Manuscript Title:

AN EMPIRICAL ANALYSIS OF ETHICAL HACKING

Author:

SHAHID ALI, SHAHARYAR RAFIQ, SYED ZAIN UL HASSAN, ASMA ARSHAD, MUHAMMAD WASEEM IQBAL, SHAHERYAR

DOI Number:

DOI:10.17605/OSF.IO/2UBJ4

Published : 2023-04-10

About the author(s)

1 .SHAHID ALI - Department of Computer Science, Superior University, Lahore, Pakistan.
2. SHAHARYAR RAFIQ - Department of Computer Science, Superior University, Lahore, Pakistan.
3. SYED ZAIN UL HASSAN - Department of Software Engineering, Superior University, Lahore, Pakistan.
4. ASMA ARSHAD - Computer Science Department, The Institute of Management Sciences (Pak-AIMS), Lahore, Pakistan.
5. MUHAMMAD WASEEM IQBAL - Department of Software Engineering, Superior University, Lahore, Pakistan.
6. SHAHERYAR - Department of Computer Science, Superior University, Lahore, Pakistan.

Full Text : PDF

Abstract

Cyber threats will arrive from many angles as new technologies are being ingrained in many facets of life. Business associations relocate a larger amount of their fundamental skills to the Internet, offenders have a greater ability and driving power across the online application to access sensitive data. The Public Network is the world's most popular and fastest alternative for spreading attacks all over the world. Malicious hacking has earned hacking a poor reputation over the years, but hacking was not meant to be an illegal operation from the outset. It could also be ethical, lawful and appropriate, while hacking could be malicious. Hacking is a method that is pursued to identify the system's flaws or holes for self-profit or pleasure. Most hackers steal data to ruin the credibility and development of companies in the industry. We have an ethical hacking process to protect our networks against attack. It is the act of using hacking methods, expertise and tools to uncover bugs and locate knowledge loopholes. Ethical hackers are those certified persons who work legitimately. This article discusses ethical hacking, various forms of hackers, and the hacking stages that ethical hackers pursue to protect a network or system.


Keywords

Ethical hacking, Ethical hackers, Sorts of hackers, Empirical analysis.