logo

Ethical Hacking as a Defence Mechanism

This report analyses the use of ethical hacking as a defence mechanism in computer systems security.

10 Pages1909 Words378 Views
   

Added on  2023-06-03

About This Document

This report describes about the fundamentals of cybercrimes and mainly focused on the ethical hacking. It explains what constitutes a crime when using computers, how computer crimes are committed along with a broad description of ethical hacking.

Ethical Hacking as a Defence Mechanism

This report analyses the use of ethical hacking as a defence mechanism in computer systems security.

   Added on 2023-06-03

ShareRelated Documents
Running head: ETHICAL HACKING AS A DEFENCE MECHANISM
ETHICAL HACKING AS A DEFENCE MECHANISM
Name of the Student
Name of the University
Author Note
Ethical Hacking as a Defence Mechanism_1
1ETHICAL HACKING AS A DEFENCE MECHANISM
Table of Contents
1.0 Introduction..........................................................................................................................2
2.0 Cybercrimes:........................................................................................................................3
3.0 Crime cases:.........................................................................................................................4
4.0 Ethical hacking.....................................................................................................................5
5.0 Conclusion:..........................................................................................................................5
6.0 References:...........................................................................................................................7
Ethical Hacking as a Defence Mechanism_2
2ETHICAL HACKING AS A DEFENCE MECHANISM
1.0 Introduction
Computer crime, widely known as cybercrime associated with criminal activities
while utilizing network devices or computers. Majority of the cybercrime is initiated to gain
profit but some of them are designed to damage infected devices or compromise crucial data.
Mostly, cybercrimes are associated with spreading malware and illegal content. Some of the
cybercrimes involved both as Ransom ware attack, where crucial data is encrypted in the
infected system and asks for ransom to access this files. Users need to pay certain amount of
crypto currency in order to gaining access to their files. Cybercrimes can also be
distinguished into two types as computer enabled crime and computer depended crime.
Computer depended crimes are offences which can only be committed while utilizing the
computer devices or network or any application of information technology. This type of
attacks involves spreading of malware, virus and hacking and DoS attacks. On other hand,
computer enabled crimes are traditional crimes which can be improved in their reach or scale
by utilizing computers, computer network or other type of information technology. Unlike
cyber-dependent crimes, they can be committed without the use of ICT. Theft and fraud are
the two widely listed occurrences of cyber enabled crime.
This report describes about the fundamentals of cybercrimes. Cybercrime is a broad
topic which cannot be described fully within such short parameter. So, it is mainly focused on
the different kind of computer crimes. This paper explains what constitutes a crime when
using computers, how computer crimes are committed along with a broad description of
ethical hacking. The discussion is also associates with what Ethical Hacking is, what makes it
a legal activity, and what it actually is about, which is a network defence mechanism. Further,
a conclusion has been drawn from the discussion.
Ethical Hacking as a Defence Mechanism_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Crime: Types, Impact, and Prevention
|6
|1317
|227

Ransomware and Its Impact on Society
|8
|2495
|62

Computer Forensics: Investigating Cyber Attacks and Digital Data
|4
|729
|272

Moral and Ethical Frameworks Concepts
|7
|1023
|69

Cyber Crime for New Threats of 2018 - Desklib
|6
|477
|389

ASSIGNMENT WHAT IS CYBER CRIME ?
|8
|1982
|28