Monika Pangaria, Vivek Shrivastava
Abstract: Hackers have been broken into websites of credit card companies, online retailers and even government and military sites holding most crucial and confidential information with them. To recall, an examination of 250,000 diplomatic cables exposed by WikiLeaks by the U.S. newspaper proved that high-standard Chinese civilians and military officials assisted fruitful hacking attacks aimed at gaining a broad range of U.S. government and military information. In a sign, cyber security must be aided with quality advancements. In a row, two more U.S. companies, McDonalds Corp. and Walgreen Co., revealed that they had been compromised along with U.S. media company, Gawker. Much of this hacked information was supposed to be provided by end customers when they used to sign up for online subscriptions. The main objective of this paper is to cover core elements of information security, security challenges, effects of breaching and lastly emphasis on why ethical hacking is needed, what qualities must an ethical hacker posses even with its scope and limitations.
Keywords: Hacking, Hacker, Ethical Hacking, Information Security, Hack value, Daisy Chaining