Unveiling cybersecurity frontiers: A comprehensive study of ethical hacking for information security

To protect user data and digital infrastructure ethical hacking has become a tool, in the changing field of cybersecurity. This introductory passage provides an overview of a paper that delves into ethical hacking from 2015 onwards. It explores categories of hackers such as hat, black hat and grey h...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Agrawal, Poorva, Gupta, Gopal Kumar, Kaur, Gagandeep, Bhele, Kshitij, Mehadia, Kushal, Parate, Yash
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 1
container_start_page
container_title
container_volume 3242
creator Agrawal, Poorva
Gupta, Gopal Kumar
Kaur, Gagandeep
Bhele, Kshitij
Mehadia, Kushal
Parate, Yash
description To protect user data and digital infrastructure ethical hacking has become a tool, in the changing field of cybersecurity. This introductory passage provides an overview of a paper that delves into ethical hacking from 2015 onwards. It explores categories of hackers such as hat, black hat and grey hat hackers while also discussing the moral dilemmas and challenges associated with their actions. The paper emphasizes the importance of strengthening cybersecurity measures examines security breaches and recognizes the role played by ethical hackers in combating cybercrime. Additionally, it sheds light on the approach taken towards hacking education and addresses potential risks involved. Furthermore, the paper offers insights, into how vulnerability assessments have evolved within research.
doi_str_mv 10.1063/5.0234349
format Conference Proceeding
fullrecord <record><control><sourceid>proquest_scita</sourceid><recordid>TN_cdi_scitation_primary_10_1063_5_0234349</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3107288529</sourcerecordid><originalsourceid>FETCH-LOGICAL-p639-86a040c9c0b8c78f30ff8a8d504acba1c1c38d739ec62293ff665f0f0fcfe5e33</originalsourceid><addsrcrecordid>eNo1kE9LAzEQxYMoWKsHv0HAm7B1stlkE2-l-A8KXip4W7LZxKa2mzXJFvbbu7WVgTcwzPze8BC6JTAjwOkDm0FOC1rIMzQhjJGs5ISfowmALLK8oJ-X6CrGDUAuy1JMUPPR7o3buvYL66E2IRrdB5cGbINvkxsHj3iOtd91waxNG93e4Jj6ZsDeYpPWTqstXiv9fSBYH7BrR92p5HyL_2HX6MKqbTQ3pz5Fq-en1eI1W76_vC3my6zjVGaCKyhASw210KWwFKwVSjQMCqVrRTTRVDQllUbzPJfUWs6ZhbG0NcxQOkV3R2wX_E9vYqo2vg_t6FhRAmUuBBvPpuj-uBW1S39_Vl1wOxWGikB1CLFi1SlE-gtJZWZB</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype><pqid>3107288529</pqid></control><display><type>conference_proceeding</type><title>Unveiling cybersecurity frontiers: A comprehensive study of ethical hacking for information security</title><source>American Institute of Physics (AIP) Journals</source><creator>Agrawal, Poorva ; Gupta, Gopal Kumar ; Kaur, Gagandeep ; Bhele, Kshitij ; Mehadia, Kushal ; Parate, Yash</creator><contributor>Singh, Ajit K. ; Pinto, Carla M. A. ; Sajid, Mohammad</contributor><creatorcontrib>Agrawal, Poorva ; Gupta, Gopal Kumar ; Kaur, Gagandeep ; Bhele, Kshitij ; Mehadia, Kushal ; Parate, Yash ; Singh, Ajit K. ; Pinto, Carla M. A. ; Sajid, Mohammad</creatorcontrib><description>To protect user data and digital infrastructure ethical hacking has become a tool, in the changing field of cybersecurity. This introductory passage provides an overview of a paper that delves into ethical hacking from 2015 onwards. It explores categories of hackers such as hat, black hat and grey hat hackers while also discussing the moral dilemmas and challenges associated with their actions. The paper emphasizes the importance of strengthening cybersecurity measures examines security breaches and recognizes the role played by ethical hackers in combating cybercrime. Additionally, it sheds light on the approach taken towards hacking education and addresses potential risks involved. Furthermore, the paper offers insights, into how vulnerability assessments have evolved within research.</description><identifier>ISSN: 0094-243X</identifier><identifier>EISSN: 1551-7616</identifier><identifier>DOI: 10.1063/5.0234349</identifier><identifier>CODEN: APCPCS</identifier><language>eng</language><publisher>Melville: American Institute of Physics</publisher><subject>Cybersecurity ; Ethics</subject><ispartof>AIP conference proceedings, 2024, Vol.3242 (1)</ispartof><rights>Author(s)</rights><rights>2024 Author(s). Published under an exclusive license by AIP Publishing.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://pubs.aip.org/acp/article-lookup/doi/10.1063/5.0234349$$EHTML$$P50$$Gscitation$$H</linktohtml><link.rule.ids>309,310,314,776,780,785,786,790,4498,23909,23910,25118,27901,27902,76127</link.rule.ids></links><search><contributor>Singh, Ajit K.</contributor><contributor>Pinto, Carla M. A.