Unveiling cybersecurity frontiers: A comprehensive study of ethical hacking for information security
To protect user data and digital infrastructure ethical hacking has become a tool, in the changing field of cybersecurity. This introductory passage provides an overview of a paper that delves into ethical hacking from 2015 onwards. It explores categories of hackers such as hat, black hat and grey h...
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 1 |
container_start_page | |
container_title | |
container_volume | 3242 |
creator | Agrawal, Poorva Gupta, Gopal Kumar Kaur, Gagandeep Bhele, Kshitij Mehadia, Kushal Parate, Yash |
description | To protect user data and digital infrastructure ethical hacking has become a tool, in the changing field of cybersecurity. This introductory passage provides an overview of a paper that delves into ethical hacking from 2015 onwards. It explores categories of hackers such as hat, black hat and grey hat hackers while also discussing the moral dilemmas and challenges associated with their actions. The paper emphasizes the importance of strengthening cybersecurity measures examines security breaches and recognizes the role played by ethical hackers in combating cybercrime. Additionally, it sheds light on the approach taken towards hacking education and addresses potential risks involved. Furthermore, the paper offers insights, into how vulnerability assessments have evolved within research. |
doi_str_mv | 10.1063/5.0234349 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>proquest_scita</sourceid><recordid>TN_cdi_scitation_primary_10_1063_5_0234349</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3107288529</sourcerecordid><originalsourceid>FETCH-LOGICAL-p639-86a040c9c0b8c78f30ff8a8d504acba1c1c38d739ec62293ff665f0f0fcfe5e33</originalsourceid><addsrcrecordid>eNo1kE9LAzEQxYMoWKsHv0HAm7B1stlkE2-l-A8KXip4W7LZxKa2mzXJFvbbu7WVgTcwzPze8BC6JTAjwOkDm0FOC1rIMzQhjJGs5ISfowmALLK8oJ-X6CrGDUAuy1JMUPPR7o3buvYL66E2IRrdB5cGbINvkxsHj3iOtd91waxNG93e4Jj6ZsDeYpPWTqstXiv9fSBYH7BrR92p5HyL_2HX6MKqbTQ3pz5Fq-en1eI1W76_vC3my6zjVGaCKyhASw210KWwFKwVSjQMCqVrRTTRVDQllUbzPJfUWs6ZhbG0NcxQOkV3R2wX_E9vYqo2vg_t6FhRAmUuBBvPpuj-uBW1S39_Vl1wOxWGikB1CLFi1SlE-gtJZWZB</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype><pqid>3107288529</pqid></control><display><type>conference_proceeding</type><title>Unveiling cybersecurity frontiers: A comprehensive study of ethical hacking for information security</title><source>American Institute of Physics (AIP) Journals</source><creator>Agrawal, Poorva ; Gupta, Gopal Kumar ; Kaur, Gagandeep ; Bhele, Kshitij ; Mehadia, Kushal ; Parate, Yash</creator><contributor>Singh, Ajit K. ; Pinto, Carla M. A. ; Sajid, Mohammad</contributor><creatorcontrib>Agrawal, Poorva ; Gupta, Gopal Kumar ; Kaur, Gagandeep ; Bhele, Kshitij ; Mehadia, Kushal ; Parate, Yash ; Singh, Ajit K. ; Pinto, Carla M. A. ; Sajid, Mohammad</creatorcontrib><description>To protect user data and digital infrastructure ethical hacking has become a tool, in the changing field of cybersecurity. This introductory passage provides an overview of a paper that delves into ethical hacking from 2015 onwards. It explores categories of hackers such as hat, black hat and grey hat hackers while also discussing the moral dilemmas and challenges associated with their actions. The paper emphasizes the importance of strengthening cybersecurity measures examines security breaches and recognizes the role played by ethical hackers in combating cybercrime. Additionally, it sheds light on the approach taken towards hacking education and addresses potential risks involved. Furthermore, the paper offers insights, into how vulnerability assessments have evolved within research.</description><identifier>ISSN: 0094-243X</identifier><identifier>EISSN: 1551-7616</identifier><identifier>DOI: 10.1063/5.0234349</identifier><identifier>CODEN: APCPCS</identifier><language>eng</language><publisher>Melville: American Institute of Physics</publisher><subject>Cybersecurity ; Ethics</subject><ispartof>AIP conference proceedings, 2024, Vol.3242 (1)</ispartof><rights>Author(s)</rights><rights>2024 Author(s). Published under an exclusive license by AIP Publishing.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://pubs.aip.org/acp/article-lookup/doi/10.1063/5.0234349$$EHTML$$P50$$Gscitation$$H</linktohtml><link.rule.ids>309,310,314,776,780,785,786,790,4498,23909,23910,25118,27901,27902,76127</link.rule.ids></links><search><contributor>Singh, Ajit K.</contributor><contributor>Pinto, Carla M. A.</contributor><contributor>Sajid, Mohammad</contributor><creatorcontrib>Agrawal, Poorva</creatorcontrib><creatorcontrib>Gupta, Gopal Kumar</creatorcontrib><creatorcontrib>Kaur, Gagandeep</creatorcontrib><creatorcontrib>Bhele, Kshitij</creatorcontrib><creatorcontrib>Mehadia, Kushal</creatorcontrib><creatorcontrib>Parate, Yash</creatorcontrib><title>Unveiling cybersecurity frontiers: A comprehensive study of ethical hacking for information security</title><title>AIP conference proceedings</title><description>To protect user data and digital infrastructure ethical hacking has become a tool, in the changing field of cybersecurity. This introductory passage provides an overview of a paper that delves into ethical hacking from 2015 onwards. It explores categories of hackers such as hat, black hat and grey hat hackers while also discussing the moral dilemmas and challenges associated with their actions. The paper emphasizes the importance of strengthening cybersecurity measures examines security breaches and recognizes the role played by ethical hackers in combating cybercrime. Additionally, it sheds light on the approach taken towards hacking education and addresses potential risks involved. Furthermore, the paper offers insights, into how vulnerability assessments have evolved within research.