Author(s):
Prashant Kumar Gavel, Ramakant Prasad, Nainsy Rathore, Deepshikha Yadav
Email(s):
prashantgavel99@gmail.com , mr.ramakantprasad@gmail.com , nainsyrathore28141@gmail.com , yadavdeepshikha119@gmail.com
DOI:
10.5958/2231-3915.2020.00016.4
Address:
Prashant Kumar Gavel, Ramakant Prasad, Nainsy Rathore, Deepshikha Yadav
SoS in CS and IT, Pt. Ravishankar Shukla Univeristy, Raipur, India.
*Corresponding Author
Published In:
Volume - 10,
Issue - 1,
Year - 2020
ABSTRACT:
Basically, hacking is the expertise in any field that can be used for both ethical and unethical purposes. Those who perform hacking are known as Hackers. Therefore, hackers are classified as per their working and as per their knowledge. The ethical hackers are also known as white hat hackers. Ethical hackers use their hacking techniques for providing security legally. Generally white hat hackers are legally authorized hackers that work for Government. This paper explores the cyber world and cyber-crimes and its components over the internet. The fast-growing internet technology has benefited the e-commerce, e-mail, online banking or system, advertising, vast stores of reference material etc. But there is also a dark side internet becomes a common and easy tool for the criminal activity using the weak link and vulnerability of internet, the objective of this study is to understand the several hacking activities that come under the cyber-crime. Its focus is on the role of ethical hacker to remove it from the offender, cyber-crime and illustrate on proactive approach to decrease the threat of hacking and Cyber-crimes.
Cite this article:
Prashant Kumar Gavel, Ramakant Prasad, Nainsy Rathore, Deepshikha Yadav. Ethical Hacking and Cyber Security against Cyber Attacks. Int. J. Tech. 2020; 10(1):83-87. doi: 10.5958/2231-3915.2020.00016.4
Cite(Electronic):
Prashant Kumar Gavel, Ramakant Prasad, Nainsy Rathore, Deepshikha Yadav. Ethical Hacking and Cyber Security against Cyber Attacks. Int. J. Tech. 2020; 10(1):83-87. doi: 10.5958/2231-3915.2020.00016.4 Available on: https://ijtonline.com/AbstractView.aspx?PID=2020-10-1-16
REFERENCES:
1. J. Gaia and G. L. Sanders, “Psychological Profiling of Hacking Potential 1,” vol. 3, pp. 2230–2239, 2020.
2. V. S. Padilla and F. F. Freire, “A Contingency Plan Framework for Cyber-Attacks,” J. Inf. Syst. Eng. Manag., vol. 4, no. 2, pp. 2–7, 2019.
3. M. G. Porcedda and D. S. Wall, “Cascade and Chain Effects in Big Data Cybercrime: Lessons from the TalkTalk hack,” Proc. - 4th IEEE Eur. Symp. Secur. Priv. Work. EUROS PW 2019, pp. 443–452, 2019.
4. F. Kwadade-cudjoe, “Effect of Cyber Security on Networks Operations ( A case study of Vodafone Ghana ),” vol. 7, no. 6, pp. 16–32, 2019.
5. A. Y. Ding, G. L. De Jesus, and M. Janssen, “Ethical hacking for boosting IoT vulnerability management: A first look into bug bounty programs and responsible disclosure,” ACM Int. Conf. Proceeding Ser., pp. 49–55, 2019.
6. P. K. Paul and S. Aithal, “Network security: threat and management,” no. November, 2019.
7. G. Thomas, O. Burmeister, and G. Low, “The Importance of Ethical Conduct by Penetration Testers in the Age of Breach Disclosure Laws.,” Australas. J. Inf. Syst., vol. 23, pp. 1–14, 2019.
8. Ding, Aaron Yi, Gianluca Limon De Jesus, and Marijn Janssen. “Ethical Hacking for Boosting IoT Vulnerability Management.” Proceedings of the Eighth International Conference on Telecommunications and Remote Sensing - ICTRS ’19 (2019).
9. N. Rathore, “Ethical Hacking and Security against Cyber Crime,” i-manager’s Journal on Information Technology, vol. 5, no. 1, pp. 7–11, 2016.
10. World Health Organizaton, “WHO Information Note on the Use of Dual HIV / Syphilis Rapid Diagnostic Tests ( RDT),” 2019
11. R. Nath, A. Mukhopadhyay, “Ethical Hacking: Scope and challenges in 21st century,” , vol. 1, pp. 2349-2163, 2019.
12. Pavlik, Kimberly, “Cybercrime, Hacking, And Legislation,”, , vol. 2, no. 1, pp. 13-16, 2019
13. Garg, N. kumar, D. khera,Y. Jain, and Prateek, “Towards the Impact of Hacking on Cyber Security,”, vol. 9, no. 1, pp. 61-77, 2019.
14. Attacks, cyberpaper, white,”Common cyber attacks : reducing the impact,” 2016.