Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2018, IOSR Journal of Computer Engineering (IOSR JCE)
https://doi.org/10.9790/0661 2001016163…
3 pages
1 file
The legality of ethical hacking has been a topic of debate. Over the years, malicious hacking has given hacking a bad name but from the beginning hacking was not intended to be a criminal activity. Though hacking could be malicious, it could also be ethical, legal and acceptable. In this paper, we analyse the legality and acceptability of ethical hacking and why it is not a criminal activity.
Explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: criminal hackers. An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. Governments, companies, and private citizens around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization's secrets to the open Internet. There are many techniques used to hack the information. This paper explores the ethics behind techniques of ethical hacking and whether there are problems that lie with this new field of work. In this paper we have discussed in detail history and types of hackers , different techniques used to hack the users, Operating System used in hacking , its pros and cons and a detail case study of J.P.Morgan.
The Ethics of Cybersecurity, 2019
The goal of this chapter is to provide a conceptual analysis of ethical hacking, comprising history, common usage and the attempt to provide a systematic classification that is both compatible with common usage and normatively adequate. Subsequently, the article identifies a tension between common usage and a norma-tively adequate nomenclature. 'Ethical hackers' are often identified with hackers that abide to a code of ethics privileging business-friendly values. However, there is no guarantee that respecting such values is always compatible with the all-things-considered morally best act. It is recognised, however, that in terms of assessment, it may be quite difficult to determine who is an ethical hacker in the 'all things considered' sense, while society may agree more easily on the determination of who is one in the 'business-friendly' limited sense. The article concludes by suggesting a pragmatic best-practice approach for characterising ethical hacking, which reaches beyond business-friendly values and helps in the taking of decisions that are respectful of the hackers' individual ethics in morally debatable, grey zones.
ijest.info
This paper explores the ethics behind ethical hacking and whether there are problems that lie with this new field of work. Since ethical hacking has been a controversial subject over the past few years, the question remains of the true intentions of ethical hackers. The paper also ...
IAEME PUBLICATION, 2020
An ethical hacker is the network specialist & computer who pounce some security systems on the behalf of its possessor seeking amenability that could be exploited by a malicious hacker. The Internet's explosive growth has conduct many virtuous things: e-commerce, e-mail, collaborative computing & new fields for advertisement and information distribution. Ethical hacking has become a main anxiety for businesses & governments, also known as the intrusion testing or penetration testing or red teaming. Organizations are concerned about the probability of being "hacked" & potential clients are concerned about keeping personal information under control. Hackers are classified according to their work and knowledge. The white hat hackers are the ethical hackers. Ethical hackers use hacking approaches to ensure safety. Ethical hacking is needed to protect the system from the hacker's damage. The major reason behind the ethical hacking study is to assess the security and report back to the owner of the target system. This paper provides a brief ideas of the ethical hacking & every aspects.
Hacking Digital Ethics, 2021
This book will be published April 2021 by Anthem Press. It argues for a fundamental revision of the discourse of digital ethics in the 21st Centruy.
International Journal of Scientific Research in Science and Technology, 2023
There are many positive aspects to the Internet's fast expansion, such as e-commerce, banking, email, and cloud computing, but there is also a negative aspect, such as hacking and backdoors. The first significant issue that governments, businesses, and ordinary people confront globally is hacking, which includes reading other people's emails, stealing their credit card information from an online store, and covertly disclosing secrets to the public Internet. The victims of these hackings might receive assistance from an ethical hacker. This essay discusses ethical hackers, their techniques, attitudes, and methods for assisting clients in identifying and closing security flaws.
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2021
This paper will discuss the topic of ethical hacking, which is also called penetration testing. It starts by briefing about the ethical hacking introduction and its key protocols. It will further discuss the varied classifications of hacking and explain the causes for the swift rise in the cyber-crimes and their impact on socio-economic growth. The advantages and limitations of ethical hacking are also listed. It will further discuss the steps involved in ethical hacking, who is allowed to conduct ethical hacking, and its importance in order to reduce the effect of these attacks, penetration tests are highly required, to consider an acceptable solution for this task. Results from the case study shows that there are negative impacts where the society suffers from cybercrimes and why the computer or networking tools are targeted for the crimes. Ethical hacking education can provide the future professionals to combat the future cyber security issues.
