Вы находитесь на странице: 1из 3

INTERNATIONAL JOURNAL OF RESEARCH IN ENGINEERING AND TECHNOLOGY

Ganesh Rajendra Salunkhe.

Department of I.T Engineering,


Ethical Hacking,
AESs College of Engineering and Technology, Pune
The Phenomenon ofganeshgsinternational@gmail.com
higher Security.

AbstractToday in the world of Technology we all familiar


about the use and importance of internet and the security must
needs. Most of crowed dont know about the security things. In
the field of hacking lots of peoples looks miss understood, they
look careless about Security terms. Thats why the term Ethical
Hacking and knowledge of hacking is so important practically
and basically The main reason behind the discussion of ethical
hacking is insecurity of the network i.e. hacking. The need of
ethical hacking is to protect the system from the damage and
other bad hacker. This paper helpsto generate an idea of ethical
hacking.

Index Terms hacking classes hacking certification certified


hacker it security and ethical hacking

Known or unknown person enter or who break the computer


and security system to getting the data or to getting the
information for different things term basically known as
Hacker.Traditionally, a hacker is someone who likes to tinker
with software or electronic systems. Hackers enjoy exploring
and learning how. The Organizationcomputer systems operate.
They love discovering new ways to workCERN, the European
Organization for Nuclear Research,electronically.
IV. ETHICAL HACKING
Ethical hacking is the process which is focuses on securing &
protecting computer system. Hacking for good purpose i.e. to
finding vulnerabilities or to securing networks and done by
certain ethics called ethical Hacking.
V. SOME HISTORY

I.

INTRODUCTION

S we see increase of internet now days which is


just unbelievable. Internet grows faster and faster
and services, security problems increases too.
There are billion dollars of industry based on internet
including online banking, social networking, import exporting
and much of more and the man who creates who builds this
system and for all this system provides a great security but in
this case he also knows about the breaking of that particular
security. Most people think hackers have extraordinary skill
and knowledge that allow them to hack into computer systems
and find valuable information.Ethical hackers are usually
security professionals or network penetration testers who
usetheir hacking skills and toolsets for defensive and
protective purposes. Ethical hackers whoare security
professionals test their network and systems security for
vulnerabilities usingthe same tools that a hacker might use to
compromise the network formats for your particular
conference.
II. HACKING
In very simple and common words, hacking may be defines
as an unauthorized, unwanted, secret, access of computer
security system for different things or also It is a technique of
modifying the features of system.

III.HACKER

A. In 1971, John Draper, aka captain crunch, was one of the


best known early phone hacker & one of the few who can be
called one of the fathersof hacking.
B. In 1988 a worm program written by a computer student
for shut down 10% of computer, connected to internet. This
was one of the official beginnings of the cyber-attacks.
C. In 1994 a group directed by Russian hackers broke the
security of computer of city bank in Russia & transfer more
than 10 million dollars $ from customers account.
D.In Nov 1995 Christopher Pile becomes the first person
arrested for writing and computer virus.
VI. MAIN TYPES OF HACKERS
A.

BLACK HAT

The Hacker who broke the system for his own profits known
as black hat hacker, for example basically for gaining of
money. They use their knowledge for destructive activity &
for their personal gains.
B.

WHITE HAT

They are professional hackers. They use their skill for


defensive purpose in purely an ethical way. They improve
security to exposing vulnerabilitiesbefore malicious hacker.
C.

GRAY HAT

Hacker, who hacks for sole purpose, either for good or also for
bad, the hacker called as gray hat hacker.
VI. MOTIVATION BEHIND ATTACKS
Above figure shows issues or the motivations behind the
attackers in all over world.

Research paper by Ganesh Rajendra Salunkhe ( Depratment of I.T Engineering )page 1

INTERNATIONAL JOURNAL OF RESEARCH IN ENGINEERING AND TECHNOLOGY

Cyber Crime: 59.8%


Cyber Espionage: 17.2%
Hacktivism:13.8%
Cyber War: 9.2%

Fig1. Motivations Behind Attacks in world as per Oct 2014.

