An ethical hacker is a person or a company who has permission from the owner of the system or network to test and penetrate the system in order to find any kind of vulnerabilities, weaknesses or loopholes in the network so that these can fixed and system can be secured from black hat hackers. Ethical hackers use the same kind of tools and methods to test the system as black hat hackers. As we are in digital world it is necessary to protect our network from various hacking attack on our networks. If we have our networks tested and secured, we can protect our data and digital footprints from going into wrong hands. Current research paper will talk about the most common kind of hacking attack by black hat hacker “network hacking” just by gaining access to the AP of your network and simply putting some commands and all your data can be captured and altered through some software provided by the platform like kali Linux. To safeguard our data, among the various technologies are WEP, WAP and WAP2 are used prominently. Which also have some vulnerability in it, this research paper will be discussing about these weaknesses of each technology in detail and at last it will also be discussed on different ways to protect our mobile, system, etc from such attempts of hacking into our networks.
CITATION STYLE
Nagadeepa*, Dr. C., Mohan, Dr. R., & Singh, A. (2019). Ethical Hacking: Cyber-Crime Survival in the Digital World. International Journal of Recent Technology and Engineering (IJRTE), 8(4), 10332–10334. https://doi.org/10.35940/ijrte.d4612.118419
Mendeley helps you to discover research relevant for your work.