Volume no :
9 |
Issue no :
2
Article Type :
Scholarly Article
Author :
Prof P.T.Talole, Mr.Ajay.S.Ingle, Mr.Nilesh.M.Jadhav, Mr.Samyak.G.Sonone, Miss.Divyani.V.Patil
Published Date :
June, 2025
Publisher :
Journal of Artificial Intelligence and Cyber Security (JAICS)
Page No: 1 - 7
Abstract : Ethical hacking involves the use of hacking tools, tricks, and techniques to identify vulnerabilities and ensure system security. Ethical Hacking is the practice of employing computer and network skills in order to assist organizations in testing their network security for possible loopholes and vulnerabilities. Ethical hacking encompasses a structured approach that includes reconnaissance, scanning, gaining access, maintaining access, and covering tracks. Ethical hackers are network specialists who test security systems to prevent malicious hackers from exploiting them. This testing, also known as intrusion testing or penetration testing, helps organizations and governments assess the security of their systems. White hat hackers are classified according to their work and knowledge, ensuring the safety of the system and reporting back to the owner.
Keyword Ethical Hacking, Penetration Testing, White Hat Hackers, Cybersecurity, Network Security.
Reference:

[1] Kumar, R. (2019). Ethical hacking: Concepts, tools, and techniques. Cybersecurity Journal, 12(3),  45-58..

[2] Khan, M. K., & Khan, I. (2016). “Ethical Hacking: A Comprehensive Guide to Secure Networks.”  This paper discusses the significance of ethical hacking in protecting network security.  [3] Stallings, W., & Brown, L. (2012). “Computer Security: Principles and Practice.” This book  provides a solid foundation in the principles of cybersecurity, including ethical hacking  methodologies. 

[4] Mason, J. B. (2019). “Understanding the Ethical Hacker.” International Journal of Information  Security, 18(5), 435-444. This article examines the ethical implications and responsibilities of  ethical hackers in cybersecurity.   

[5] Cappos, J., & Gutterman, S. (2015). “Ethical Hacking: A Risky Business.” IEEE Security & Privacy,  13(6), 76-79. This article discusses the risks and rewards associated with ethical hacking practices.