ETHICAL HACKING – HOW IT OPERATES

Authors

  • Mrittikaa Das Advocate at Gauhati High Court, Guwahati, Assam, India Author

Downloads

Abstract

There are many benefits to the Internet's rapid growth, such as e-commerce, banking, email, and cloud computing, but there are also drawbacks, such as hacking and backdoors. The first major challenge that governments, organisations, and regular people face around the world is hacking, which includes reading other people's emails, obtaining credit card information from an online store, and secretly transmitting secrets to the public Internet. An ethical hacker can assist persons who have been hurt as a result of hacking. The ethical hacker operates in good conscience. People now have a widespread perception of hackers as malevolent, obsessive, criminal, and unethical. In essence, some hackers have even harmed some firms by collecting sensitive data about clients. In various government entities, highly confidential information, such as social security numbers and other classified information, has been interfered with. This clarifies the reason why hackers have a bad image. Ethical hackers' goal is to assess and investigate the system's weaknesses and flaws. A different perspective contends that without hackers, software faults and weaknesses would go undetected. The author attempts to establish the concept of Ethical Hacking in this technologically driven world with this study. An investigation into the many tools and techniques involved in Ethical Hacking has been made.

Readership Data

🌐

Refreshing Cached Analytics Data

The cached analytics data has become stale and journal.thelawbrigade.com is making a fresh request to fetch the latest data from Google Analytics. This may take 20-30 seconds depending on the server response time from Google Analytics. Please do not close the browser during this time. We appreciate your patience.

Published

06-01-2023

License

Copyright © 2026 by Mrittikaa Das

The copyright and license terms mentioned on this page take precedence over any other license terms mentioned on the article full text PDF or any other material associated with the article.

How to Cite

Das, Mrittikaa. “ETHICAL HACKING – HOW IT OPERATES”. Cyber Law Reporter, vol. 2, no. 2, Jan. 2023, pp. 19-31, https://journal.thelawbrigade.com/cylr/article/view/919.