Hacking - ETHICAL HACKING ETHICAL HACKING Team K Lasya M...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
ETHICAL HACKING ETHICAL HACKING Team : K Lasya M Mrudula Bhojreddy Engineering College For Women Vinay Nagar Colony Hyderabad. - 1 -
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
ETHICAL HACKING TABLES OF CONTENTS 1) Abstract 2) Introduction 2.1. what is ethical hacking? …………………………………………………… 2.2. How do you define a hacker?……………………………………………… 2.3. Who are ethical hackers?…………………………………………………… 2.4. What do ethical hackers do?……………………………………………… 2.5. The “get out of jail free card”……………………………………………… 2.6. The ethical hack itself……………………………………………………… 2.7. Final report…………………………………………………………………. . 3) Conclusion 4) Acknowledgements ABSTRACT The explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e- mail, and new avenues for advertising and information distribution, to name a few. As - 2 -
Background image of page 2
ETHICAL HACKING with most technological advances, there is also a dark side: criminal hackers. This pape r describes ethical hackers: their skills, their attitudes, and how they go about helping their customers find and plug up security holes. The ethical hacking process is explained, along with many of the problems that the Global Security Analysis Lab has seen during its early years of ethical hacking. The state of security on the Internet is bad and becoming worse. One reaction to this state of affairs is a behavior termed "Ethical Hacking" which attempts to proactively increase security protection by identifying and patching known security vulnerabilities on systems owned by other parties. Ethical hackers may beta test unreleased software, stress test released software, and scan networks of computers for vulnerabilities. Previous work has emphasized ethical hacking as an altruistic behavior but we find ethical hackers act rationally, in self-interest, to secure systems that are within their own community (sometimes for pay)-networked systems are only as secure as the weakest system within perimeter defenses . INTRODUCTION What is ethical hacking? With the growth of the Internet, computer security has become a major concern for businesses and governments. They want to be able to take advantage of the Internet for electronic commerce, advertising, information distribution and access, and other pursuits, but they are worried about the possibility of being “hacked.” At the same time, the potential customers of these services are worried about maintaining control of personal information that varies from credit card numbers to social security numbers and home addresses. In their search for a way to approach the problem, organizations came to realize that one
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/26/2011 for the course IT 101 taught by Professor Dontknow during the Spring '07 term at Northern Virginia.

Page1 / 10

Hacking - ETHICAL HACKING ETHICAL HACKING Team K Lasya M...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online