首页    期刊浏览 2024年11月27日 星期三
登录注册

文章基本信息

  • 标题:Ethical Hacking
  • 本地全文:下载
  • 作者:Deepak Kumar ; Ankit Agarwal ; Abhishek Bhardwaj
  • 期刊名称:International Journal of Engineering and Computer Science
  • 印刷版ISSN:2319-7242
  • 出版年度:2015
  • 卷号:4
  • 期号:4
  • 页码:11466-11468
  • 出版社:IJECS
  • 摘要:Today, security is the main problem. Almost all the work is done over the internet crucial data are sent over the weband other information is placed over internet. While all the data is available online, there are many type of users who interactwith data some of them for their need and others for gaining knowledge that how to destroy the data without the knowledge ofthe owner. There are various techniques used for protection of data but the hacker (or cracker) is more intelligent to hack thesecurity, basically there are two categories of hackers that are different from each other on the basis of their intensions. Theone who has good intensions are known as ethical hackers because they ethics to use their skill and techniques of hacking toprovide security to the sensitive data of the organization. To understand this concept fully we describe introduction about thehacking, types of hackers, a survey of IC3, rules of ethical hacking and the advantages of the ethical hacking
  • 关键词:Ethical hackers; White hats; malicious hackers; Grey hats.;Introduction;Security is the major fact in today’s era where internet use is;very vast and fast growing. Every organization has issues;related to security about their sensitive and confidential data.;This is only because of hacking; Hacking is done by a person;who has wrong intensions. Basically there are two types of;hackers; one who has rights of securing data while using;hacking techniques and the other who uses his knowledge to;break security to harm the organization. These hackers are;categorized into two categories [2];1. Ethical Hackers;2. Malicious Hackers;Hacking is a process of controlling the system of an;organization without the knowledge of the organization;members. In contrast it is called breaking the security to steal;the sensitive and confidential information such as credit card;numbers; telephone numbers; home addresses; bank account;numbers etc that are available on network. This illustrates that;security is a discipline which protects the confidentiality;integrity & availability of resources. It refers this era as a;“Security Era” not because we are very much concerned about;security but due to the maximum need of security [3].It also;explains that the explosive growth of internet has brought;many good things such as electronic commerce; easy access to;vast stores of reference material; collaborative computing; email;and new avenues of advertising and information;distribution etc. but there is also a dark side such as criminal;hackers. The government; companies and private citizens;around the world are anxious to be a part of this revolution; but;they are very much afraid that some hackers will break into;their Web Server and replaces their information with;pornography; read their e-mail; steal their credit card number;from
国家哲学社会科学文献中心版权所有