Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
ijest.info
…
6 pages
1 file
This paper explores the ethics behind ethical hacking and whether there are problems that lie with this new field of work. Since ethical hacking has been a controversial subject over the past few years, the question remains of the true intentions of ethical hackers. The paper also ...
Explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: criminal hackers. An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. Governments, companies, and private citizens around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization's secrets to the open Internet. There are many techniques used to hack the information. This paper explores the ethics behind techniques of ethical hacking and whether there are problems that lie with this new field of work. In this paper we have discussed in detail history and types of hackers , different techniques used to hack the users, Operating System used in hacking , its pros and cons and a detail case study of J.P.Morgan.
IAEME PUBLICATION, 2020
An ethical hacker is the network specialist & computer who pounce some security systems on the behalf of its possessor seeking amenability that could be exploited by a malicious hacker. The Internet's explosive growth has conduct many virtuous things: e-commerce, e-mail, collaborative computing & new fields for advertisement and information distribution. Ethical hacking has become a main anxiety for businesses & governments, also known as the intrusion testing or penetration testing or red teaming. Organizations are concerned about the probability of being "hacked" & potential clients are concerned about keeping personal information under control. Hackers are classified according to their work and knowledge. The white hat hackers are the ethical hackers. Ethical hackers use hacking approaches to ensure safety. Ethical hacking is needed to protect the system from the hacker's damage. The major reason behind the ethical hacking study is to assess the security and report back to the owner of the target system. This paper provides a brief ideas of the ethical hacking & every aspects.
The Ethics of Cybersecurity, 2019
The goal of this chapter is to provide a conceptual analysis of ethical hacking, comprising history, common usage and the attempt to provide a systematic classification that is both compatible with common usage and normatively adequate. Subsequently, the article identifies a tension between common usage and a norma-tively adequate nomenclature. 'Ethical hackers' are often identified with hackers that abide to a code of ethics privileging business-friendly values. However, there is no guarantee that respecting such values is always compatible with the all-things-considered morally best act. It is recognised, however, that in terms of assessment, it may be quite difficult to determine who is an ethical hacker in the 'all things considered' sense, while society may agree more easily on the determination of who is one in the 'business-friendly' limited sense. The article concludes by suggesting a pragmatic best-practice approach for characterising ethical hacking, which reaches beyond business-friendly values and helps in the taking of decisions that are respectful of the hackers' individual ethics in morally debatable, grey zones.
IOSR Journal of Computer Engineering (IOSR JCE) , 2018
The legality of ethical hacking has been a topic of debate. Over the years, malicious hacking has given hacking a bad name but from the beginning hacking was not intended to be a criminal activity. Though hacking could be malicious, it could also be ethical, legal and acceptable. In this paper, we analyse the legality and acceptability of ethical hacking and why it is not a criminal activity.
Pakistan Journal of Engineering and Technology
Hacking is a typical method for breaching personal and confidential information. As a result, hacking is also known as infiltration. Intrusions, on the other hand, were not always recognized as theft and were employed for productive purposes. A person or corporation that does ethical hacking and receives incentives from a network or system owner for testing can enter an apparatus (system or network) to locate, repair, and expose network flaws. Most ethical hackers, also known as black hat hackers, test systems using different approaches, methodologies, and tools. Because today's life is lived in a digital world, we need to protect our privacy from cyber-attacks. The proposed paper discussed ethical hacking and its ramifications, in which black hackers "hack" networks. The proposed research emphasizes ethical hacking tactics. This research also examines the impact of ethical hacking on business, education, health, society, the workplace, technology, sensitive informatio...
2015
The purpose of this study is to address the issues and concerns of network security professionals due to the prominence of information technologies and growing dependence on the Internet. Growing concern stems from the apparent lack of security inherent within information technologies and information systems. Such topics as identity theft and the latest computer virus are addressed in light of inherent dangers and implications from attackers world wide. Particular emphasis is placed upon the need for determining a potential proactive measure to improve network security. Measures consisting of a hacking methodology in network security to combat the exacerbating topics associated with the Internet and computer networks world wide are examined. The study includes a history of hacking, investigation into present day issues and concerns, and topics such as cyber terrorism, identity theft, and economical considerations are focused on. The study concludes by examining ethical hacking as a ...
International Journal of Innovative Research in Computer Science & Technology, 2020
Massive growth of the Internet has brought in many good things such as e-commerce, easy access to extensive sources of learning material, collaborative computing, e-mail, and new avenues for enlightenment and information distribution to name a few. Today, since almost all the work is done over the internet, crucial data is sent over the web and other information is placed over the internet. So ensuring data security over the internet is very important and should be taken care of at utmost priority. As with most technological advances, there is also a dark side attached to it, i.e. hacking. Hacking is an activity in which a person (namely hackers) exploits the weaknesses and vulnerabilities in a system for self profit or gratification. With the growing movement of the world from offline to online culture like shopping, banking, sharing information access to sensitive information through the web applications has increased. Thus the need of protecting the systems from hacking arises to promote the persons who will punch back the illegal attacks on the computer systems and will ensure data security. As every coin has two faces, this coin also has one another face which generally acts as a life saver for the victims of hacking. This lifeguard technique is called ethical hacking. Ethical hacking is a technique which is used to identify the weaknesses and vulnerabilities in the system or computer network in order to strengthen the system further to prevent the data. The main reason behind studying ethical hacking is to evaluate target system security. This paper helps to generate a brief idea of ethical hacking and all aspects.
International Journal of Engineering Applied Sciences and Technology, 2021
The explosive growth of the Internet has brought many good things such as E-commercebanking, E-mail, cloud computing, but there is also a dark side such as Hacking, Backdoors, Trapdoors etc. Hacking is the first big problem faced by Governments, companies, and private citizens around the world. Hacking means reading email’s of someone, stealing passwords, stealing credit card numbers etc. An ethical hacker is one who can help the people who are suffered by this hackings. This paper describes about Ethical hackers, it’s types and phases of hacking
IRJET, 2021
The security situation on the web is exceptionally bad. Hacking is an action in which a person is thrilled at the lack of a structure for self-gain. A large amount of applications such as open and private associations or electronic business transfer their basic capabilities, Advertisements and data determine entry to the Internet, at which point the crooks have more freedom and motivation to access tactile data via web applications. In this way, ethical hackers or white hat programmers appeared to lose out on these important issues. Ethical hacking that effectively attempts to optimize the creation of security by building security assurance to identify and fix known security vulnerabilities on structures claimed by other assemblies. Ethical hackers can test beta testing unrestricted programming, stress test distributed programming, and sweep organizations of PCs for vulnerabilities. Hacking is a cycle for circumventing the security tools of a data framework or organization. The basic motivation behind this investigation is to uncover the little idea of ethical hacking and its undertakings with corporate security.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
International Journal of Innovative Research in Science, Engineering and Technology, 2013
International Journal Of Engineering And Computer Science
2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), 2017
International Journal of Scientific Research in Science and Technology, 2023
International Journal of Multidisciplinary Research and Modern Education (IJMRME), 2015
2020 ASEE Virtual Annual Conference Content Access Proceedings
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2021
Encyclopedia of Business and Professional Ethics
Hacking Digital Ethics, 2021
IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)
Bristol University Press eBooks, 2023