IJCRT2102559
IJCRT2102559
net/publication/380490794
CITATIONS READS
0 3
1 author:
Research Publication
University of the Cumberlands
763 PUBLICATIONS 100 CITATIONS
SEE PROFILE
All content following this page was uploaded by Research Publication on 11 May 2024.
Abstract:
Ethical hacking is the process of recognizing the security issues and vulnerabilities in the system or computer network. A
Hacking may be ethical or unethical. The ethical hacker has a good purpose to do it. It has become the general perception in our
mind for the hacker that he will be bad, fanatic, criminal, and unethical. Basically, some of the hackers have even done the
hacking for earning money. They have stolen very important information from their customers. In some of the government
organizations, they have damaged very confidential information like social security numbers and other sensitive information. The
programmers from the field of computer science have a huge opportunity to become ethical hackers. In this article, we are looking
forward to identifying the opportunities and challenges of ethical hacking progression
Index Terms: Hacking, Ethical hacking, Unethical Hacking, Gray Hat Hackers, White Hat Hackers, Black Hat Hackers,
Penetration Test
I. INTRODUCTION
Ethical hacking is to explore vulnerabilities and to find threats on a computer or network of an individual or an organizatio n. An
ethical hacker finds the weak points or loopholes in a computer, web applications, or network and reports them to the organization
in a proper way and helps them to resolve that issues, and also helps them to prepare a patch. So, let's explore more about Ethical
Hacking step-by-step. Unethical hackers illegally do things. That is the reason hackers are not having a very good reputation. To
avoid such circumstances many organizations have appointed many ethical hackers to keep an eye on their system and computer
network. Ethical hackers are supposing to test and check vulnerabilities and weaknesses in the present system. If we do hacking
ethically it will be a good opportunity and a carrier for the programmers. There are several fields in computing where hacker s
made a measurable impact on society. In this paper, I have tried to look into different ways how we can make ethical hacking safe
and ethical.
The color black usually represents bad things or sadness, where the bad guys in ethical hacking are represented as black hats. A
black-hat hacker is an individual who attempts to gain unauthorized access to a system or network to explore them for malicious
reasons. The black-hat hacker does not have any permission or authority to access their targets. They try to inflict damage by
compromising security systems, altering the functions of websites and networks, or shutting down systems. They often do so to
steal or gain access to passwords, financial information, and other personal data.
White-hat hackers are considered to be the good guys. They work in association with the organizations to strengthen the security
of a system and the network. A white hat has permission to do security checks and penetration testing within the organization
with authorizationWhite-hat hackers are often known as ethical hackers.
Unlike black-hat hackers, ethical hackers exploit security networks and look for backdoors and loopholes when they are legally
authorized to do so. White-hat hackers always disclose every vulnerability they find in the company’s security system through
proper channels so that it can be fixed before they are being exploited by malicious actors.
Grey hats scan and uncover networks and computer systems in the way that black hats do. But a gray hat hacker does not exploit
it illegally or doesn’t tell others to do so. They usually work with the target organization to fix the problem Usually, grey-hat
hackers surf the net and hack into computer systems to notify the administrator or the owner that their system/network contains
one or more vulnerabilities that must be fixed immediately. Grey hats may also extort the hacked, offering to correct the defect for
a nominal fee.
A person with an ethical hacking career is expected to be an expert in database management, networking, and operating systems.
They also have excellent communication skills to inform the problems regarding security to the rest of the organization. Other
than these generalized skill sets, an ethical hacker also have a good awareness of the following skills:
Apart from this, an ethical hacker must be a creative thinker because black hat hackers are constantly coming up with crooked
ways to exploit a system and it is an ethical hacker's job to predict and prevent such breaches and find solutions to penetrate it.
Ethical hacking is a vital role those business organizations can use for their organization's security purposes. Ethical hacking
helps to increase the capabilities of organizations to protect organizations computer systems and networks.
The legal risks of ethical hacking include legal action due to the disclosure of personal or confidential information. Such
disclosure can lead to a legal battle and issues between the organization and the ethical hacker.
Another issue behind ethical hacking is that if the flaws found by an ethical hacker should be concise and convincing. Otherwise,
the organization will go for legal action. A Hacker has to prove all types of errors and flaws
After performing ethical hacking, a Hacker never discloses client information to third parties or other organizations and must
ensure the protection of the client. Ethical hacking is done for the security of the client’s system or network. Disclosure of the
client’s confidential information renders ethical hacking ineffective. Private information must be kept private, and confidential
information must be kept confidential.
Ethical Hacking is a glittering field in computer science. A computer expert with deep knowledge and patients had a good chance
to become an ethical hacker. Doing ethical hacking is a reputed job while if it is in an unethical manner, it would be an offense. In
conclusion, ethical hacking is not a crime. Ethical hacking as a career offers vast opportunities. A fresh certified ethical hacker
could attract a salary anywhere between INR 4 to 5 lakh per year. Experienced professionals in this field such as security
consultants, information security analysts, and ethical hacking experts can earn salaries in the range of INR 10 to INR 20 lakh.
