Purva Vijay Patyane, Vibha Kenny

A Review on Different Ethical Hacking Techniques and its Impact on Cyber Security

  • General Medicine

A person engages in hacking when they take advantage of a system's flaw for their gain or satisfaction. A similar activity known as "ethical hacking" tries to identify and fix a system's weaknesses. Computer security is of the utmost concern to organizations and the government in the era of the Internet. These businesses use the Internet for a huge range of purposes, including electronic commerce, marketing, and database access. Data and network security, however, is a critical issue that has to be discussed. This paper tries to go through the basics of hacking and how ethical hacking compromises security. Additionally, there are differences between malicious and ethical hackers as well as their respective roles in security. To increase their aptitude and ability to multitask, specialists who use their talents to redevelop mainframe systems are referred to as hackers. Nowadays, the phrase is often used to characterize talented programmers who, driven by malice or mischief, exploit loopholes or use defects to obtain unauthorized access to computer systems. For instance, a hacker can create algorithms to break networks, compromise networks, or even impair network services. Theft of priceless records or financial gain is the main reason for harmful or unethical hacking. But not all hacking is bad anymore. This brings up a different kind of hacking: Hacking with integrity

Need a simple solution for managing your BibTeX entries? Explore CiteDrive!

  • Web-based, modern reference management
  • Collaborate and share with fellow researchers
  • Integration with Overleaf
  • Comprehensive BibTeX/BibLaTeX support
  • Save articles and websites directly from your browser
  • Search for new articles from a database of tens of millions of references
Try out CiteDrive

More from our Archive