Showing 1 - 15 results of 15 for search '"ethical hacker"', query time: 0.18s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    It takes a pirate to know one: ethical hackers for healthcare cybersecurity by Giorgia Lorenzini, David Martin Shaw, Bernice Simone Elger

    Published 2022-12-01
    “…Additionally, it is important to distinguish between malicious hackers and ethical hackers. Amongst the latter, penetration testers are only a sub-category. …”
    Get full text
    Article
  6. 6
  7. 7

    Determination of parameters affecting the possibility of computer attack implemented by an intruder by Olga S. Makarova, Sergey V. Porshnev

    Published 2021-04-01
    “…Existing methodologies for assessing CA are Cyber Kill Chain, Mitre Att&ck, NIST 800-115, Certified Ethical Hacker (CEH), FSTEC of Russia and ISO 27001/ They offer approaches to the analysis of CA from the organization point of view. …”
    Get full text
    Article
  8. 8

    Hands on Hacking / by Hickey, Matthew, author 635083, Arcuri, Jennifer, author 635084

    Published 2020
    “…This book holds no punches and explains the tools, tactics and procedures used by ethical hackers and criminal crackers alike. We will take you on a journey through a hacker's perspective when focused on the computer infrastructure of a targetcompany, exploring how to access the servers and data. …”
    text
  9. 9

    Vulnerability exploitations using steganography in PDF files by Araujo, Istteffanny Isloure, Kazemian, Hassan

    Published 2020
    “…Several experiments are detailed exploiting gaps in PDF, email and image files in order to draw awareness to security professionals and Ethical hackers’ trainees.…”
    Get full text
    Article
  10. 10

    An Effective Method for Detecting Cyber Attacks on Computer Networks from the NSL-KDD Data Set by Shaik Aseena Babu, Reddy Rajeswara, Vullam Nagagopi Raju, Reddy Gondi Konda, Shaik Subhani

    Published 2025-01-01
    “…Cybercrime is rapidly increasing and exploits various vulnerabilities in these computing environments. Ethical hackers pay more attention to determining vulnerabilities and recommending mitigation methods. …”
    Get full text
    Article
  11. 11

    Navigating vulnerability markets and bug bounty programs: A public policy perspective by Aviram Zrahia

    Published 2024-02-01
    “…I argue that bug bounty programs that bring together organisations and ethical hackers to trade vulnerabilities produce the highest impact. …”
    Get full text
    Article
  12. 12

    The Impacts of Ethical Hacking and its Security Mechanisms by Hafiz Burhan Ul Haq, Muhammad Zulkifl Hassan, Muhammad Zunnurain Hussain, Rabia Aslam Khan, Sabreena Nawaz, Hassan Raza Khokhar, Mahnoor Arshad

    Published 2022-12-01
    “…A person or corporation that does ethical hacking and receives incentives from a network or system owner for testing can enter an apparatus (system or network) to locate, repair, and expose network flaws. Most ethical hackers, also known as black hat hackers, test systems using different approaches, methodologies, and tools. …”
    Get full text
    Article
  13. 13

    Face Detection Performance Using CNNs and Bug Bonuty Program (BBP) by Yasmin Makki Mohialden, Saba Salman, Nadia Mahmood Hussien

    Published 2024-03-01
    “… Bug bounty schemes make use of outside ethical hackers to find and fix a variety of security flaws, guaranteeing quicker and more affordable problem solving. …”
    Get full text
    Article
  14. 14

    Windows APT Warfare : Identify and prevent Windows APT attacks effectively / by Ma, Sheng-Hao, author

    Published 2023
    “…What you will learn Explore various DLL injection techniques for setting API hooks Understand how to run an arbitrary program file in memory Become familiar with malware obfuscation techniques to evade antivirus detection Discover how malware circumvents current security measures and tools Use Microsoft Authenticode to sign your code to avoid tampering Explore various strategies to bypass UAC design for privilege escalation Who this book is for This book is for cybersecurity professionals- especially for anyone working on Windows security, or malware researchers, network administrators, ethical hackers looking to explore Windows exploit, kernel practice, and reverse engineering. …”
  15. 15

    Systemizers are better code-breakers:Self-reported systemizing predicts code-breaking performance in expert hackers and naïve participants by India eHarvey, Samuela eBolgan, Daniel eMosca, Colin eMcLean, Elena eRusconi, Elena eRusconi

    Published 2016-05-01
    “…A group of naïve participants and of ethical hackers completed the Autism Spectrum Quotient, including an attention to detail scale, and the Systemizing Quotient (Baron-Cohen et al., 2001; Baron-Cohen et al., 2003). …”
    Get full text
    Article