Ethical Hacking and Cyber Security
Ethical Hacking and Cyber Security
10: Issue 1
REVIEW ARTICLE
ABSTRACT:
Basically, hacking is the expertise in any field that can be used for both ethical and unethical purposes. Those who
perform hacking are known as Hackers. Therefore, hackers are classified as per their working and as per their
knowledge. The ethical hackers are also known as white hat hackers. Ethical hackers use their hacking techniques
for providing security legally. Generally white hat hackers are legally authorized hackers that work for
Government. This paper explores the cyber world and cyber-crimes and its components over the internet. The fast-
growing internet technology has benefited the e-commerce, e-mail, online banking or system, advertising, vast
stores of reference material etc. But there is also a dark side internet becomes a common and easy tool for the
criminal activity using the weak link and vulnerability of internet, the objective of this study is to understand the
several hacking activities that come under the cyber-crime. Its focus is on the role of ethical hacker to remove it
from the offender, cyber-crime and illustrate on proactive approach to decrease the threat of hacking and Cyber-
crimes.
KEYWORDS: Ethical Hacking, Cyber Crimes, White Hat Hacking, Cyber Security.
1. INTRODUCTION:
The protection of information and infrastructure is that security in which the chance of successful yet undetected theft,
modification and disturbance of information and services are kept to low endurable[9].
Network Security: Protecting a network and data, computer program, other computer system assets from unwanted
intruders, and unauthorized user[9].
Information Security: Protecting information and information systems from interdicted access, use, declaration,
interference, modification or destruction [7-9].
Ethical hacking:
Ethical Hacking has been used for software and network security [5]. Ethical hacking is performed with the target’s
permission. Such type of hacking is intended to discover vulnerabilities from various types of future malicious attacks
for betterment of secured system. It is the part of security enhancement program that cover risks and allowing cyber
84
International J. Technology. January – June, 2020; Vol. 10: Issue 1
security improvement penetrations legally. Ethical hacking can also used for testing the security by vendors. Ethical
hacking is performed in controlled environment by performing ethical attacks. This helps better to understand the
working of malicious codes and their range dangerous area. Generally, the ethical hacking term is used for security
professionals for using their skills for defensive purpose to identify future security attacks in the system with good
intension.
The term ‘hacker’ originated at MIT in the 1960’s to describe someone who had the ability to understand and
manipulate technology. Although this is still true of hackers, their skills have evolved outside of just technical
capabilities to include the ability to manipulate people. Additionally, hackers are now categorized into three distinct
categories that identify their motives[7].
The hacking methodology has some steps that are followed by hackers. These are listed below:
Step-1: Reconnaissance
Step-2: Scanning the system
Step-3: Enumeration
Step-4: Gaining Access or penetrating the system
Step-5: Maintaining Access for long time attack
Step-6: Creating Tracks
During this phase, an ethical hacker can collect the following information
WHAT IS CYBER ?
The term cyber and cyberspace are modernized due to spread of computer and internet connectivity. Anything related
to the internet also falls under the cyber category [2]. Some popular words that use the cyber prefix include the
following: Cyber-crime, Cyberspace, Cyber forensics, Cyber bully, Cyber buck, Cyber security and Cyber punk [3-
4].
security measures or techniques to protect the confidentiality, integrity, and availability (CIA) of information. Hackers
can compromise the confidentiality, integrity, and availability (CIA) of information by using social engineering attacks
to naïve users. Information security management is concerned with countermeasures to protect the CIA of information
assets from various threats, using principles, best practices, and technologies. Once hackers access a system, they can
steal, delete or alter the information stored on it, or corrupt its operations [4] [12-14].
B. TRENDS CHANGING CYBER SECURITY:
The various impact of cyber security attacks on the communication infrastructures:
• Web servers:
Web applications are used to extract data or information by using malicious code on servers. Such cyber criminals
distribute their malicious code via their compromised web servers. Now we have to focus on the protection of web
servers and web applications because web server contains the valuable information and data.
We should also use the safe web browser for financial transactions [10].
• Mobile Networks:
Today we are able to connect to anyone, anytime in any part of the world with the help of mobile networks. But for
these communication networks security is a very big concern. These days firewalls and other security measures are
becoming porous as people are using devices such as tablets, mobile, laptops etc all of which again require extra
securities apart from those present in the applications used. We must always think about the security issues of these
networks. Further mobile networks are highly prone to these cyber-crimes a lot of care must be taken in case of their
security issues [10].
