Ethical Hacking - Running Header Ethical Hacking 1 Ethical...

Info icon This preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
Running Header: Ethical Hacking 1 Ethical Hacking xxxx AMU / ITCC500 Miriam Masullo
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Ethical Hacking I. ABSTRACT Ethical hacking is something that must be done in the mind of the author; it is the needed evil of the Internet. For the purpose of this research, the author will explore the importance of using an ethical or “White Hat” Hackers. Some of the topic that will be discussed will be why it is importance, the different types, and why it is needs of having a white hat conduct penetration test on networks that could have your information on it. It will also give a few case studies and a simulation. II. INTRODUCTION i. Brief Introduction Network are at risk every day, how are corporations protecting the information that it stores? What tools are in their arsenal helping them from the bad guys out there trying to steal bits of information on the corporation and you? That tool is Ethical Hackers, the research that is being conducted here is concentrated on these tools and the problems they face. What is an Ethical Hacker? Searchsecrity.com states, “ An ethical hacker is a computer and network expert who attacks a security system on behalf of its owner, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, an ethical hacker uses the same method as their less-principled counterparts but report problems instead of taking advantage of them. Ethical Hacking is also known as penetration testing, intrusion testing and red teaming. An ethical hacker is sometimes
Image of page 2
Ethical Hacking called a white hat, a term that comes from the old Western movies, where the “good guy” wore a white hat and the “bad guys” wore black hats.” (Flether, 2007) ii. AIM AND OBJECTIVE AIM: To scrutinize the significance of ethical hacking and its application in establishments OBJECTIVE: ·Discovering the significance of ethical hacking instruments · Understanding the ethical hacking procedure · Applying ethical hacking tools in establishments iii. PURPOSE OF STUDY The main purpose of the author's research it to show the utmost important of ethical hacking as a tool for corporations to use to ensure that your personal information or the secrets of their organization get into the wrong hands. Penetration testing of the networks and the benefits that come along with it and possible cost savings, penetration testing provides detailed information on actual, exploitable security threats if it is encompassed into an organization’s security doctrine and processes. This will help the organization to identify quickly and accurately real and potential vulnerabilities. (Aileen G. Bacudio1, a., Xiaohong Yuan2, x., Bei-Tseng Bill Chu1, b., & Monique Jones, m, 2011) It also focuses on how ethical hacker does this type of testing. Another major purpose of this paper is to classify the significance of ethical hacking specialists in offering security to the networks.
Image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Ethical Hacking iv. Research Context Organization will find this research to be helpful because of the how the research explains the tools of ethical hacking. System administrator along with network security
Image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern