Ethical Hacking And Information Security

Improved Essays
Abstract- Modern technological advancement made our current internet on the pinnacle of everything related to information technology. However, it is always threatened by various types of security issues, which are mostly due to hackers, their bots and malicious scripts. They attacks, corrupts, collects and destroys the essential information in the system of the valuable organizations. To stop their such harmful and hazardous activities or to take preventive measures, most organizations now started to keep their own hackers who are known as ethical hackers or white hat hackers. This paper is based on what exactly an ethical hacker does, his protective system from illegal trespassing and on the field of ethical hacking with its various aspects. …show more content…
There is a subtle difference between security and protection, we will perceive that both of them are extremely close concepts but still not the same. Protection is assured if one has all the necessary security measures as security itself is a type of protection to all the external hazards. Information is a treasure which is immensely worthy to an organization and thus it needs to be protected firmly. It is easy to corrupt, lose and steal thus the measures needed or taken to secure them from irrelevant entries are mentioned as Information Security. The significant step taken by most of the Organizations or firms recently is the use of ethical hacking process or techniques to evaluate the success or failure of their current security measures. Ethical hacking is usually done by the computer professionals who legally break into the computer system to report the owners about the vulnerabilities found. This paper is based on the “Ethical Hacking”, which has now become an essential part of any business organizations, which needs to deal with high level of security and severe malicious …show more content…
Reconnaissance involves gathering information of a target without any prior knowledge about the company relating to or an individual. It includes both Passive and Active Reconnaissance. This steps helps to discover useful data which can assist them to plan the attack. Scanning is the phase which takes place exactly after the attacker is able to collect enough information to understand the business works and those data which are valuable. Hackers uses this collecteddata to find a way which will help them executing an attack on the Operating System, Installed Software, Open Ports, IP Addresses or user accounts. Hacker uses this accumulated informationfor gaining access to the system which is the third phase of ethical hacking. They do tedious amount of work to break the passwords and often utilizes tools like legion. Only gaining access to the system isn 't everything, but to maintain their access in it, they develops a different system paththrough which he can intrude the system as an anonymous. Thisanonymous hacker does its best toremove all the evidences of the system thats being hack, defy the intrusion detection alarms and thus avoid any form of legal actions against him. This was the third phase of hacking.In the last phase, they are ready to clear all the tracks and logs which get stored in the server log due to their activity. This is a must

Related Documents

  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Opening Statement Written policies provide a means of security within organization. It establishes the regulations that all faculty must adhere to in order to protect important company and client information. The organizational policies should be read by and signed by each employee as a consensus that all regulations will be followed once joining the organization. And, for those who are current employees, to keep abreast of any amendments made to current policy, so that all employees are in compliance. These policies should be kept in an accessible place for everyone to read, so no one will be left out of the loop.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Marisa Bugarin Professor Bivona ENG 102 3:00-4:15 3/16/15 Annotated Bibliography Annotated Bibliography 1) Chemaly, Soraya. " A Million Peeping Toms: When Hacking Is Also A Hate Crime." Time. Com (2014): 1.…

    • 1953 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Some ‘hackers’ are just regular individuals trying to improve any computer systems or explore the wonders of the technological world. But unfortunately, most hackers are here to mortify others and take advantage of them. The pre-Christmas 2013 attack at Target…

    • 1031 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    As seen with the case in which someone has to put a password to an Email account, confidentiality is a matter that is of great concern in many scenes of life . Cybersecurity is quite applicable as a tool that offers security when it comes to transfer of data though networks and between different people in one connection. For instance, cybersecurity is a tool used to ensure that the information shared among workers within an institution, through a connection of computers and computer systems, is not accessed by people who do not belong to this organization. In many cases, people will try to enter forcefully and access such confidential information without the consent of the organization. Cybersecurity helps such organizations in installing systems where access will be denied to non-members, and allowed to members since they make use of passwords and other security mechanisms installed within the computers and the connections .…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    The Office of Personnel Management reported individual information on 21.5 million people was bargained by the hack of the organization's examination database called e-QIP. OPM's endeavors to settle vulnerabilities in the framework used to oversee foundation examination information, known as Electronic Questionnaires for Investigations Processing (e-QIP). However, the recuperation on these individual’s information will forever be lost. In the domain of cybersecurity, the government houses information related to national security that follow cyber ethnics and the government is morally obligated to secure online database environments. Establishing polices relating to cyber ethical values include cyber incident complications immediately to all affected users.…

    • 1150 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Anonymouss Are Ethical

    • 871 Words
    • 4 Pages

    In this paper, I will argue that the group Anonymous aren’t criminals and their actions are ethical. I will argue that this thesis is true from the utilitarianism view; they are hacking for the good of the people. Some examples I will include are Project Chanology, Hal Turner, and Operation DarkNet. I will also consider the opposing position that Anonymous are bad and unethical. I will argue that it is mistaken because of misknowledge of the operations and what Anonymous’ purpose is.…

    • 871 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    To beat a hacker, you should be a person who thinks like a hacker” and “To master hacking, you should need to…

    • 587 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Anonymous: The Generation of Hacktivists “We are not hackers. We are not terrorists. We are not violent. We are citizens of the world who bear witness to tyranny, oppression and censorship.” “We resist those who seek to violate our rights as human beings.”…

    • 1851 Words
    • 8 Pages
    Great Essays
  • Superior Essays

    The Cult Of The Dead Cow

    • 855 Words
    • 4 Pages

    A majority of the population perceive Hacktivists as criminals, while others see them as today’s heroes. Hacktivist groups have warned, rallied and provided a voice for the people. Cult of the Dead Cow penetrated and disabled several firewalls designed to protect China 's internet users from obtaining supposedly censored material from other parts of the world (“China...”). The Cult of the Dead Cow are also responsible for creating the Back Orifice software. Hacktivists designed this software for remote administration of a computer system.…

    • 855 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Ethical Hacking

    • 741 Words
    • 3 Pages

    There is a component to these ethical hacking assignments, which requires that you look at your own beliefs, ethics and morality. In some cases you can accomplish the tasks without engaging in any form of deception, harm, or social or physical injury to the target. If you can not complete the task without offending your own ethics, then you need to state that you did not complete the task, but you really need to post how you would have done it, and discuss where the edge is between what you feel is proper behavior, and what you deem to be improper behavior… but the key is you need to explain it, and “get your head around it” as For example, from a completely theoretical perspective, lets us say that for sake of discussion that you selected a card that instructs you to punch a classmate in the head, and then to steal their wallet and money. While there is no possible way that we would ever be asked to do this, but let’s say you did. You, and the rest of the people in class would of course refused to perform such a task as it would be an affront to our individual moralities and shared ethical code.…

    • 741 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Conformity Bias

    • 1015 Words
    • 5 Pages

    How times have changed as technologies, have evolved, so too have the tools that cyber attackers use to hack into businesses to access personal information. Fraud has always existed and has hardly changed, only the disguises it uses. In today’s world people, have been taught to push and strive for more and to continue to push for more. This new way of thinking has quickly developed into something uncontrollable. It has caused a new stream of fraud to emerge for it has created higher levels of greed, new methods to detection, as well as new ways to prevention.…

    • 1015 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    P3: Describe how software and network security can keep systems and data secure In every single large organisation, security of data and system are very important. I will describe how network security and software are able to keep the data and systems secure. I will write about alternative network security methods and software which every single company should use. I will also explain these terms to show a better understanding of how important it is ti protect data and system which an organisation is working with.…

    • 1134 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Cybercriminals

    • 1476 Words
    • 6 Pages

    At first, the term ‘hacker’ stood for a highly skilled person who could make a computer do more than it was originally programmed to do. A ‘hack’ was a programming shortcut, and one of the most famous ones was created in 1969 by Bell Laboratories employees Dennis Ritchie and Ken Thompson, and it was called UNIX. The first major hack occurred in 1971 by a man named John Draper. It was actually called ‘phreaking’, and it was the turning point at which ‘hacking’…

    • 1476 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Steven Levy: Hacker Ethics

    • 1453 Words
    • 6 Pages

    Being a hacker has evolved through the centuries. Recent past indicates a hacker as a person that gets into the system of a company or individual in order to obtain information, or to damage the computer. However, in Steven Levy’s text, he indicates a hacker as someone who is trying to push the limits farther, as being a visionary or adventurer. What Steven tried to accomplish was to bring forward the contributions that these innovators laid the foundation for. He was not trying to tell the story of the richest or the most popular, but the story of those that spent countless hours in intimacy with the machine itself, the real story behind the computer revolution.…

    • 1453 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    In this paper the writer will consider the moral and ethical implications of reverse engineering, competitive intelligence, and corporate espionage. This is a moral issue because it involves many facets and perspectives in which morality may be derived, justified, or altogether ill applied. Especially with respect to military projects in which corporate secretes may become important, and perhaps from a national security point of view, vital. This issue is relevant, especially in the in the modern age, because of the ease of access in which sensitive material may be gained. It must be noted that corporate espionage and reverse engineering knows no borders.…

    • 1663 Words
    • 7 Pages
    Improved Essays