{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Ethical Hacking - Running Header Ethical Hacking 1 Ethical...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
Running Header: Ethical Hacking 1 Ethical Hacking xxxx AMU / ITCC500 Miriam Masullo
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Ethical Hacking I. ABSTRACT Ethical hacking is something that must be done in the mind of the author; it is the needed evil of the Internet. For the purpose of this research, the author will explore the importance of using an ethical or “White Hat” Hackers. Some of the topic that will be discussed will be why it is importance, the different types, and why it is needs of having a white hat conduct penetration test on networks that could have your information on it. It will also give a few case studies and a simulation. II. INTRODUCTION i. Brief Introduction Network are at risk every day, how are corporations protecting the information that it stores? What tools are in their arsenal helping them from the bad guys out there trying to steal bits of information on the corporation and you? That tool is Ethical Hackers, the research that is being conducted here is concentrated on these tools and the problems they face. What is an Ethical Hacker? Searchsecrity.com states, “ An ethical hacker is a computer and network expert who attacks a security system on behalf of its owner, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, an ethical hacker uses the same method as their less-principled counterparts but report problems instead of taking advantage of them. Ethical Hacking is also known as penetration testing, intrusion testing and red teaming. An ethical hacker is sometimes
Background image of page 2
Ethical Hacking called a white hat, a term that comes from the old Western movies, where the “good guy” wore a white hat and the “bad guys” wore black hats.” (Flether, 2007) ii. AIM AND OBJECTIVE AIM: To scrutinize the significance of ethical hacking and its application in establishments OBJECTIVE: ·Discovering the significance of ethical hacking instruments · Understanding the ethical hacking procedure · Applying ethical hacking tools in establishments iii. PURPOSE OF STUDY The main purpose of the author's research it to show the utmost important of ethical hacking as a tool for corporations to use to ensure that your personal information or the secrets of their organization get into the wrong hands. Penetration testing of the networks and the benefits that come along with it and possible cost savings, penetration testing provides detailed information on actual, exploitable security threats if it is encompassed into an organization’s security doctrine and processes. This will help the organization to identify quickly and accurately real and potential vulnerabilities. (Aileen G. Bacudio1, a., Xiaohong Yuan2, x., Bei-Tseng Bill Chu1, b., & Monique Jones, m, 2011) It also focuses on how ethical hacker does this type of testing. Another major purpose of this paper is to classify the significance of ethical hacking specialists in offering security to the networks.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Ethical Hacking iv. Research Context Organization will find this research to be helpful because of the how the research explains the tools of ethical hacking. System administrator along with network security
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}