Ethical Hacking And Information Security

Improved Essays
Abstract- Modern technological advancement made our current internet on the pinnacle of everything related to information technology. However, it is always threatened by various types of security issues, which are mostly due to hackers, their bots and malicious scripts. They attacks, corrupts, collects and destroys the essential information in the system of the valuable organizations. To stop their such harmful and hazardous activities or to take preventive measures, most organizations now started to keep their own hackers who are known as ethical hackers or white hat hackers. This paper is based on what exactly an ethical hacker does, his protective system from illegal trespassing and on the field of ethical hacking with its various aspects. …show more content…
There is a subtle difference between security and protection, we will perceive that both of them are extremely close concepts but still not the same. Protection is assured if one has all the necessary security measures as security itself is a type of protection to all the external hazards. Information is a treasure which is immensely worthy to an organization and thus it needs to be protected firmly. It is easy to corrupt, lose and steal thus the measures needed or taken to secure them from irrelevant entries are mentioned as Information Security. The significant step taken by most of the Organizations or firms recently is the use of ethical hacking process or techniques to evaluate the success or failure of their current security measures. Ethical hacking is usually done by the computer professionals who legally break into the computer system to report the owners about the vulnerabilities found. This paper is based on the “Ethical Hacking”, which has now become an essential part of any business organizations, which needs to deal with high level of security and severe malicious …show more content…
Reconnaissance involves gathering information of a target without any prior knowledge about the company relating to or an individual. It includes both Passive and Active Reconnaissance. This steps helps to discover useful data which can assist them to plan the attack. Scanning is the phase which takes place exactly after the attacker is able to collect enough information to understand the business works and those data which are valuable. Hackers uses this collecteddata to find a way which will help them executing an attack on the Operating System, Installed Software, Open Ports, IP Addresses or user accounts. Hacker uses this accumulated informationfor gaining access to the system which is the third phase of ethical hacking. They do tedious amount of work to break the passwords and often utilizes tools like legion. Only gaining access to the system isn 't everything, but to maintain their access in it, they develops a different system paththrough which he can intrude the system as an anonymous. Thisanonymous hacker does its best toremove all the evidences of the system thats being hack, defy the intrusion detection alarms and thus avoid any form of legal actions against him. This was the third phase of hacking.In the last phase, they are ready to clear all the tracks and logs which get stored in the server log due to their activity. This is a must

Related Documents

  • Improved Essays

    Cyber Security Failure

    • 802 Words
    • 4 Pages

    A tool that many of the hackers are now armed with, is the use of social engineering techniques that are luring people to websites that are full of malware and many types of spy wear. (Howarth). An acritical for SecureWorld put it this way “You can have the very best security tools and programs in place using state-of-the-art computer systems, yet all it takes is just one click to bring it all down” (Cybersecurity). This is the reality that we live in today; that we have to be extra cause on what we click and double check who. To make clear what a security attack is, it is a “A security event that has been identified by correlation and analytics tools as malicious activity that is attempting to collect, disrupt, deny, degrade or destroy information system resources or the information itself” (Gallagher).…

    • 802 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Now the question is, how do you think like a hacker? Obviously, before you can build a highly secure system, you must know the principle behind the system and all the possible ways to break them down. Hopefully, we are making some points. However, if you are still perplexed, we encourage you to read the following paragraphs more than once. Think like a hacker Undoubtedly, hacking is a very lucrative business and one of the highly sought profession in the technology industry.…

    • 803 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    The Malware Life Cycle Ka Vang Walden University The Malware Life Cycle There are many risks involved in cyber security, some more serious than others. This can range from viruses erasing an entire system, attackers hacking into a system and modifying files or attacking others, compromising sensitive information such as credit card and personal information, and more. Although these types of issues exist, there is no guarantee that even taking the best precautions will ensure 100% protection. Instead, the best option is to take the necessary steps to minimize the chances. Motivations and Evolutions A hacker’s motivation is varied and complex.…

