Monday, June 17, 2019
Ethical Hacking the three shades White Hat, Black Hat, Gray Hat Research Proposal
Ethical Hacking the three shades White eyelid, Black Hat, Gray Hat - Research end ExampleThe researcher practiceed both qualitative and quantitative research design methods of attacking a computer network. In the conclusion part, the summary was include that summed up the research work. The researcher recommended that thither is a need for future research to offer adequate analysis on the way ethical hackers provide implement effective adventure centering plan, which allow for enable Internet phthisisrs or businesses to protect their data from hacking activities. INTRODUCTION Ethical hacking as a risk management technique is the use of programming skills in determining vulnerabilities in the computer system. There are varied types of ethical hackers including the White Hat, Black Hat and Grey Hat olibanum, both focus on building a risk management program effective for eliminating vulnerabilities. The rapid advancement of technology has brought umteen constructive and signi ficant solutions to the life of people. New areas of research have tremendously increased in e-commerce, electronic activities and information sharing areas. However, with the increased technology advancement, there have been a growing number of cybercrimes and criminal hacking activities. Businesses and other Internet users are nowadays scared of computer experts who will offer risk management through penetrating into their web server to offer adequate security. Therefore, there is a need for computer science students to advance their ethical hacking techniques in ordering to fight against the increasing problems of criminal hacking. Project Goals The project attempts to offer a comprehensive risks management plan effective for eliminating hacking activities in varied organizations. It identifies the risks resulting from hacking and offer effecting hacking methods that hackers will employ to manage organizational risks. It analyses the process of ethical hackings and also attempt to find out the pros or cons arising from ethical hacking. LITERATURE REVIEW This chapter will employ varied literature materials in order to examine the way the previous scholars have argued about ethical hacking issues. Tiller (2005) offer varied methodologies and unwritten form that ethical hackers should employ in order to offer the maximum value to companies that want to manage organizational risks. The author reveals the technical aspects of penetration testing in order to address the engagement rules necessary for successful technical tests. Jahankhani (2010) also reveals the way cybercrimes has become one of the biggest problems in many industries across the globe thus, reveals varied aspects including implementation, investigative techniques and criminal intelligence in fighting cybercrimes. The author aimed to educate the academia members, public and private sectors, as well as, students on the way to flood out cybercrimes issues. Logan and Clarkson (2005) reveal the sig nificant need to educate computer science students to hack thus enabling them to become experts in managing risks or vulnerabilities arising from hacking activities. HYPOTHESIS Hacking will credibly to pose risks such as exposing sensitive user data and risk user privacy thus making information vulnerable to illegitimate use and manipulation. Therefore, it triggers theft of critical business information because important information may be lost in the process hacking. This is because hacking can convert computer into zombies thus contributing to spamming and phishing
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment