Skip to main content

Academic Paper Summary - Ethical Hacking

 



This academic journal is an excerpt from a research article on ethical hacking methodologies by Ashraf. M (2021). The article explores the concept and practice of ethical hacking, which is a form of hacking that aims to improve the security of networks without causing harm. The article reviews different ethical hacking techniques and tools, such as penetration testing, vulnerability scanning, password cracking, network sniffing, and malware analysis. It compares them based on their principles and mechanisms, such as black-box testing, white-box testing, grey-box testing, active scanning, passive scanning, brute-force attack, dictionary attack, rainbow table attack, packet capture, packet injection, and reverse engineering. The article also provides a graphical and score-based analysis of the tools based on their effectiveness, efficiency, accuracy, and usability. It suggests how to choose the best tool for a specific scenario based on the criteria and constraints. The article is published in the year 2021 at Mohammad Ali Jinnah University International Conference on Computing (MAJICC). 


REFERENCE

Ashra, M., Zahra, A., Asif, M., Ahmad, B., and Zafar, S. (2021) "Ethical Hacking Methodologies: A Comparative Analysis," Mohammad Ali Jinnah University International Conference on Computing (MAJICC) pp. 1-5, doi: 10.1109/MAJICC53071.2021.9526243.

Comments

Popular posts from this blog

INITIAL IDEA 1 - ENDPOINT SECURITY

Source: https://www.42gears.com/wp-content/uploads/2021/04/featured.jpg What is Endpoint Security? My initial idea pertains to endpoint security, which is an essential module in my cybersecurity path. Endpoint security is a cybersecurity approach used to defend endpoints such as desktops, laptops, and mobile devices from malicious activities (Crowdstrike, n.d.). According to Crowdstrike, a top endpoint security company, protecting endpoints is crucial in cybersecurity, from small businesses to large corporations. Why Secure Your Endpoints? The Ponemon Institute conducted a study that found 68% of organizations have experienced one or more endpoint attacks that successfully compromised data and/or their IT infrastructure (Expert Insights, 2021). Endpoints provide a large attack surface, and implementing endpoint security solutions can help reduce those attack surfaces. While it's impossible to completely eliminate cyberattacks, reducing the possibilities or chances of an attack occu...

ESSAY (MAIN BODY)

Hi, in this blog I would be showing you my essay's main body. The body talks more about AI in endpoint security and its functionalities/application in endpoint security. It also touches on the benefits of AI in endpoint security. 

Case Study - Method

Source: https://www.google.co.uk/url?sa=i&url=https%3A%2F%2Fwww.facebook.com%2Fmethoduk%2F&psig=AOvVaw1TjPOsSrMz-Vs9czJ_mxRc&ust=1685998095949000&source=images&cd=vfe&ved=0CBAQjRxqFwoTCJCq48K-qv8CFQAAAAAdAAAAABAj Method The methodology employed in the case study described in the book "Cyber Security: Case Study" reflects a systematic and meticulous approach to ethical hacking. This section outlines the key steps and processes undertaken by the ethical hacking team to assess the organization's cybersecurity measures. The first step in the methodology involved the selection of a qualified and experienced ethical hacking team. The team's expertise in various aspects of cybersecurity, such as network security, web application security, and social engineering, ensured a comprehensive assessment across different attack vectors. Careful consideration was given to the team's certifications, qualifications, and track record of successful engagements...