Published August 5, 2016 | Version v1
Journal article Open

A COMPREHENSIVE STUDY ON ETHICAL HACKING

Description

Explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: criminal hackers. An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. Governments, companies, and private citizens around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization's secrets to the open Internet. There are many techniques used to hack the information. This paper explores the ethics behind techniques of ethical hacking and whether there are problems that lie with this new field of work. In this paper we have discussed in detail history and types of hackers , different techniques used to hack the users, Operating System  used in hacking  , its pros and cons and a detail case study of J.P.Morgan.

Files

21.pdf

Files (358.6 kB)

Name Size Download all
md5:ff26d2af08c1c1bc9257368a26f47043
358.6 kB Preview Download