banner

Evaluation of the extent and demanding roles of ethical hacking in cybersecurity

Jambi Ratna Raja Kumar, D. G. Bhalke, Swati Nikam, Santoshkumar Chobe, Swati Khidse, Kiran Kale

Abstract


A permitted effort to acquire unlawful connection to computing systems, programs, or information is referred to as ethical hacking. Software developers must check for flaws, compartment focus, define needs and objectives, and create a method that makes the most of their resources. The rationale for this kind of vulnerability evaluation has a direct impact on the overall assessment’s estimate. More specifically, it is known that technological gadgets are necessary to prevent computer criminals from breaking into web applications to control their operations and gain access to confidential knowledge for unintended objectives. This research study provides an analysis to determine the scope and challenging responsibilities of ethical hacking employed in cyber security. Network monitoring is a legitimate need in which authorized developers attempt to breach a company’s frameworks or arrangements for the convenience of the owners to uncover security flaws. It provides information on how organizations may use computer forensics, such as vulnerability assessments using open-source devices, to safeguard their program’s administrators and operations. Numerous tools have been explored for security auditing of the networks which involves Nmap, Nessus, Brutus, Acunetix, etc. As a result, safeguards were put in place to identify these flaws and protect sensitive data from cyber-attacks. Ethical hacking has a bright future for detecting system or application vulnerabilities effectively. Nevertheless, tools utilized in the cyber security field for network or computer application secrecy have some limits namely growing complexity, high cost, security measures restrictions, etc. Hence, there is a wide scope to build new cost-effective cyber secrecy tools for the enhanced secrecy of user data in real time.


Keywords


cyber; ethical; hacking; information; security

Full Text:

PDF

References


1. Yadav K, Agrawal R. Ethical hacking and web security: Approach interpretation. In: Proceedings of the 2022 Second International Conference on Artificial Intelligence and Smart Energy (ICAIS); 23–25 February 2022; Coimbatore, India. pp. 1382–1384.

2. Hartley R, Medlin D, Houlik Z. Ethical hacking: Educating future cybersecurity professionals. In: Proceedings of the 2017 EDSIG Conference; Austin, Texas, USA. pp. 1–9.

3. Hartley RD. Ethical hacking pedagogy: An analysis and overview of teaching students to hack. Journal of International Technology and Information Management 2015; 24(4): 95–104. doi: 10.58729/1941-6679.1055

4. Omoyiola BO. The legality of ethical hacking. IOSR Journal of Computer Engineering (IOSR-JCE) 2018; 20(1): 61–63. doi: 10.9790/0661-2001016163

5. Utomo GA. Ethical hacking. Cyber Security dan Forensik Digital 2019; 2(1): 8–15.doi: 10.14421/csecurity.2019.2.1.1418

6. Vignesh R, Rohini K. Analysis to determine the scope and challenging responsibilities of ethical hacking employed in cyber security. International Journal of Engineering & Technology 2018; 7(3): 196–199.doi: 10.14419/ijet.v7i3.27.17759

7. Georg T, Oliver B, Gregory L. Issues of implied trust in ethical hacking. The ORBIT Journal 2018; 2(1): 1–19.doi: 10.29297/orbit.v2i1.77

8. Chowdappa KB, Lakshmi SS, Pavan Kumar PNVS. Ethical hacking techniques with penetration testing. International Journal of Computer Science and Information Technologies 2014; 5(3); 3389–3393.

9. Palmer CC. Ethical hacking. IBM Systems Journal 2001; 40(3): 769–780.doi: 10.1147/sj.403.0769

10. Munjal MN. Ethical hacking: An impact on society. Cyber Times International Journal of Technology &Managemen 2013; 7(1): 922–931.

11. Wang Y, McCoey M, Hu Q. Developing an undergraduate course curriculum for ethical hacking. In: Proceedings of the 21st Annual Conference on Information Technology Education; 7–9 October 2020; USA. pp. 330–335.

