Downloads: 135 | Views: 309
Research Paper | Computer Science & Engineering | India | Volume 2 Issue 4, April 2013 | Popularity: 6.6 / 10
Need of Ethical Hacking in Online World
Monika Pangaria, Vivek Shrivastava
Abstract: Hackers have been broken into websites of credit card companies, online retailers and even government and military sites holding most crucial and confidential information with them. To recall, an examination of 250, 000 diplomatic cables exposed by WikiLeaks by the U. S. newspaper proved that high-standard Chinese civilians and military officials assisted fruitful hacking attacks aimed at gaining a broad range of U. S. government and military information. In a sign, cyber security must be aided with quality advancements. In a row, two more U. S. companies, McDonalds Corp. and Walgreen Co. , revealed that they had been compromised along with U. S. media company, Gawker. Much of this hacked information was supposed to be provided by end customers when they used to sign up for online subscriptions. The main objective of this paper is to cover core elements of information security, security challenges, effects of breaching and lastly emphasis on why ethical hacking is needed, what qualities must an ethical hacker posses even with its scope and limitations.
Keywords: Hacking, Hacker, Ethical Hacking, Information Security, Hack value, Daisy Chaining
Edition: Volume 2 Issue 4, April 2013
Pages: 529 - 531
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Informative Article, Computer Science & Engineering, India, Volume 12 Issue 2, February 2023
Pages: 1106 - 1106Cyber Warfare by Chinese hackers: The AIIMS Story
Dr. Yatu Rani, Sarthak Jain
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 9 Issue 2, February 2020
Pages: 1921 - 1930Secure Web: Integrating AI Driven Vulnerability Management and Anomaly Detection in AWS Based E - Commerce Platforms
Sai Tarun Kaniganti
Downloads: 42 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021
Pages: 139 - 144Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic
Senthuran Nallainathan
Downloads: 94
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1253 - 1257Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing
Vandhana V
Downloads: 105
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 1879 - 1884A Defense Security Approach against Hacking Using Trusted Graphs
D. N. Rewadkar, Harshal A. Kute