International Journal of Innovative Research in Science, Engineering and Technology, 2013
The state of security on the internet is bad and getting worse. One reaction to this state of affairs is termed as Ethical Hacking which attempts to increase security protection by identifying and patching known security vulnerabilities on systems owned by other parties. As public and private organizations migrate more of their critical functions to the Internet, criminals have more opportunity and incentive to gain access to sensitive information through the Web application. Thus the need of protecting the systems from the nuisance of hacking generated by the hackers is to promote the persons who will punch back the illegal attacks on our computer systems. So, Ethical hacking is an assessment to test and check an information technology environment for possible weak links and vulnerabilities. Ethical hacking describes the process of hacking a network in an ethical way, therefore with good intentions. This paper describes what ethical hacking is, what it can do, an ethical hacking me...
Encyclopedia of Business and Professional Ethics
Pakistan Journal of Engineering and Technology
Hacking is a typical method for breaching personal and confidential information. As a result, hacking is also known as infiltration. Intrusions, on the other hand, were not always recognized as theft and were employed for productive purposes. A person or corporation that does ethical hacking and receives incentives from a network or system owner for testing can enter an apparatus (system or network) to locate, repair, and expose network flaws. Most ethical hackers, also known as black hat hackers, test systems using different approaches, methodologies, and tools. Because today's life is lived in a digital world, we need to protect our privacy from cyber-attacks. The proposed paper discussed ethical hacking and its ramifications, in which black hackers "hack" networks. The proposed research emphasizes ethical hacking tactics. This research also examines the impact of ethical hacking on business, education, health, society, the workplace, technology, sensitive informatio...
International Journal of Engineering Applied Sciences and Technology, 2021
The explosive growth of the Internet has brought many good things such as E-commercebanking, E-mail, cloud computing, but there is also a dark side such as Hacking, Backdoors, Trapdoors etc. Hacking is the first big problem faced by Governments, companies, and private citizens around the world. Hacking means reading email’s of someone, stealing passwords, stealing credit card numbers etc. An ethical hacker is one who can help the people who are suffered by this hackings. This paper describes about Ethical hackers, it’s types and phases of hacking
2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), 2017
Cybercrime is a computer oriented crime that involves a computer and a network. Cybercrimes include most of the times profit oriented criminal activities. Hacking is the set of instruction using which we can interrupt between the client and server. In Intentional hacking hackers who attacks on the any client servers with the moto to harm the system and communication between the server's Unintentional hackers are those who may sometimes intemperate laws but doesn't have intention to harm or to steal. These type of hackers either work with an organization or under government. In this, we have explained different types of hacker in detail and how the systems are basically hacked by the hackers and how the positive and negative side of the hacking.
2015
The purpose of this study is to address the issues and concerns of network security professionals due to the prominence of information technologies and growing dependence on the Internet. Growing concern stems from the apparent lack of security inherent within information technologies and information systems. Such topics as identity theft and the latest computer virus are addressed in light of inherent dangers and implications from attackers world wide. Particular emphasis is placed upon the need for determining a potential proactive measure to improve network security. Measures consisting of a hacking methodology in network security to combat the exacerbating topics associated with the Internet and computer networks world wide are examined. The study includes a history of hacking, investigation into present day issues and concerns, and topics such as cyber terrorism, identity theft, and economical considerations are focused on. The study concludes by examining ethical hacking as a ...
International Journal Of Engineering And Computer Science
As nowadays all the information is available online, a large number of users are accessing it, some of them use this information for gaining knowledge and some use it to know how to use this information to destroy or steal the data of websites or databases without the knowledge of the owner. The purpose of this paper is to tell what is hacking, who are hackers, what is ethical hacking, what is the code of conduct of ethical hackers and the need of them. A small introduction of Linux Operating System is given in this paper. All the techniques are performed on the Linux operating system named Kali Linux. After this some basic hacking attacks covered in the paper are MiTM Attack (Man in The Middle Attack), Phishing Attack, DoS Attack (Denial of Services Attack). Further what is Wi-Fi, what are the techniques used in the Wi-Fi protection and the methods used by the hackers to hacks Wi-Fi passwords is covered in the paper.
