Ethical Hacking: Cyber-Crime Survival in the Digital World
C Nagadeepa1, Reenu Mohan2, Ajeet Singh Shekhawat3
1Dr. C. Nagadeepa*, Assistant Professor, Department of Commerce, Kristu Jayanti College, Bangalore, India.
2Dr. Reenu Mohan, Assistant Professor, Department of Commerce, Kristu Jayanti College, Bangalore, India.
3Ajith Singh, IV B.Com, Department of Commerce, Kritu Jayanti College, Bangalore, India.

Manuscript received on November 11, 2019. | Revised Manuscript received on November 20 2019. | Manuscript published on 30 November, 2019. | PP: 10332-10334 | Volume-8 Issue-4, November 2019. | Retrieval Number: D4612118419/2019©BEIESP | DOI: 10.35940/ijrte.D4612.118419

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: An ethical hacker is a person or a company who has permission from the owner of the system or network to test and penetrate the system in order to find any kind of vulnerabilities, weaknesses or loopholes in the network so that these can fixed and system can be secured from black hat hackers. Ethical hackers use the same kind of tools and methods to test the system as black hat hackers. As we are in digital world it is necessary to protect our network from various hacking attack on our networks. If we have our networks tested and secured, we can protect our data and digital footprints from going into wrong hands. Current research paper will talk about the most common kind of hacking attack by black hat hacker “network hacking” just by gaining access to the AP of your network and simply putting some commands and all your data can be captured and altered through some software provided by the platform like kali Linux. To safeguard our data, among the various technologies are WEP, WAP and WAP2 are used prominently. Which also have some vulnerability in it, this research paper will be discussing about these weaknesses of each technology in detail and at last it will also be discussed on different ways to protect our mobile, system, etc from such attempts of hacking into our networks.
Keywords: Hacking, Ethical Hacking, Network Hacking, WEP,WAP,WAP2,AP.
Scope of the Article: Plant Cyber Security