Open Access Open Access  Restricted Access Subscription Access

Analysis of Ethical Hacking Methodology to Protect the Computer Networks

E. N. Ganesh

Abstract


One of the quickest developing regions in network security, and surely a region that creates a lot of conversation is that of moral hacking. The condition of safety on the web is exceptionally poor. Robbery is an act in which a person tries to fall into the trap of self-interest or self-satisfaction such as openness. As open and private organizations move a large number of their core capabilities or applications, for example, the electronic business, exhibition and set of web acceptance data, then, at times, offenders have a large open door and access to data that touches the web application. There is therefore a need to protect the framework from the disruption of the producer-generated crime to advance the people who will bring back the illegal attacks on our structures. So moral hacking is an evaluation to test and really look at data innovation climate for conceivable failure points and weaknesses. Moral hacking depicts the most common way of hacking an organization in a moral manner, consequently with great intensions this paper portrays what moral hacking is, what it can do, a moral hacking strategy too as certain apparatuses which can be utilized for a moral hack.


Keywords


Vulnerabilities, hacker, cracker, port, intrusion, compatibility.

Full Text:

PDF

References


Farsole AA, Kashikar AG, Zunzunwala A. Ethical hacking. International Journal of Computer Applications. 2010 Feb;1(10):14-20. 2. Fadia A. An Ethical Hacking Guide to Corporate Security. Macmillan; 2004. 3. Juneja GK. Ethical hacking: a technique to enhance information security. International Journal of Innovative Research in Science, Engineering and Technology. 2013;2(12):7575-80. 4. Bratus S, Shubina A, Locasto ME. Teaching the principles of the hacker curriculum to undergraduates. In Proceedings of the 41st ACM technical symposium on computer science education 2010:(122-126). 5. Dimkov T, Pieters W, Hartel P. Training students to steal: a practical assignment in computer security education. In Proceedings of the 42nd ACM technical symposium on computer science education 2011(21-26).

Ec-Council (2005, March). Ethical Hacking: Student courseware [Online]. Available from www.eccouncil.org.

The autotelic propensity of types of hackers. In Proceedings of the 4th Annual Conference on Information Security Curriculum Development. Greene, Tim 2004.

Training ethical hackers: Training the enemy? L., & Workman, R. (2007). [Online] Available from https://defcon.org/html/links/dc_press/archives/12/ebcvg_training_ethical_hackers. htm. Lancor

Lancor L, Workman R. Using Google hacking to enhance defense strategies. In Proceedings of the 38th SIGCSE technical symposium on Computer science education 2007(491-495).

Logan PY. Crafting an undergraduate information security emphasis within information technology. Journal of Information Systems Education. 2002;13(3):177-82.




DOI: https://doi.org/10.37591/jons.v9i3.883

Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Journal of Network Security

  • eISSN: 2395–6739
  • ISSN: 2321–8517