The Ethics of Cybersecurity, 2020
Technologies are developing faster and their impact is bigger than ever before. Synergies emerge between formerly independent technologies that trigger accelerated and unpredicted effects. Alongside these technological advances new ethical ideas and powerful moral ideologies have appeared which force us to consider the application of these emerging technologies. In attempting to navigate utopian and dystopian visions of the future, it becomes clear that technological progress and its moral quandaries call for new policies and legislative responses. Against this backdrop this new book series from Springer provides a forum for interdisciplinary discussion and normative analysis of emerging technologies that are likely to have a significant impact on the environment, society and/or humanity. These will include, but be no means limited to nanotechnology, neurotechnology, information technology, biotechnology, weapons and security technology, energy technology, and space-based technologies.
IRJET, 2021
The security situation on the web is exceptionally bad. Hacking is an action in which a person is thrilled at the lack of a structure for self-gain. A large amount of applications such as open and private associations or electronic business transfer their basic capabilities, Advertisements and data determine entry to the Internet, at which point the crooks have more freedom and motivation to access tactile data via web applications. In this way, ethical hackers or white hat programmers appeared to lose out on these important issues. Ethical hacking that effectively attempts to optimize the creation of security by building security assurance to identify and fix known security vulnerabilities on structures claimed by other assemblies. Ethical hackers can test beta testing unrestricted programming, stress test distributed programming, and sweep organizations of PCs for vulnerabilities. Hacking is a cycle for circumventing the security tools of a data framework or organization. The basic motivation behind this investigation is to uncover the little idea of ethical hacking and its undertakings with corporate security.
International Journal of Innovative Research in Computer Science & Technology, 2020
Massive growth of the Internet has brought in many good things such as e-commerce, easy access to extensive sources of learning material, collaborative computing, e-mail, and new avenues for enlightenment and information distribution to name a few. Today, since almost all the work is done over the internet, crucial data is sent over the web and other information is placed over the internet. So ensuring data security over the internet is very important and should be taken care of at utmost priority. As with most technological advances, there is also a dark side attached to it, i.e. hacking. Hacking is an activity in which a person (namely hackers) exploits the weaknesses and vulnerabilities in a system for self profit or gratification. With the growing movement of the world from offline to online culture like shopping, banking, sharing information access to sensitive information through the web applications has increased. Thus the need of protecting the systems from hacking arises to promote the persons who will punch back the illegal attacks on the computer systems and will ensure data security. As every coin has two faces, this coin also has one another face which generally acts as a life saver for the victims of hacking. This lifeguard technique is called ethical hacking. Ethical hacking is a technique which is used to identify the weaknesses and vulnerabilities in the system or computer network in order to strengthen the system further to prevent the data. The main reason behind studying ethical hacking is to evaluate target system security. This paper helps to generate a brief idea of ethical hacking and all aspects.
Hacking has become an extensive trouble with the beginning of the digital age, almost worldwide access to the internet and other digital media. It is significant for individuals, corporations, and the government to guard them from being susceptible to such attacks. The purpose of this paper is to provide information about ethical hacking; their skill to share advanced security knowledge and capabilities with organization and pointing out their vulnerabilities.
As nowadays all the information is available online, a large number of users are accessing it, some of them use this information for gaining knowledge and some use it to know how to use this information to destroy or steal the data of websites or databases without the knowledge of the owner. The purpose of this paper is to tell what is hacking, who are hackers, what is ethical hacking, what is the code of conduct of ethical hackers and the need of them. A small introduction of Linux Operating System is given in this paper. All the techniques are performed on the Linux operating system named Kali Linux. After this some basic hacking attacks covered in the paper are MiTM Attack (Man in The Middle Attack), Phishing Attack, DoS Attack (Denial of Services Attack). Further what is Wi-Fi, what are the techniques used in the Wi-Fi protection and the methods used by the hackers to hacks Wi-Fi passwords is covered in the paper.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.