Downloads: 135 | Views: 292
Research Paper | Computer Science & Engineering | India | Volume 2 Issue 4, April 2013 | Popularity: 6.6 / 10
Need of Ethical Hacking in Online World
Monika Pangaria, Vivek Shrivastava
Abstract: Hackers have been broken into websites of credit card companies, online retailers and even government and military sites holding most crucial and confidential information with them. To recall, an examination of 250, 000 diplomatic cables exposed by WikiLeaks by the U. S. newspaper proved that high-standard Chinese civilians and military officials assisted fruitful hacking attacks aimed at gaining a broad range of U. S. government and military information. In a sign, cyber security must be aided with quality advancements. In a row, two more U. S. companies, McDonalds Corp. and Walgreen Co. , revealed that they had been compromised along with U. S. media company, Gawker. Much of this hacked information was supposed to be provided by end customers when they used to sign up for online subscriptions. The main objective of this paper is to cover core elements of information security, security challenges, effects of breaching and lastly emphasis on why ethical hacking is needed, what qualities must an ethical hacker posses even with its scope and limitations.
Keywords: Hacking, Hacker, Ethical Hacking, Information Security, Hack value, Daisy Chaining
Edition: Volume 2 Issue 4, April 2013
Pages: 529 - 531
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2004
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 721
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 703
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 700
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 690
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera