International Journal of Innovative Research in Engineering and Management
Year: 2020, Volume: 8, Issue: 3
First page : ( 131) Last page : ( 136)
Online ISSN : 2350-0557.
DOI: 10.21276/ijircst.2020.8.3.17 |
DOI URL: https://doi.org/10.21276/ijircst.2020.8.3.17
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Shivanshi Sinha , Dr. Yojna Arora
Massive growth of the Internet has brought in many good things such as e-commerce, easy access to extensive sources of learning material, collaborative computing, e-mail, and new avenues for enlightenment and information distribution to name a few. Today, since almost all the work is done over the internet, crucial data is sent over the web and other information is placed over the internet. So ensuring data security over the internet is very important and should be taken care of at utmost priority. As with most technological advances, there is also a dark side attached to it, i.e. hacking. Hacking is an activity in which a person (namely hackers) exploits the weaknesses and vulnerabilities in a system for self profit or gratification. With the growing movement of the world from offline to online culture like shopping, banking, sharing information access to sensitive information through the web applications has increased. Thus the need of protecting the systems from hacking arises to promote the persons who will punch back the illegal attacks on the computer systems and will ensure data security. As every coin has two faces, this coin also has one another face which generally acts as a life saver for the victims of hacking. This lifeguard technique is called ethical hacking.
Ethical hacking is a technique which is used to identify the weaknesses and vulnerabilities in the system or computer network in order to strengthen the system further to prevent the data. The main reason behind studying ethical hacking is to evaluate target system security. This paper helps to generate a brief idea of ethical hacking and all aspects.
(An ISO 3297: 2007 Certified Organization),Vol. 3, Issue 9, September 2015.
Student, Department of Computer Science and Engineering, Amity University, Gurugram, Haryana, India, 9911193360, (email:schaudhary@ggna.amity.edu)
No. of Downloads: 55 | No. of Views: 1768
Rubeel Taj, Aaftab Alam, Falak Alam, Mohd Haroon.
January 2025 - Vol 13, Issue 1
Anshjyot Singh Wadhwa.
September 2024 - Vol 12, Issue 5
Mohammad Hashir, Sanskar Mishra, Yojna Arora, Avinash Kumar Sharma.
September 2024 - Vol 12, Issue 5