    • 1603 Words
    • 7 Pages
    Superior Essays
  • Superior Essays

    Rhetorical Analysis: How Do The Elements Work? What elements make a good document or webpage that could get people's attention? It is all about how effectively that piece of writing uses the rhetorical appeals - which are ethos, pathos, and logos. The Federal Bureau of Investigation's (FBI's) webpage about Cyber Crime to see how the rhetorical appeals work within different writings. The webpage comes from the FBI themselves and they wrote this webpage to tell about what is Cyber Crime and how it can affect many people.…

    • 869 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Malware has become a serious issues , as we know the world now depending for technology to communicate , shopping , and educations. So I will explain what type of of malware and how to prevent from it. Malware is a serious problem and customer are mostly victim. The malware basically is a software design by hacker to perform a malicious work. Publish the the advertisements in browser and gain the password account.…

    • 1452 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    What Is Cyber Security?

    • 1268 Words
    • 6 Pages

    They much occur when system hackers exploit employees through scams and social engineering. With the sophistication and advancement in technology, hackers are becoming more sophisticated also at searching for loopholes and crack in corporate security systems and can easily gain access to protected files and data, staging a noble cyber security threat. Spear phishing is also a major security concern to the It industry (Shoemaker & Sigler, 2014). As opposed to regular phishing emails that randomly target people, victims who normally sphere head spear phishing scams are by all means looking for profitable business or private information to earn them money. Spear phishing occurs when malicious hackers target employees via emails that may appear conversant and by so doing gain access and steal personal information.…

    • 1268 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    CHAPTER IILiterature ReviewEthical Hacking and Its Importance The word hacking is used to defined as the computer criminals. Using illegal actsand have malicious intent. Hacker is the one who doing the hacking process. Hackers usetheir skill in programming and their enjoying the work in learning the details of thecomputer systems and stretch capabilities from the system. The word cracker also belongs to the same field that also uses hacking skills for the unlawful purposes likeemail id, intrudi ng other’s system.…

    • 823 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    The article Why Computer Talents Become Computer Hackers, by Xu Zhengchuan, gives a definition of what titles the “good” and “bad” hackers mean; “White hats are on a quest for knowledge, discovering and alerting security weaknesses in organizational systems and developing better, more secure computer systems; Black Hats go for revenge, sabotage, or outright criminal gain (such as to steal money, products, or services) (Zhengchuan 65).” Zero Days portrays these hackers as extremely dangerous individuals that work for their own profit. With these clear definitions, viewers can understand which of the two types of hackers are more dangerous. When interviewing subjects, the director never reveals to the viewer whether the hacker is White or Black Hat. This leaves the audience wondering which of the people they are looking at are criminals. These fears of the unknown plays into the vulnerability people feel when they are on the web.…

    • 1542 Words
    • 6 Pages
    Great Essays
  • Great Essays

    People should themselves beware and should take steps to ensure that their personal information is not used in a way which might leak the same, and facilitate it for those cyber criminals to use up this personal information to get their way (profit from someone else’s works). MEASURES TO DEAL WITH CYBER CRIMES  Role of INTERPOL INTERPOL has committed itself to fight against Cyber Crimes. Most of these crimes are Trans-National in character, which is the reason why INTERPOL can deal with them more effectively and is capable of investigating crimes like these on a Corporate Level. INTERPOL has uniquely advanced itself to the fight against cybercrimes on a global level by its proactive research into these emerging crimes. INTERPOL’s main initiatives on Cyber Crimes focus on: • Digital Forensics • National Cyber Reviews • Research and…

    • 1817 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    For instance, hacktivists have released bystander’s personal information as a means to punish and call attention to an issue. (Vamosi, “How Hacktivism Affects Us All”) Furthermore, they have attacked those who have not diminished their free speech, but simply oppose their personal views (Vamosi, “How Hacktivism Affects Us All”). Yet, the amount of damage which hacktivists create can vary with the types of attacks; as Dahan states, the attack could be web defacing or crashing the site, entirely (Dahan, “Hacking for the Homeland”). This becomes problematic for everyone when the damage, which the hacktivists cause, overshadows a positive objective. Unfortunately, different hackers see different moral boundaries in the attempt to achieve the end goal.…

    • 1010 Words
    • 4 Pages
    Improved Essays