Need of Ethical Hacking in Online World
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 135 | Views: 309

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 4, April 2013 | Popularity: 6.6 / 10


     

Need of Ethical Hacking in Online World

Monika Pangaria, Vivek Shrivastava


Abstract: Hackers have been broken into websites of credit card companies, online retailers and even government and military sites holding most crucial and confidential information with them. To recall, an examination of 250, 000 diplomatic cables exposed by WikiLeaks by the U. S. newspaper proved that high-standard Chinese civilians and military officials assisted fruitful hacking attacks aimed at gaining a broad range of U. S. government and military information. In a sign, cyber security must be aided with quality advancements. In a row, two more U. S. companies, McDonalds Corp. and Walgreen Co. , revealed that they had been compromised along with U. S. media company, Gawker. Much of this hacked information was supposed to be provided by end customers when they used to sign up for online subscriptions. The main objective of this paper is to cover core elements of information security, security challenges, effects of breaching and lastly emphasis on why ethical hacking is needed, what qualities must an ethical hacker posses even with its scope and limitations.


Keywords: Hacking, Hacker, Ethical Hacking, Information Security, Hack value, Daisy Chaining


Edition: Volume 2 Issue 4, April 2013


Pages: 529 - 531



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Monika Pangaria, Vivek Shrivastava, "Need of Ethical Hacking in Online World", International Journal of Science and Research (IJSR), Volume 2 Issue 4, April 2013, pp. 529-531, https://www.ijsr.net/getabstract.php?paperid=IJSRON2013859, DOI: https://www.doi.org/10.21275/IJSRON2013859

Similar Articles

Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Informative Article, Computer Science & Engineering, India, Volume 12 Issue 2, February 2023

Pages: 1106 - 1106

Cyber Warfare by Chinese hackers: The AIIMS Story

Dr. Yatu Rani, Sarthak Jain

Share this Article

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 9 Issue 2, February 2020

Pages: 1921 - 1930

Secure Web: Integrating AI Driven Vulnerability Management and Anomaly Detection in AWS Based E - Commerce Platforms

Sai Tarun Kaniganti

Share this Article

Downloads: 42 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Downloads: 94

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1879 - 1884

A Defense Security Approach against Hacking Using Trusted Graphs

D. N. Rewadkar, Harshal A. Kute

Share this Article
Top