scholarly journals Analysis to Determine the Scope and Challenging Responsibilities of Ethical Hacking Employed in Cyber Security

2018 ◽  
Vol 7 (3.27) ◽  
pp. 196
Author(s):  
R Vignesh ◽  
K Rohini

This paper analyzes a variety of Challenging Roles of Ethical Hacking employed in Cyber Security. The requirement for more viable requesting data security rehearses is progressively evident with every security encroaches revealed in the media. Ethical hacking set forward a target investigation of an association's data security bearing for associations of numerous phase of security capability. Programmers must output for shortcomings, test section focuses, needs targets, and build up a procedure that best use their assets. The reason for this sort of security appraisal directly affects the estimation of the entire assessment. More finished it is recognized that electronic devices are fundamental to forestall digital culprits hacking into online systems to contain their administrations and access secret information for uncalled for purposes. Ethical Hacking is capably required where approved programmers endeavor to penetrate a business' frameworks/arranges for the benefit of the proprietors with the goal of discovering security shortcomings. It give bits of knowledge into how Ethical Hacking, as Penetration Testing utilizing free open source devices, can be utilized by associations to secure their system's administrations/activities. Utilizing Nmap, Google Hacking, Nessus, Brutus and Acunetix .Thus measures were placed in to determine these vulnerabilities and dodge the delicate information from potential digital threats.  

Author(s):  
Onurhan Yılmaz

Open source intelligence (OSINT) is one of the most confrontational topics in cyber security in today's world where technology and data transfer methods are highly developed. It is known that many organizations and individuals use OSINT as an information gathering tool during data transfer over the internet and provide many personal or corporate information access. OSINT is a systematic method that is produced by official and private organizations via sources such as the internet or the media. In recent years there has been some debate about the security and privacy of this information, especially with the widespread use of social media. In this chapter, the control of information obtained by OSINT the security will explain the positive effects on this control mechanism.


2014 ◽  
Vol 6 (4) ◽  
pp. 50-74 ◽  
Author(s):  
Chiem Trieu Phong ◽  
Wei Qi Yan

Penetration testing is an effort to attack a system using similar techniques and tools adopted by real hackers. The ultimate goal of penetration testing is to call to light as many existing vulnerabilities as possible, then come up with practical solutions to remediate the problems; thus, enhance the system security as a whole. The paper introduces concepts and definitions related to penetration testing, together with different models and methodologies to conduct a penetration test. A wide range of penetration testing state-of-the-art, as well as related tools (both commercial and free open source available on the market) are also presented in relatively rich details.


Author(s):  
Juveriya Afreen

Abstract-- With increase in complexity of data, security, it is difficult for the individuals to prevent the offence. Thus, by using any automation or software it’s not possible by only using huge fixed algorithms to overcome this. Thus, we need to look for something which is robust and feasible enough. Hence AI plays an epitome role to defense such violations. In this paper we basically look how human reasoning along with AI can be applied to uplift cyber security.


2017 ◽  
Vol 2 (3) ◽  
pp. 1
Author(s):  
Hanane Bennasar ◽  
Mohammad Essaaidi ◽  
Ahmed Bendahmane ◽  
Jalel Benothmane

Cloud computing cyber security is a subject that has been in top flight for a long period and even in near future. However, cloud computing permit to stock up a huge number of data in the cloud stockage, and allow the user to pay per utilization from anywhere via any terminal equipment. Among the major issues related to Cloud Computing security, we can mention data security, denial of service attacks, confidentiality, availability, and data integrity. This paper is dedicated to a taxonomic classification study of cloud computing cyber-security. With the main objective to identify the main challenges and issues in this field, the different approaches and solutions proposed to address them and the open problems that need to be addressed.


2019 ◽  
Vol 26 (1) ◽  
pp. e100004 ◽  
Author(s):  
Athanasios Kotoulas ◽  
Ioannis Stratis ◽  
Theodoros Goumenidis ◽  
George Lambrou ◽  
Dimitrios - Dionysios Koutsouris

ObjectiveAn intranet portal that combines cost-free, open-source software technology with easy set-up features can be beneficial for daily hospital processes. We describe the short-term adoption rates of a costless content management system (CMS) in the intranet of a tertiary Greek hospital.DesignDashboard statistics of our CMS platform were the implementation assessment of our system.ResultsIn a period of 10 months of running the software, the results indicate the employees overcame ‘Resistance to Change’ status. The average growth rate of end users who exploit the portal services is calculated as 2.73 every 3.3 months.ConclusionWe found our intranet web-based portal to be acceptable and helpful so far. Exploitation of an open-source CMS within the hospital intranet can influence healthcare management and the employees’ way of working as well.


Sign in / Sign up

Export Citation Format

Share Document