</contributor><contributor>Sajid, Mohammad</contributor><creatorcontrib>Agrawal, Poorva</creatorcontrib><creatorcontrib>Gupta, Gopal Kumar</creatorcontrib><creatorcontrib>Kaur, Gagandeep</creatorcontrib><creatorcontrib>Bhele, Kshitij</creatorcontrib><creatorcontrib>Mehadia, Kushal</creatorcontrib><creatorcontrib>Parate, Yash</creatorcontrib><title>Unveiling cybersecurity frontiers: A comprehensive study of ethical hacking for information security</title><title>AIP conference proceedings</title><description>To protect user data and digital infrastructure ethical hacking has become a tool, in the changing field of cybersecurity. This introductory passage provides an overview of a paper that delves into ethical hacking from 2015 onwards. It explores categories of hackers such as hat, black hat and grey hat hackers while also discussing the moral dilemmas and challenges associated with their actions. The paper emphasizes the importance of strengthening cybersecurity measures examines security breaches and recognizes the role played by ethical hackers in combating cybercrime. Additionally, it sheds light on the approach taken towards hacking education and addresses potential risks involved. Furthermore, the paper offers insights, into how vulnerability assessments have evolved within research.</description><subject>Cybersecurity</subject><subject>Ethics</subject><issn>0094-243X</issn><issn>1551-7616</issn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2024</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNo1kE9LAzEQxYMoWKsHv0HAm7B1stlkE2-l-A8KXip4W7LZxKa2mzXJFvbbu7WVgTcwzPze8BC6JTAjwOkDm0FOC1rIMzQhjJGs5ISfowmALLK8oJ-X6CrGDUAuy1JMUPPR7o3buvYL66E2IRrdB5cGbINvkxsHj3iOtd91waxNG93e4Jj6ZsDeYpPWTqstXiv9fSBYH7BrR92p5HyL_2HX6MKqbTQ3pz5Fq-en1eI1W76_vC3my6zjVGaCKyhASw210KWwFKwVSjQMCqVrRTTRVDQllUbzPJfUWs6ZhbG0NcxQOkV3R2wX_E9vYqo2vg_t6FhRAmUuBBvPpuj-uBW1S39_Vl1wOxWGikB1CLFi1SlE-gtJZWZB</recordid><startdate>20240920</startdate><enddate>20240920</enddate><creator>Agrawal, Poorva</creator><creator>Gupta, Gopal Kumar</creator><creator>Kaur, Gagandeep</creator><creator>Bhele, Kshitij</creator><creator>Mehadia, Kushal</creator><creator>Parate, Yash</creator><general>American Institute of Physics</general><scope>8FD</scope><scope>H8D</scope><scope>L7M</scope></search><sort><creationdate>20240920</creationdate><title>Unveiling cybersecurity frontiers: A comprehensive study of ethical hacking for information security</title><author>Agrawal, Poorva ; Gupta, Gopal Kumar ; Kaur, Gagandeep ; Bhele, Kshitij ; Mehadia, Kushal ; Parate, Yash</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p639-86a040c9c0b8c78f30ff8a8d504acba1c1c38d739ec62293ff665f0f0fcfe5e33</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Cybersecurity</topic><topic>Ethics</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Agrawal, Poorva</creatorcontrib><creatorcontrib>Gupta, Gopal Kumar</creatorcontrib><creatorcontrib>Kaur, Gagandeep</creatorcontrib><creatorcontrib>Bhele, Kshitij</creatorcontrib><creatorcontrib>Mehadia, Kushal</creatorcontrib><creatorcontrib>Parate, Yash</creatorcontrib><collection>Technology Research Database</collection><collection>Aerospace Database</collection><collection>Advanced Technologies Database with Aerospace</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Agrawal, Poorva</au><au>Gupta, Gopal Kumar</au><au>Kaur, Gagandeep</au><au>Bhele, Kshitij</au><au>Mehadia, Kushal</au><au>Parate, Yash</au><au>Singh, Ajit K.</au><au>Pinto, Carla M. A.</au><au>Sajid, Mohammad</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Unveiling cybersecurity frontiers: A comprehensive study of ethical hacking for information security</atitle><btitle>AIP conference proceedings</btitle><date>2024-09-20</date><risdate>2024</risdate><volume>3242</volume><issue>1</issue><issn>0094-243X</issn><eissn>1551-7616</eissn><coden>APCPCS</coden><abstract>To protect user data and digital infrastructure ethical hacking has become a tool, in the changing field of cybersecurity. This introductory passage provides an overview of a paper that delves into ethical hacking from 2015 onwards. It explores categories of hackers such as hat, black hat and grey hat hackers while also discussing the moral dilemmas and challenges associated with their actions. The paper emphasizes the importance of strengthening cybersecurity measures examines security breaches and recognizes the role played by ethical hackers in combating cybercrime. Additionally, it sheds light on the approach taken towards hacking education and addresses potential risks involved. Furthermore, the paper offers insights, into how vulnerability assessments have evolved within research.</abstract><cop>Melville</cop><pub>American Institute of Physics</pub><doi>10.1063/5.0234349</doi><tpages>7</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0094-243X
ispartof AIP conference proceedings, 2024, Vol.3242 (1)
issn 0094-243X
1551-7616
language eng
recordid cdi_scitation_primary_10_1063_5_0234349
source American Institute of Physics (AIP) Journals
subjects Cybersecurity
Ethics
title Unveiling cybersecurity frontiers: A comprehensive study of ethical hacking for information security
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-01T11%3A19%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_scita&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Unveiling%20cybersecurity%20frontiers:%20A%20comprehensive%20study%20of%20ethical%20hacking%20for%20information%20security&rft.btitle=AIP%20conference%20proceedings&rft.au=Agrawal,%20Poorva&rft.date=2024-09-20&rft.volume=3242&rft.issue=1&rft.issn=0094-243X&rft.eissn=1551-7616&rft.coden=APCPCS&rft_id=info:doi/10.1063/5.0234349&rft_dat=%3Cproquest_scita%3E3107288529%3C/proquest_scita%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3107288529&rft_id=info:pmid/&rfr_iscdi=true