</description><subject>Cybersecurity</subject><subject>Ethics</subject><issn>0094-243X</issn><issn>1551-7616</issn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2024</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNo1kE9LAzEQxYMoWKsHv0HAm7B1stlkE2-l-A8KXip4W7LZxKa2mzXJFvbbu7WVgTcwzPze8BC6JTAjwOkDm0FOC1rIMzQhjJGs5ISfowmALLK8oJ-X6CrGDUAuy1JMUPPR7o3buvYL66E2IRrdB5cGbINvkxsHj3iOtd91waxNG93e4Jj6ZsDeYpPWTqstXiv9fSBYH7BrR92p5HyL_2HX6MKqbTQ3pz5Fq-en1eI1W76_vC3my6zjVGaCKyhASw210KWwFKwVSjQMCqVrRTTRVDQllUbzPJfUWs6ZhbG0NcxQOkV3R2wX_E9vYqo2vg_t6FhRAmUuBBvPpuj-uBW1S39_Vl1wOxWGikB1CLFi1SlE-gtJZWZB</recordid><startdate>20240920</startdate><enddate>20240920</enddate><creator>Agrawal, Poorva</creator><creator>Gupta, Gopal Kumar</creator><creator>Kaur, Gagandeep</creator><creator>Bhele, Kshitij</creator><creator>Mehadia, Kushal</creator><creator>Parate, Yash</creator><general>American Institute of Physics</general><scope>8FD</scope><scope>H8D</scope><scope>L7M</scope></search><sort><creationdate>20240920</creationdate><title>Unveiling cybersecurity frontiers: A comprehensive study of ethical hacking for information security</title><author>Agrawal, Poorva ; Gupta, Gopal Kumar ; Kaur, Gagandeep ; Bhele, Kshitij ; Mehadia, Kushal ; Parate, Yash</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p639-86a040c9c0b8c78f30ff8a8d504acba1c1c38d739ec62293ff665f0f0fcfe5e33</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Cybersecurity</topic><topic>Ethics</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Agrawal, Poorva</creatorcontrib><creatorcontrib>Gupta, Gopal Kumar</creatorcontrib><creatorcontrib>Kaur, Gagandeep</creatorcontrib><creatorcontrib>Bhele, Kshitij</creatorcontrib><creatorcontrib>Mehadia, Kushal</creatorcontrib><creatorcontrib>Parate, Yash</creatorcontrib><collection>Technology Research Database</collection><collection>Aerospace Database</collection><collection>Advanced Technologies Database with Aerospace</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Agrawal, Poorva</au><au>Gupta, Gopal Kumar</au><au>Kaur, Gagandeep</au><au>Bhele, Kshitij</au><au>Mehadia, Kushal</au><au>Parate, Yash</au><au>Singh, Ajit K.</au><au>Pinto, Carla M. A.</au><au>Sajid, Mohammad</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Unveiling cybersecurity frontiers: A comprehensive study of ethical hacking for information security</atitle><btitle>AIP conference proceedings</btitle><date>2024-09-20</date><risdate>2024</risdate><volume>3242</volume><issue>1</issue><issn>0094-243X</issn><eissn>1551-7616</eissn><coden>APCPCS</coden><abstract>To protect user data and digital infrastructure ethical hacking has become a tool, in the changing field of cybersecurity. This introductory passage provides an overview of a paper that delves into ethical hacking from 2015 onwards. It explores categories of hackers such as hat, black hat and grey hat hackers while also discussing the moral dilemmas and challenges associated with their actions. The paper emphasizes the importance of strengthening cybersecurity measures examines security breaches and recognizes the role played by ethical hackers in combating cybercrime. Additionally, it sheds light on the approach taken towards hacking education and addresses potential risks involved. Furthermore, the paper offers insights, into how vulnerability assessments have evolved within research.</abstract><cop>Melville</cop><pub>American Institute of Physics</pub><doi>10.1063/5.0234349</doi><tpages>7</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0094-243X |
ispartof | AIP conference proceedings, 2024, Vol.3242 (1) |
issn | 0094-243X 1551-7616 |
language | eng |
recordid | cdi_scitation_primary_10_1063_5_0234349 |
source | American Institute of Physics (AIP) Journals |
subjects | Cybersecurity Ethics |
title | Unveiling cybersecurity frontiers: A comprehensive study of ethical hacking for information security |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-01T11%3A19%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_scita&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Unveiling%20cybersecurity%20frontiers:%20A%20comprehensive%20study%20of%20ethical%20hacking%20for%20information%20security&rft.btitle=AIP%20conference%20proceedings&rft.au=Agrawal,%20Poorva&rft.date=2024-09-20&rft.volume=3242&rft.issue=1&rft.issn=0094-243X&rft.eissn=1551-7616&rft.coden=APCPCS&rft_id=info:doi/10.1063/5.0234349&rft_dat=%3Cproquest_scita%3E3107288529%3C/proquest_scita%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3107288529&rft_id=info:pmid/&rfr_iscdi=true |