INITIAL CYBERCRIME LEGISLATION:
Criminal laws have been enacted by the U.S. Congress that outlaws uncertified access to protected computers by
individuals. Protected computers are defined under. S.Code Title 18, Section 1030 and there is a number of state and
federal statutes that focus on unauthorized computer access which are related to computer crimes. One example is the
Computer system Fraud and Abuse Act (CFAA) that was originally passed in 1986 and has been amended numerous
times since then to simplify and increase the scope of an existing computer fraud law. According to Alexander in
2007, the CFAA was designed to protect government classified information and financial institution information that
was stored on computers. If the computer was connected to the internet, this Act makes it a criminal offense for an
individual to access it without proper authority or in an attempt to obtain financial information illegally. However,
according to Taylor et al. in 2015, this Act appears very vague, and has been amended to include computer hacking
offenses and the transmission of classified information in or outside the United States. The CFFA was originally
designed by Congress to criminalize unauthorized access to computers [12].
D. COMMAN CYBER ATTACK:
• Un-targeted Attacks[14]
• In un-targeted attacks, attackers randomly target as many devices, services or users as possible. They do not care
about who the victim is as there will be a number of machines or services with weakness. To do this security issue,
they use techniques that take advantage of the openness of the Internet, which include:
• Phishing - sending emails to large numbers of people asking for sensitive information(such as bank details) or
encouraging them to visit a fake website.
• Water holding-setting up a fake website or compromising a legitimate one in order to exploit visiting users.
86
International J. Technology. January – June, 2020; Vol. 10: Issue 1
CONCLUSION:
Ethical hacking is not a criminal activity but malicious unethical hacking is a computer crime or cyber-crime. The
main goal of ethical hacking is to provide data and information security from being stolen and fraudulent use by
malicious attackers. The concept of security and trust is very changeable because cyber threats can attack from any
level of your organization. The cyber-crime is growing day to day in a new innovation of crimes made by a class of
intellectual and experienced cyber criminals. The cyber-crime is a great danger to the human rights in the digital world.
Now-a-days the number of new security attacks being designed to steal personal information is increasing with
accelerating pace. The attackers are targeting personal information to make a profit out of their operation.
ACKNOWLEDGMENT:
We express our heartily thanks to SoS in Computer Science andIT, Pt. Ravishankar Shukla University, Raipur for
providing us the various resource to publish the work.
REFERENCES:
1. J. Gaia and G. L. Sanders, “Psychological Profiling of Hacking Potential 1,” vol. 3, pp. 2230–2239, 2020.
2. V. S. Padilla and F. F. Freire, “A Contingency Plan Framework for Cyber-Attacks,” J. Inf. Syst. Eng. Manag., vol. 4, no. 2, pp. 2–7, 2019.
3. M. G. Porcedda and D. S. Wall, “Cascade and Chain Effects in Big Data Cybercrime: Lessons from the TalkTalk hack,” Proc. - 4th IEEE Eur.
Symp. Secur. Priv. Work. EUROS PW 2019, pp. 443–452, 2019.
4. F. Kwadade-cudjoe, “Effect of Cyber Security on Networks Operations ( A case study of Vodafone Ghana ),” vol. 7, no. 6, pp. 16–32, 2019.
5. A. Y. Ding, G. L. De Jesus, and M. Janssen, “Ethical hacking for boosting IoT vulnerability management: A first look into bug bounty programs
and responsible disclosure,” ACM Int. Conf. Proceeding Ser., pp. 49–55, 2019.
6. P. K. Paul and S. Aithal, “Network security: threat and management,” no. November, 2019.
7. G. Thomas, O. Burmeister, and G. Low, “The Importance of Ethical Conduct by Penetration Testers in the Age of Breach Disclosure Laws.,”
Australas. J. Inf. Syst., vol. 23, pp. 1–14, 2019.
8. Ding, Aaron Yi, Gianluca Limon De Jesus, and Marijn Janssen. “Ethical Hacking for Boosting IoT Vulnerability Management.” Proceedings
of the Eighth International Conference on Telecommunications and Remote Sensing - ICTRS ’19 (2019).
9. N. Rathore, “Ethical Hacking and Security against Cyber Crime,” i-manager’s Journal on Information Technology, vol. 5, no. 1, pp. 7–11,
2016.
10. World Health Organizaton, “WHO Information Note on the Use of Dual HIV / Syphilis Rapid Diagnostic Tests ( RDT),” 2019
11. R. Nath, A. Mukhopadhyay, “Ethical Hacking: Scope and challenges in 21st century,” , vol. 1, pp. 2349-2163, 2019.
12. Pavlik, Kimberly, “Cybercrime, Hacking, And Legislation,”, , vol. 2, no. 1, pp. 13-16, 2019
13. Garg, N. kumar, D. khera,Y. Jain, and Prateek, “Towards the Impact of Hacking on Cyber Security,”, vol. 9, no. 1, pp. 61-77, 2019.
14. Attacks, cyberpaper, white,”Common cyber attacks : reducing the impact,” 2016.
87