hacking

Powerful Essays
Pace University

DigitalCommons@Pace
Honors College Theses

Pforzheimer Honors College

8-24-2005

The Role of White Hat Hackers in Information
Security
Amit Anand Jagnarine
Pace University

Follow this and additional works at: http://digitalcommons.pace.edu/honorscollege_theses
Part of the Other Computer Sciences Commons
Recommended Citation
Jagnarine, Amit Anand, "The Role of White Hat Hackers in Information Security" (2005). Honors College Theses. Paper 14. http://digitalcommons.pace.edu/honorscollege_theses/14 This Article is brought to you for free and open access by the Pforzheimer Honors College at DigitalCommons@Pace. It has been accepted for inclusion in Honors College Theses by an authorized administrator of DigitalCommons@Pace. For more information, please contact rracelis@pace.edu. The Role of White Hat Hackers in
Information Security

Amit Anand Jagnarine

Pace University
Phorziemer’s Honors College
Thesis Paper
Due Date: 16 May 2005

2
The Role of White Hat Hackers in Information Security

Information security has become one of the most important concepts in our information and technology driven world.

Because of this notion of ubiquitous

computing and the on-demand flow and exchange of information, it becomes essential to protect and secure any and all critical information.

Information security involves

employing certain techniques and components to protect interconnected systems and more importantly, the data and information used by those systems. It revolves around maintaining three basic characteristics of information—confidentiality, integrity, and availability. The goal of information system security has now been augmented by what is known as “white hat” hacking. White hat hacking is an interesting development in the fight against keeping the bad guys out and securing sensitive information. The idea is that there exists a new breed of ethical-minded hackers that penetrate systems to

You May Also Find These Documents Helpful

  • Better Essays

    Hacking

    • 625 Words
    • 3 Pages

    HACKING The incredibly fast development of the Internet has brought many benefits both to consumers and businesses. However, it has also provided criminals or misguided individuals with great opportunities for crime or 'mischief'. The Internet is not only used by innocent members of the public, but also by fraudulent traders, software pirates, hackers and con-artists, to name but a few. A hacker is a person who breaks codes and passwords to gain unauthorized entry to computer systems.…

    • 625 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Hacking

    • 4142 Words
    • 17 Pages

    Hacking Contents ~~~~~~~~ This file will be divided into four parts: Part 1: What is Hacking, A Hacker's Code of Ethics, Basic Hacking Safety Part 2: Packet Switching Networks: Telenet- How it Works, How to Use it, Outdials, Network Servers, Private PADs Part 3: Identifying a Computer, How to Hack In, Operating System Defaults Part 4: Conclusion- Final Thoughts, Books to Read, Boards to Call, Acknowledgements Part One:…

    • 4142 Words
    • 17 Pages
    Good Essays
  • Powerful Essays

    Hacking

    • 3915 Words
    • 20 Pages

    A brief history of hacking... bsd 4.11> █ zuley clarke / james clawson / maria cordell november 2003 LCC 6316: Historical Approaches to Digital Media table of contents the evolution of hacking ................................................................................. 1 the drive to hack ............................................................................................ 2 cultural infiltration ..........................................................…

    • 3915 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    Hacking

    • 681 Words
    • 3 Pages

    the five steps of the hacking process. Ans: Foot printing Scanning and Enumeration System Hacking Deploy Payload cover tracks 2. In order to exploit or attack the targeted systems, what can you do as an initial first step to collect as much information as possible about the targets prior devising an attack and penetration test plan? Ans: Reconnaissance 3. What application and tools can be used to perform this initial reconnaissance and probing step? Ans: Google hacking site 4. How can…

    • 681 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Hacking

    • 1006 Words
    • 5 Pages

    Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills. Computer hacking is most common among teenagers and young adults, although there…

    • 1006 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Hacking

    • 10303 Words
    • 42 Pages

    Ethical Hacking or known as Anonymous By Jasper John F. Talinting Mrs. Amelia G. Villanueva English 102 March 11, 2013 Introduction: We are approaching for me as an IT Student I’m assume for my technical works and ideology about hacking, hacking is prevent and studies in programming, troubleshooting and etc. That aware in good conduct but also in our cyber society. We must think and polite our selves love technology and love our environment people…

    • 10303 Words
    • 42 Pages
    Powerful Essays
  • Powerful Essays

    Cognitive Hacking

    • 2741 Words
    • 11 Pages

    a category of computer security exploits called "cognitive hacking." Loosely speaking, cognitive hacking refers to a computer or information system attack that relies on changing human users ' perceptions and corresponding behaviors in order to be successful. This is in contrast to denial of service (DOS) and other kinds of well-known attacks that operate solely within the computer and network infrastructure. Several cognitive hacking techniques are illustrated by example and a taxonomy for these…

    • 2741 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Computer Hacking

    • 6350 Words
    • 26 Pages

    ISSN 0265-5527, pp. 387–399 Computer Hacking: Just Another Case of Juvenile Delinquency? MAJID YAR Lecturer in Criminology, School of Social Policy, Sociology and Social Research, University of Kent at Canterbury Abstract: Recent discussions of computer ‘hacking’ make explicit reference to the disproportionate involvement of juveniles in this form of computer crime. While criminal justice, computer security, public and popular reflections on hacking seldom refer to formal criminological…

    • 6350 Words
    • 26 Pages
    Powerful Essays
  • Satisfactory Essays

    ETHICAL HACKING

    • 263 Words
    • 5 Pages

    ETHICAL HACKING WORKSHOP PRESENTED BY mail us @ techhackiter@soauniversity.ac.in soa.techhackclub@gmail.com WARNING ALL INFORMATION PROVIDED IS ONLY FOR EDUCATIONAL PURPOSE. USE IT AT YOUR OWN RISK . WHO AM I ?? SUMIT LAKRA CISE(Certified Information Security Expert) Mob. No.:+919778178861 E-Mail: edvindeddy@gmail.com : fb.com/aexle : #Sumit_Lakra WHY IS SECURITY NEEDED? WHAT IS ETHICAL HACKING? HACKERS TERMS • Hacking - showing computer expertise • Cracking - breaching security on…

    • 263 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Ethical Hacking

    • 2948 Words
    • 12 Pages

    Ethical hacking also known as penetration testing or white-hat hacking, involves the same tools, tricks, and techniques that hackers use, but with one major difference that Ethical hacking is legal. Ethical hacking is performed with the target’s permission. The intent of ethical hacking is to discover vulnerabilities from a hacker’s viewpoint so systems can be better secured. Its part of an overall information risk management program that allows for ongoing security improvements. Ethical hacking can…

    • 2948 Words
    • 12 Pages
    Better Essays