VII. SPECIAL CATAGORIES


A. SCRIPT KIDDIES

Normally childrens break the computer security mainly to


getting money or only for fun. They do not have much
knowledge about technical site. They hacks for small gains
and just for entertainment, and category known as script
kiddies.
B. PROFESSIONAL CRIMINALS & CRACKERS
Most active hacker category professional criminals and
crackers doing their work very professionally but its for
Criminal activities. They are anonymous with sharp minds.
Huge amount of Cyber Crimes done by this Category and term
crackers refer to be in generally only to crash or only to
collapses the system.
C. VIRUS AND CODE WRITERS
In todays updated world we mostly use the word Virus.There
are thousands and thousands of different viruses these days
which improve every day. From these virus performance
Of computer goes slowly, entire disk will be crashed,
Programs are modified and more.

VIII. WHAT CAN HACKERS DO?


Setting the Target
B. Getting the Info
Planned Logically
Attacks

Fig 2 . What Can Hackers doTechnically


IX. ADVANTAGES OR BENEFITS

In Case of hacking the benefits depends on mentality of


peoples, that how they use their skill of hacking. If we looks
deep then we will found thats this is biggest career
opportunity in I.T industry. If peoples will learn hacking then
they will able to secure their own system. There are no
Security professionals required in lots of software companies
and, C.E.H. gives them an awesome platform. Most of the
benefits of ethical hacking are obvious, but many are
overlooked. The benefits range from simply preventing
malicious hacking to preventing national security breaches.
The benefits include.
X. DISADVANTAGES OR LOSSES
Without a doubt, there are tremendous benefits to
using information technologies, on an individual,
organizational, and global level. However, as we
come to rely more deeply on the Internet and
cyberspace to bank, shop, work, play, and
communicate we are also increasing the chances of
falling victim to a hacker. Indeed, with some much of
our lives online along with the imperfections of
cybersecurity, we are voluntarily making ourselves
more vulnerable to being robbed, bullied and
exploited that ever before.The ethical hacker using
the knowledge they gain to do malicious hacking
activities
Allowing the company's financial and banking details
to be seen
The possibility that the ethical hacker will send
and/or place malicious code, viruses, malware and
other destructive and harmful things on a computer
system
Massive security breach.
XI. SECURITY AWAIRNESS AND ISSUES

As the popularity of social networking sites continues to grow,


so do the security risks associated with them. Sites like
Facebook, Twitter and Linkedin have become main targets for
hackers. Because of the threat posed by cyber criminals,
taking it upon yourself to secure your social networking
accounts is of the utmost importance. Below are several tips
for securing your social networking accounts to keep hackers

Research paper by Ganesh Rajendra Salunkhe ( Depratment of I.T Engineering )page 2

INTERNATIONAL JOURNAL OF RESEARCH IN ENGINEERING AND TECHNOLOGY


out and your private information safe. We ignores very small
security issues and we just keep going on the our way.
XII. CONCLUSION
As the use of internet increases, everyone becomes dependent
over it and saves their crucial and important data over the
internet. Basically this is an invitation to the crackers to gain
access of information. Thus security is the major problem for
the organization. This illustrates the importance of
ethicalhackers. For this purpose the organization hires ethical
hackers who are well knowledge and experienced person.
REFERENCES
[1] Need of Ethical Hacking in online World (A research
paper by Monika Pangaria &Vivek Shrivastav),
www.ijsr.net/archive/v2i4/IJSRON2013859.pdf
[2]Wikipedia/hackers
[3]Deffcon Hacking conference
[4]IEEE journals and proceeding papers
[5]http://www.faqs.org/usenet/.overflows will
[6]Ethical Hacking (A research paper by
Susidharthaka Satapathy , Dr.Rasmi Ranjan Patra)
[7]Social Networking Awareness: ITS: UNCW

uncw.edu/ITSD/besafe/social.html
[8]https://en.wikipedia.org/wiki/Script_kiddie
[9]https://www.google.co.in/search?
q=motivation+behind+cyber+attacks
AUTHOR:

Ganesh Rajendra Salunkhe from AESs College of


Engineering Pune, student of I.T. engineering focused mainly
on social security. He studied in the area of Ethical Hacking
from last 6 month. His presentations (PPT format) of hacking,
publishes on lots of leading sites on internet.
Mail-ganeshgsinternational@gmail.com

Research paper by Ganesh Rajendra Salunkhe ( Depratment of I.T Engineering )page 3