Ethical Hacking : Roles, Phases and Impact on various sectors of the Economy

This paper will discuss the topic of ethical hacking, which is also called penetration testing. It starts by briefing about the ethical hacking introduction and its key protocols. It will further discuss the varied classifications of hacking and explain the causes for the swift rise in the cyber-crimes and their impact on socio-economic growth. The advantages and limitations of ethical hacking are also listed. It will further discuss the steps involved in ethical hacking, who is allowed to conduct ethical hacking, and its importance in order to reduce the effect of these attacks, penetration tests are highly required, to consider an acceptable solution for this task. Results from the case study shows that there are negative impacts where the society suffers from cybercrimes and why the computer or networking tools are targeted for the crimes. Ethical hacking education can provide the future professionals to combat the future cyber security issues.


I. INTRODUCTION
The world constitutes people who are connected to each other through the internet for communication and the most important factor is when information is transferred from one end to other end causes harm so it is important to secure an individual online from varied threats on online (Hacking).
Hacking refers to accessing information using a computer by either password cracker software or any other technique to get the data. The process of Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, data, or application. Ethical hack involves replicating strategies and actions of malevolent attackers. So, this kind of approach helps to identify security vulnerabilities which can then be Volume 7, Issue 6, November-December-2021 | http://ijsrcseit.com Ch.Mary Pushpa et al Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol, November-December-2021, 7 (6) : 38-43 39 resolved before a malicious attacker has the opportunity to abuse them.
Hacking experts follow four key protocol concepts: • To Stay legal. Before accessing and performing a security assessment need to have proper approval.
• To define the scope. Determining the scope of the assessment so that the ethical hacker's work will remain officially authorized and within the organization's permitted boundaries.
• Report vulnerabilities. During the assessment process notify the organization of all vulnerabilities and provide remedy or advice for resolving these vulnerabilities.
• This process is also called "information gathering". In this approach, a hacker does not attack the system or network of the company to gather information.
• Foot Printing The Phase 2 takes The Information Gathered In Phase The intruder, after gaining the access in the system or network, keeps that access for upcoming attacks by making changes in the system in such a way that other hackers or security personnel cannot then enter and access the attacked system. In such a situation, the owned system (mentioned in Phase 3) is then referred to as "Zombie System.This is called as

Zombie system
• Maintaining Access • Os BackDoors • Clears Tracks

IV. HACKERS DO AFTER HACKING
• Patch Security hole • The other hackers can't intrude • Clear logs and hide themselves • Install rootkit ( backdoor ) • The intruder once attacked the system will be able to use the system at any point of time further • It contains trojan virus, and so on V. ETHICAL HACKING Ethical hacking, which is also called as penetration testing or white-hat hacking. It involves the same tools, techniques and tricks that hackers use, but with one major difference is that Ethical hacking is legal.
• Performs almost the same activities but with owner's permission • Breaking into the computer systems by the independent computer security Professionals.
• No damage to the target systems or stealing information.
• Assess the target systems security and report about the bugs found back to owners.

Required skills for Ethical Hacking
• Breakage of independent computer Professionals into the computer systems.
• No damage to the target systems or stealing the information.
• Assess the target systems security and report about the bugs found back to owners. • To help in detection of crimes done through the internet.
• Provides security to banking and financial establishments.
• Detection and prevention of cyber terrorism.
• Everything here depends upon the credibility of the ethical hacker.

Disadvantages of ethical hacking
• Its based on the trustworthiness of the ethical intruder • Hiring professionals is expensive.
• This only provides us a summary of things in proceeding.
• Loss of sensitive information.