INTERNET HACKING AND PREVENTION



EOI: 10.11242/viva-tech.01.04.185

Download Full Text here



Citation

Suraj K. Yadav ,Prof.Pragati Mestry, "INTERNET HACKING AND PREVENTION", VIVA-IJRI Volume 1, Issue 4, Article 185, pp. 1-6, 2021. Published by Computer Engineering Department, VIVA Institute of Technology, Virar, India.

Abstract

Understanding the term hacking as any unconventional way of interacting with some system it is easy to conclude that there are enormous number of people who hacked or tried to hack someone or something. The article, as result of author research, analyses hacking from different points of view, including hacker's point of view as well as the defender's point of view. Here are discussed questions like: Who are the hackers? Why do people hack? Law aspects of hacking, as well as some economic issues connected with hacking. At the end, some questions about victim protection are discussed together with the weakness that hackers can use for their own protection. The aim of the article is to make readers familiar with the possible risks of hacker's attacks on the mobile phones and on possible attacks in the announced food of the internet of things (next IoT) devices

Keywords

Scalability, Fault tolerance, Performance, Measurements

References

  1. Sanctum Inc, “Ethical Hacking techniques to audit and secure web enabled applications”, 2002.
  2. B. Reto, “Ethical Hacking”, in GSEC Practical Assignment, Version 1.4b, Option 1, Nov 24, 2002.
  3. Smith B., Yurcik W., Doss D., “Ethical Hacking: the security justification redux”, IEEE Transactions, pp. 375- 379, 2002.
  4. J. Danish and A. N. Muhammad, “Is Ethical Hacking Ethical? “ , International journal of Engineering Science and Technology, Vol 3 No. 5, pp. 3758-3763, May 2011.
  5. Ajinkya A. Farsole, Amurta G. Kashikar and ApurvaZunzunwala , “Ethical Hacking, International journal of Computer Applications (0975-8887), Vol. 1 No. 10, pp. 14-20, 2010.
  6. H.M David, “Three Different Shades of Ethical Hacking: Black, White and Gray,” in GSEC Practical Assignment, Version 1.4b, Option 1, Feb 23, 2004.
  7. Ajinkya A., FarsoleAmruta G., KashikarApurvaZunzunwala"Ethical Hacking", in 2010 International Journal of Computer Applications (0975 – 8887) Volume 1 – No. 10
  8. Marilyn Leathers “A Closer Look at Ethical Hacking and Hackers" in East Carolina University ICTN 6865.
  9. Gilberto Tadayoshi Hashimoto, Pedro Frosi Rosa, Edmo Lopes Filho, Jayme Tadeu Machado, A Security Framework to Protect Against Social Networks Services Threats, 2010 Fifth International Conference on Systems and Networks Communications.