DocumentCode :
2055292
Title :
A study of network security using penetration testing
Author :
Shanmugapriya, R.
Author_Institution :
Kalaignar Karunanidhi Inst. of Technol., Anna Univ. Chennai, Coimbatore, India
fYear :
2013
fDate :
21-22 Feb. 2013
Firstpage :
371
Lastpage :
374
Abstract :
In the network security cybercrime technologies have brought many good things by means of the internet: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a other side: criminal hackers. Governments, companies, and private citizens around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an online shopping site, or implant software that will secretly transmit their organization´s secrets to the open Internet. With these concerns and others, the ethical hacker can help. This paper describes ethical hackers: their skills, their attitudes, and how they go about helping their customers find and plug up security holes. “Hacking” is the word that shakes everyone whenever it is said or heard by someone. Everyone born in this world with attitude wants to be a Hacker. But it is not a job of a new born baby or an old grown lady. A Hacker needs a brilliant mind to hack anything. There are many rules that he should learn to become an Ethical Hacker which is also called as penetrate testing. These rules include knowledge of HTML, Java Scripts, Computer Tricks, Cracking & Breaking etc.etc. In this paper I explain about the hacking techniques and the functions of how it takes place in the network and the methods to be solved.
Keywords :
Internet; computer crime; computer network security; HTML; Internet; Java Scripts; Web server; advertising; breaking; collaborative computing; companies; computer tricks; cracking; credit card number; criminal hackers; e-mail; electronic commerce; ethical hacker; governments; information distribution; network security cybercrime technologies; online shopping site; penetrate testing; penetration testing; private citizens; Computer crime; Computer hacking; Computers; Electronic mail; Force; Software; Hacking; Penetration testing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Communication and Embedded Systems (ICICES), 2013 International Conference on
Conference_Location :
Chennai
Print_ISBN :
978-1-4673-5786-9
Type :
conf
DOI :
10.1109/ICICES.2013.6508375
Filename :
6508375
Link To Document :
بازگشت