Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Standard view
Full view
of .
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1
Ethical Hacking RHartley

Ethical Hacking RHartley

|Views: 31|Likes:
Published by Dinesh Kumar

More info:

Published by: Dinesh Kumar on Jan 21, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





Ethical Hacking 1Running head: ETHICAL HACKING: Teaching Students to Hack Ethical Hacking: Teaching Students to Hack Regina D. HartleyEast Carolina University
Ethical Hacking 2
One of the fastest growing areas in network security, and certainly an area that generatesmuch discussion, is that of ethical hacking. The purpose of this study is to examine theliterature regarding how private sectors and educational institutions are addressing thegrowing demand for ethical hacking instruction. The study will also examine theopportunity for community colleges in providing this type of instruction. The discussionwill conclude with a proposed model of ethical hacking instruction that will be used toteach a course in the summer semester of 2006 through the continuing educationdepartment at Caldwell Community College and Technical Institute within the NorthCarolina Community College System.
Ethical Hacking 3Ethical Hacking: Teaching Students to Hack The growing dependence and importance regarding information technology present within our society is increasingly demanding that professionals find moreeffective solutions relating to security concerns. Individuals with unethical behaviors arefinding a variety of ways of conducting activities that cause businesses and consumersmuch grief and vast amounts annually in damages.As information security continues to be foremost on the minds of informationtechnology professionals, improvements in this area are critically important. One areathat is very promising is penetration testing or Ethical Hacking.The purpose of this paper is to examine effective offerings within public and private sectors to prepare security professionals. These individuals must be equippedwith necessary tools, knowledge, and expertise in this fast growing proactive approach toinformation security. Following this examination a proposed model of Ethical Hackinginstructional plan will be addressed.Ethical HackingOne of the more effective ways of testing network security is penetration testingor ethical hacking. Activities focus on the identification and exploitation of securityvulnerabilities, and subsequent implementation of corrective measures (Using an EthicalHacking Technique). Organizations are increasingly evaluating the success or failure of their current security measures through then use of ethical hacking processes. Accordingto some “’ethical hacking’ may be one of the most effective ways to proactively plugrampant security holes” (Yurcik & Doss, 2001). Moreover, many security expertsencourage organizations to hire ethical hackers to test their networks (Leung, 2005).

Activity (3)

You've already reviewed this. Edit your review.
1 hundred reads
Prabhjot Singh kainth liked this
Rajesh Radhakrishnan liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->