Ethical Hacking and Security Against Cyber Crime

Neeraj Kumar Rathore*
Assistant Professor, Department of Computer Science and Engineering, Jaypee University of Engineering and Technology, Guna, Madhya Pradesh, India.
Periodicity:December - February'2016
DOI : https://doi.org/10.26634/jit.5.1.4796

Abstract

This paper explores the fast growing Cyber world and its components over the internet. The fast growing Internet has benefited the modern society in the form of e-commerce, e-mail, online banking or system, advertising, vast stores of reference material, etc. But, there is also a dark side, where internet becomes a common and easy tool for the criminal activity using a weak link and vulnerability of internet. In this paper, the author concentrated over several hacking activity that come under Cyber crime. It also highlights the role of ethical hacker to evacuate from the culprits and cyber crime and illustrate on proactive approach to minimize the threat of hacking and Cyber crime.

Keywords

Hacking, Security, Cyber Crime, Ethical, Threat, Vulnerability.

How to Cite this Article?

Rathore. N (2016). Ethical Hacking and Security Against Cyber Crime. i-manager’s Journal on Information Technology, 5(1), 7-11. https://doi.org/10.26634/jit.5.1.4796

References

[1]. Rathore, Neeraj, and Inderveer Chana, (2014). "Job migration with fault tolerance based QoS scheduling using hash table functionality in social Grid computing". Journal of Intelligent and Fuzzy Systems, Vol. 27 No. 6, pp.2821-2833.
[2]. Rathore, Neeraj, and Inderveer Chana, (2015). "Variable threshold-based hierarchical load balancing technique in Grid". Engineering with Computers, Vol. 31 No.3, PP.597-615.
[3]. Rathore, Neeraj, and Inderveer Chana, (2014). "Load balancing and job migration techniques in grid: a survey of recent trends". Wireless Personal Communications, Vol.79 No.3, pp.2089-2125.
[4]. Rathore, Neeraj (2015). "Efficient Agent Based Priority Scheduling and Load Balancing Using Fuzzy Logic in Grid Computing". i-manager's Journal on Computer Science, Vol.3 No.3, PP. 11.
[5]. Rathore, Neeraj (2015). "Map Reduce Architecture for Grid". i-manager's Journal on Software Engineering, Vol.10, No.1, pp.21.
[6]. Sharma, Vishal, Rajesh Kumar, and Neeraj Rathore, (2015). "Topological Broadcasting Using Parameter Sensitivity-Based Logical Proximity Graphs in Coordinated Ground-Flying Ad Hoc Networks". Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol.6 No.3, pp.54-72.
[7]. Rathore, Neeraj, and Inderveer Chana, (2013). "Report on hierarchal load balancing technique in grid environment", i-manager's Journal on Information Technology, Vol.2 No.4, pp.21.
[8]. Rathore, Neeraj Kumar, and Inderveer Channa, (2010). "Check pointing Algorithm in Alchemi .NET". ims Journal on Information Technology. http://www.iuu.ac/ pragyaan/Pragyaan_IT_June10.pdf.
[9]. Rathore, N. K., and I. Chana (2011). "A cogitative analysis of load balancing technique with job migration in grid environment", IEEE Proceedings Paper, Vol.77, No.82.
[10]. Rathore, Neeraj. and Inderveer Chana, (2013). "A sender initiate based hierarchical load balancing technique for grid using variable threshold value". Signal Processing, Computing and Control (ISPCC), IEEE International Conference on IEEE.
[11]. Neeraj Kumar Rathore and Inderveer Chana, (2008), “Comparative Analysis of Checkpointing". PIMR Third National IT Conference, IT Enabled Practices and Emerging Management Paradigm book and category is Communication Technologies and Security Issues, pp.32- 35, Topic No/Name-46, Prestige Management and Research, Indore, (MP) India, 2008.
[12]. Neeraj Rathore, “Implementing Checkpointing Algorithm in Alchemi.NET”. ME Thesis, Thapar University, Patiala. Retrieved from http://hdl.handle.net/10266/658 http://dspace.thapar.edu:8080/dspace/bitstream/1026 6/658/3/T658.pdf
[13]. Neeraj Kumar Rathore and Inderveer Chana (2010). “Check pointing Algorithm in Alchemi.NET". Lambert Academic Publication House (LBA), Germany ISBN-10: 3843361371, ISBN-13:978-3843361378, Retrieved from https://www.lap-publishing.com/catalog/ details/store/gb/book/978-3-8433-6137-8/checkpointing-algorithm-for-alchemi-net-in-grid
[14]. Neeraj Kumar Rathore and Anuradha Sharma (2015). “Efficient Dynamic Distributed Load Balancing Technique". Lambert Academic Publication House, Germany, Project ID: 127478, ISBN no-978-3-659-78288- 6,retrieved from https://www.lap-publishing.com/catalog /details//store/gb/book/978-3-659-78288-6/efficientd ynamic-distributed-load-balancing-technique, http://www.amazon.com/Efficient-Dynamic-Distributed- Balancing-Technique/dp/3659782882.
[15]. Neeraj Kumar Rathore, (2015). “Load Balancing Algorithm for Grid" in 30th M.P. Young Scientist Congress, Bhopal, M.P., pp-56.
[16]. Neeraj Kumar Rathore (2014). “An Efficient Hierarchical Load Balancing Technique for Grid". 29th M.P. Young Scientist Congress, Bhopal, M.P., pp.55.
[17]. Rohini Chouhan and Neeraj Kumar Rathore (2012). “Comparison of Load Balancing Technique in Grid". 17th Annual Conference of Gwali or Academy o f Mathematical Science and National Symposium on Computational Mathematics & Information Technology, JUET, Guna, M.P., pp.7-9.
[18]. Neeraj Kumar Rathore and Inderveer Chana, (2010). “Fault Tolerance Algorithm in Alchemi.NET Middleware". National Conference on Education & Research (ConFR10), Third CSI National Conference of CSI Division V, Bhopal Chapter, IEEE Bombay, and MPCST Bhopal, organized by JUIT, India.
[19]. Neeraj Kumar Rathore and Inderveer Chana (2009), “Checkpointing Algorithm in Alchemi.NET", Annual Conference of Vijnana Parishad of India and National Symposium Recent Development in Applied Mathematics & Information Technology, JUET, Guna, M.P.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.