12. Trabelsi Z, McCoey M. Ethical hacking in information security curricula. International Journal of Information and Communication Technology Education 2016; 12(1): 1–10.doi: 10.4018/IJICTE.2016010101

13. Cisar P, Pinter R. Some ethical hacking possibilities in Kali Linux environment. Journal of Applied Technical Educational Sciences 2019; 9(4): 129–149. doi: 10.24368/jates.v9i4.139

14. Sarumi JA, Ogunjimi OLA, Adekunle YA, Ebiesuwa S. Ethical hacking and cyber security in nigerian telecommunication industry. Available online: https://www.academia.edu/84127841/Ethical_Hacking_and_Cyber_Security_in_Nigerian_Telecommunication_Industry (accessed on 15 September 2023).

15. Gandhi F, Pansaniya D, Naik PS. Ethical hacking: Types of hackers, cyber attacks and security. International Research Journal of Innovations in Engineering and Technology (IRJIET) 2022; 6(1): 28–32. doi: 10.47001/IRJIET/2022.601007

16. Del-Real C, Mesa MJR. From black to white: The regulation of ethical hacking in Spain. Information & Communications Technology Law 2022; 32(2): 207–239.doi: 10.1080/13600834.2022.2132595

17. Malik N. A study on different software used to perform cyber crime. International Journal for Research in Applied Science & Engineering Technology (IJRASET) 2021; 9(XII): 879–882. doi: 10.22214/ijraset.2021.39395

18. Rathore N. Ethical hacking and security against cyber crime. i-manager’s Journal on Information Technology 2016; 5(1): 13–17. doi: 10.26634/jit.5.1.4796

19. Patil S, Jangra A, BhaleM, et al. Ethical hacking: The need for cyber security. In: Proceedings of the 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI); 21–22 September 2017; Chennai, India. pp. 1602–1606.

20. Reddy PH. Cyber security and ethical hacking. International Journal for Research in Applied Science and Engineering Technology 2018. doi: 10.22214/ijraset.2018.6261

21. Sahu IK. Ethical hacking: The need for cyber security.International Journal of Scientific Research and Management 2023; 7(1); 1–3. doi: 10.55041/ijsrem17502

22. Al-Hawamleh AM, Alorfi ASM, Al-Gaswneh JA, Al-Rawashdeh G. Cyber security and ethical hacking: The importance of protecting user data. Solid State Technology 2020; 63(5).

23. Berger H, Jones A. Cyber security & ethical hacking for SMEs. In: Proceedings of the 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society; 25–28 July 2016; Hagen, Germany. pp. 1–6.

24. Mathoosoothenen VN, Sundaram JS, Palanichamy RA, Brohi SN. An integrated real-time simulated ethical hacking toolkit with interactive gamification capabilities and cyber security educational platform. In: Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence; 5–7 December 2017; Jakarta, Indonesia. pp. 199–202.

25. Heiding F, Lagerström R. Ethical principles for designing responsible offensive cyber security training. In: Friedewald M, Schiffner S, Krenn S (editors). Privacy and Identity Management. Springer; 2021.

26. Yaacoub JPA, Noura HN, Salman O, Chehab A. Ethical hacking for IoT: Security issues, challenges, solutions and recommendations. Internet of Things and Cyber-Physical Systems 2023; 3: 280–308. doi: 10.1016/j.iotcps.2023.04.002

27. Swathi S, Smitha G. The basic of hacking. International Journal of Scientific Research in Engineering and Management 2022; 6(6). doi: 10.55041/ijsrem14218

28. Pushpa CM, Udaya Lakshmi KVM, Hepsibha S. Ethical hacking: Roles, phases and impact on various sectors of the economy. International Journal of Scientific Research in Computer Science Engineering and Information Technology 2021; 7(6): 38–43. doi: 10.32628/cseit21765

29. Pattison J. From defence to offence: The ethics of private cybersecurity. European Journal of International Security 2020; 5(2): 233–254. doi: 10.1017/eis.2020.6

30. Okereafor K, Manny P. Understanding cybersecurity challenges of telecommunting and video conferencing applications in the COVID-19 pandemic. International Journal in IT & Engineering 2020; 8(6): 13–23. doi: 10.6084/m9.figshare.12421049




DOI: https://doi.org/10.32629/jai.v7i1.1246

Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Jambi Ratna Raja Kumar, D. G. Bhalke, Swati Nikam, Santoshkumar Chobe, Swati Khidse, Kiran Kale

License URL: https://creativecommons.org/licenses/by-nc/4.0/