique is called ethical hacking. Ethical hacking is a technique which is used to identify the weaknesses and vulnerabilities in the system or computer network in order to strengthen the system further to prevent the data. The main reason behind studying ethical hacking is to evaluate target system security. This paper helps to generate a brief idea of ethical hacking and all aspects.
Explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: criminal hackers. An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. Governments, companies, and private citizens around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization's secrets to the open Internet. There are many techniques used to hack the information. This paper explores the ethics behind techniques of ethical hacking and whether there are problems that lie with this new field of work. In this paper we have discussed in detail history and types of hackers , different techniques used to hack the users, Operating System used in hacking , its pros and cons and a detail case study of J.P.Morgan.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), 2017
Encyclopedia of Business and Professional Ethics
Computer Science and Information Technologies
EPiC Series in Computing
International Journal of Scientific Research in Engineering and Management (IJSREM), 2022
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2021
The International Library of Ethics, Law and Technology
2020 ASEE Virtual Annual Conference Content Access Proceedings
Zambia ICT Journal, 2019
The Ethics of Cybersecurity, 2019
IOSR Journal of Computer Engineering (IOSR JCE) , 2018
Bristol University Press eBooks, 2023
Communications of the ACM, 2005