Ethical Hacking: Skills to Fight Cybersecurity Threats

نویسندگان

چکیده

Ethical hacking education prepares future information security professionals with the tools and skills to fight prevent cybersecurity threats. Businesses, schools, governments, individuals have an increasing concern keep their systems, networks, data secure from outside Most technologies use a defensive approach client’s safe; however, ethical provides one of only proactive/aggressive methods for utilize. Teaching inexperienced these aggressive tactics can be viewed as double- edged sword. Since they are same used by malicious hackers, educating new will undoubtedly educate more hackers.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Ethical hacking

The explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: criminal hackers. Governments, companies, and private citizens around the world are a...

متن کامل

Ethical Hacking: The Security Justification

Abstract The state of security on the Internet is poor and progress toward increased protection is slow. This has given rise to a class of action referred to as “Ethical Hacking”. Companies are releasing software with little or no testing and no formal verification and expecting consumers to debug their product for them. For dot.com companies time-to-market is vital, security is not perceived a...

متن کامل

Ethical Hacking in Information Security Curricula

ACM Digital Library; Australian Business Deans Council (ABDC); Bacon’s Media Directory; Burrelle’s Media Directory; Cabell’s Directories; Compendex (Elsevier Engineering Index); CSA Illumina; DBLP; DEST Register of Refereed Journals; Gale Directory of Publications & Broadcast Media; GetCited; Google Scholar; INSPEC; JournalTOCs; Library & Information Science Abstracts (LISA); MediaFinder; Norwe...

متن کامل

Skills and Characteristics of Successful Cybersecurity Advocates

Cybersecurity advocates attempt to counter the tsunami of cyber attacks by promoting security best practices and encouraging security technology adoption. However, little is known about the skills necessary for successful advocacy. Our study explores the motivations, characteristics, and practices of cybersecurity advocates. Preliminary analysis of 19 interviews reveals that effective advocates...

متن کامل

Critical Infrastructure Cybersecurity: A Review of Recent Threats and Violations

Most of current industries and their critical infrastructure rely heavily on the Internet for everything. The increase in the online services and operations for various industries has led to an increase in different security threats and malicious activities. In US, the department of homeland security reported recently that there have been 200 attacks on core critical infrastructures in the tran...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: EPiC series in computing

سال: 2022

ISSN: ['2398-7340']

DOI: https://doi.org/10.29007/vwww