2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI) 2017
DOI: 10.1109/icpcsi.2017.8391982
|View full text |Cite
|
Sign up to set email alerts
|

Ethical hacking: The need for cyber security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
14
0
3

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 31 publications
(18 citation statements)
references
References 2 publications
1
14
0
3
Order By: Relevance
“…The ethical hacking process starts with searching for different ways to break into a system, leveraging bugs, maintaining consistent access to the system, and finally clearing one's tracks. The following figure 1 shows the phases followed by Ethical Hackers [3]: Figure 1: Phases followed by the Ethical Hackers [3] The Importance of Ethical Hacking Tools and Techniques in Software Development Life Cycle…”
Section: Phases Of Ethical Hackingmentioning
confidence: 99%
See 3 more Smart Citations
“…The ethical hacking process starts with searching for different ways to break into a system, leveraging bugs, maintaining consistent access to the system, and finally clearing one's tracks. The following figure 1 shows the phases followed by Ethical Hackers [3]: Figure 1: Phases followed by the Ethical Hackers [3] The Importance of Ethical Hacking Tools and Techniques in Software Development Life Cycle…”
Section: Phases Of Ethical Hackingmentioning
confidence: 99%
“…Reference [3] Sonali Patil et al describe the term hacker who is either good or bad. To gain illegal access to systems, bad hackers such as black hat, hacktivists, state-sponsored, suicide, and script kiddies are used.…”
Section: Litrature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…Təhlükəsizlik mütəxəssisi və ya tədqiqatçısı kimi də tanınan etik hakerlərdir. Belə hakerlərə şirkətin bir işçisi kimi fəaliyyət göstərərək, boşluqları istismar etməyə icazə verilir [6,7]. Çünki, bu şəxslər nüfuzetmə testlərini reallaşdırmağa qabil olan, adətən Elektron Ticarət Məsləhətçilərinin Beynəlxalq Şurası (The International Council of Electronic Commerce Consultants, EC-Council) tərəfindən lisenziyalaşdırılmış hakerlərdir.…”
Section: Hakerləri̇n Ti̇pləri̇unclassified