International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 135

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 4, April 2013


Need of Ethical Hacking in Online World

Monika Pangaria | Vivek Shrivastava


Abstract: Hackers have been broken into websites of credit card companies, online retailers and even government and military sites holding most crucial and confidential information with them. To recall, an examination of 250, 000 diplomatic cables exposed by WikiLeaks by the U. S. newspaper proved that high-standard Chinese civilians and military officials assisted fruitful hacking attacks aimed at gaining a broad range of U. S. government and military information. In a sign, cyber security must be aided with quality advancements. In a row, two more U. S. companies, McDonalds Corp. and Walgreen Co. , revealed that they had been compromised along with U. S. media company, Gawker. Much of this hacked information was supposed to be provided by end customers when they used to sign up for online subscriptions. The main objective of this paper is to cover core elements of information security, security challenges, effects of breaching and lastly emphasis on why ethical hacking is needed, what qualities must an ethical hacker posses even with its scope and limitations.


Keywords: Hacking, Hacker, Ethical Hacking, Information Security, Hack value, Daisy Chaining


Edition: Volume 2 Issue 4, April 2013,


Pages: 529 - 531

Need of Ethical Hacking in Online World


How to Cite this Article?

Monika Pangaria, Vivek Shrivastava, "Need of Ethical Hacking in Online World", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=IJSRON2013859, Volume 2 Issue 4, April 2013, 529 - 531, #ijsrnet

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'Hacking'

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2025 - 2029

Investigation of Security in Cloud Computing

Annu Devi

Share this Article

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1879 - 1884

A Defense Security Approach against Hacking Using Trusted Graphs

D. N. Rewadkar [11] | Harshal A. Kute [2]

Share this Article


Top