REFERENCE
[1] https://www.researchgate.net/publication/262726769_ETHICAL_HACKING_AN_IMPACT_ON_SOCIETY
[2] Dhaya Sindhu Battina, "The strategic impacts of Intelligent Automation for knowledge and service work: An interdisciplinary
review", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.8,
Issue 10, page no.8-11, October-2020, Available :http://www.jetir.org/papers/JETIR2010517.pdf
[3] https://blog.eccouncil.org/types-of-hackers-and-what-they-do-white-black-and-grey/
[4] Ishaq Azhar Mohammed. (2020). ARTIFICIAL INTELLIGENCE FOR CYBERSECURITY: A SYSTEMATIC MAPPING OF
LITERATURE. International Journal of Innovations in Engineering Research and Technology, 7(09), 172–176. Retrieved from
https://repo.ijiert.org/index.php/ijiert/article/view/2797
[5] Ashok Kumar Reddy Nadikattu, "How Military Use Artificial Intelligence and Robotics in Fighting Terrorism", International
Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.7, Issue 11, page no.968-
974, November-2020, Available :http://www.jetir.org/papers/JETIR2011408.pdf
[6] https://www.edureka.co/blog/ethical-hacking-
career/#:~:text=Ethical%20Hacking%20Career%3A%20Job%20Profiles&text=Security%20Analyst,-
Certified%20Ethical%20Hacker&text=Security%20Consultant%2C%20(Computing%20%2F%20Networking,Penetration%20T
ester
[7] International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 11
(November 2014)
[8] http://panmore.com/ethical-hacking-code-of-ethics-security-risk-issues
[9] Ishaq Azhar Mohammed. (2020). USABILITY AND PRIVACY IN ACADEMIC LIBRARIES: REGAINING A FOOTHOLD
THROUGH IDENTITY AND ACCESS MANAGEMENT. International Journal of Innovations in Engineering Research and
Technology, 7(3), 43–48. Retrieved from https://repo.ijiert.org/index.php/ijiert/article/view/2782
[10] Dhaya Sindhu Battina, "Devops, A New Approach To Cloud Development & Testing", International Journal of Emerging
Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.7, Issue 8, page no.982-985, August-2020,
Available :http://www.jetir.org/papers/JETIR2008432.pdf
[11] Gray Hat Hacking The Ethical Hackers Handbook, Allen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Third Edition
[12] Sudhir Allam, Ashok Kumar Reddy Nadikattu, "AI ECONOMICAL WEARABLE SMART DEVICE TO ALERT REAL
TIME HEALTH REPORTS TO DOCTORS", International Journal of Creative Research Thoughts (IJCRT), ISSN:2320-2882,
Volume.8, Issue 12, pp.3287-3291, December-2020, Available at :http://www.ijcrt.org/papers/IJCRT2012360.pdf
[13] https://www.slideshare.net/multisoftmva/ethical-hacking-tools
[14] https://www.indiatoday.in/education-today/jobs-and-careers/story/ethical-hacking-1047211-2017-09-18
[15] https://blog.eccouncil.org/types-of-hackers-and-what-they-do-white-black-and-grey/
[16] Yeruva Ramana Reddy, "An empirical study on the benefits of civil systems connectivity and automation – a discussion in the
context of Metro transport", IJRAR - International Journal of Research and Analytical Reviews (IJRAR), E-ISSN 2348-1269, P-
ISSN 2349-5138, Volume.5, Issue 3, Page No pp.933-936, August 2018, Available at : http://www.ijrar.org/IJRAR19D3840.pdf
[17] Dhaya Sindhu Battina, "THE CHALLENGES AND MITIGATION STRATEGIES OF USING DEVOPS DURING
SOFTWARE DEVELOPMENT", International Journal of Creative Research Thoughts (IJCRT), ISSN:2320-2882, Volume.9,
Issue 1, pp.4760-4765, January 2021, Available at :http://www.ijcrt.org/papers/IJCRT2101583.pdf
[18] https://www.lynda.com/IT-tutorials/Defining-ethical-hacking/5010653/5036827-4.html
[19] Ibrahim Ali Mohammed, "A methodical mapping on the relationship between DevOps and software quality", International
Journal of Creative Research Thoughts (IJCRT), ISSN:2320-2882, Volume.6, Issue 1, pp.352-356, January 2018, Available at
:http://www.ijcrt.org/papers/IJCRT1135353.pdf
[20] Venkateswaranaidu kolluri, "REVOLUTIONARY RESEARCH ON THE AI SENTRY: AN APPROACH TO OVERCOME
SOCIAL ENGINEERING ATTACKS USING MACHINE INTELLIGENCE", International Journal of Creative Research
Thoughts (IJCRT), ISSN:2320-2882, Volume.7, Issue 3, pp.590-593, August 2019, Available at
:http://www.ijcrt.org/papers/IJCRT1135522.pdf
[21] Teja Reddy Gatla. (2019). A CUTTING-EDGE RESEARCH ON AI COMBATING CLIMATE CHANGE: INNOVATIONS
AND ITS IMPACTS. International Journal of Innovations in Engineering Research and Technology, 6(9), 1-8.
https://doi.org/10.26662/ijiert.v11i3.pp1-8
[22] Ashok Kumar Reddy Nadikattu, "INFLUENCE OF ARTIFICIAL INTELLIGENCE ON ROBOTICS INDUSTRY",
International Journal of Creative Research Thoughts (IJCRT), ISSN:2320-2882, Volume.9, Issue 1, pp.4708-4714, January-
2021, Available at :http://www.ijcrt.org/papers/IJCRT2101577.pdf
IJCRT2102559
View publication stats International Journal of Creative Research Thoughts (IJCRT) www.ijcrt.org 4648