Ethical Hacking: The Story of a White Hat Hacker

Abstract

Massive growth of the Internet has brought in many good things such as e-commerce, easy access to extensive sources of learning material, collaborative computing, e-mail, and new avenues for enlightenment and information distribution to name a few. Today, since almost all the work is done over the internet, crucial data is sent over the web and other information is placed over the internet. So ensuring data security over the internet is very important and should be taken care of at utmost priority. As with most technological advances, there is also a dark side attached to it, i.e. hacking. Hacking is an activity in which a person (namely hackers) exploits the weaknesses and vulnerabilities in a system for self profit or gratification. With the growing movement of the world from offline to online culture like shopping, banking, sharing information access to sensitive information through the web applications has increased. Thus the need of protecting the systems from hacking arises to promote the persons who will punch back the illegal attacks on the computer systems and will ensure data security. As every coin has two faces, this coin also has one another face which generally acts as a life saver for the victims of hacking. This lifeguard technique is called ethical hacking. Ethical hacking is a technique which is used to identify the weaknesses and vulnerabilities in the system or computer network in order to strengthen the system further to prevent the data. The main reason behind studying ethical hacking is to evaluate target system security. This paper helps to generate a brief idea of ethical hacking and all aspects.

Authors and Affiliations

Shivanshi Sinha, Dr. Yojna Arora

Keywords

Related Articles

Fast and Highly Scalable Multiresolution Linear Word based Clustering in Multidimensional data

Clustering problems are well known in database literature for their use in numerous applications. Multidimensional data always is a challenge for clustering algorithms. The Halite, fast and scalable clustering method tha...

Content-Based Movie Recommendation System: An Enhanced Approach to Personalized Movie Recommendations

With the exponential growth of digital media platforms and the vast amount of available movie content, users are often overwhelmed when selecting movies that match their preferences. Recommender systems have emerged as a...

Study of Thermal and Optical Sensitivity of Higher Thermo luminescence Glow Peaks in Synthetic Quartz Material

In the present scenario, 600 oC and 1000 oC annealed synthetic quartz material were irradiated by beta doses. The thermoluminescence glow curves are recorded for treated sample under influence of optical bleaching temper...

Implementation of UPFC, UPFC Along with PI and Fuzzy Based Controllers in Three Area Interconnected Power Systems for Load Frequency Control

In this paper, the author intends to present the application of Unified Power Factor Controllers (UPFC) to control the frequency of three area interdependent and interconnected reheat and hydro systems by controlling the...

Satiating A User-Delineated Time Constraints While Scheduling Workflow in Cloud Environments

Cloud computing is used to achieve sustainability in terms of computing. It reduces energy and resource consumption. Most of the companies have been moving their applications to the cloud to reduce power, energy re-so...

Download PDF file
  • EP ID EP747812
  • DOI 10.21276/ijircst.2020.8.3.17
  • Views 34
  • Downloads 0

How To Cite

Shivanshi Sinha, Dr. Yojna Arora (2020). Ethical Hacking: The Story of a White Hat Hacker. International Journal of Innovative Research in Computer Science and Technology, 8(3), -. https://europub.co.uk./articles/-A-747812