[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

JPA Yaacoub, HN Noura, O Salman… - Internet of Things and …, 2023 - Elsevier
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …

A survey on ethical hacking: issues and challenges

JPA Yaacoub, HN Noura, O Salman… - arXiv preprint arXiv …, 2021 - arxiv.org
Security attacks are growing in an exponential manner and their impact on existing systems
is seriously high and can lead to dangerous consequences. However, in order to reduce the …

[PDF][PDF] Hacking attacks, methods, techniques and their protection measures

S Kumar, D Agarwal - … Journal of Advance Research in Computer …, 2018 - researchgate.net
As public and private associations relocate a greater amount of their basic capacities to the
Internet, criminals have greater opportunity and motivating force to access sensitive data …

Practical cybersecurity ethics: mapping CyBOK to ethical concerns

I Flechais, G Chalhoub - Proceedings of the 2023 New Security …, 2023 - dl.acm.org
Research into the ethics of cybersecurity is an established and growing topic of
investigation, however the translation of this research into practice is lacking: there exists a …

Issues of implied trust in ethical hacking

T Georg, B Oliver, L Gregory - The ORBIT Journal, 2018 - Elsevier
This paper discusses the issues of implied trust in ethical hacking. Unlike many other long-
established professions, such as lawyers, doctors, and accountants; ethical hacking is a …

[HTML][HTML] The simulated security assessment ecosystem: Does penetration testing need standardisation?

W Knowles, A Baron, T McGarr - Computers & Security, 2016 - Elsevier
Simulated security assessments (a collective term used here for penetration testing,
vulnerability assessment, and related nomenclature) may need standardisation, but not in …

[HTML][HTML] El delito de espionaje informático: Concepto y delimitación

L Mayer Lux, J Vera Vega - Revista chilena de derecho y tecnología, 2020 - SciELO Chile
El artículo analiza el delito de espionaje informático, con énfasis en su concepto y
delimitación. Con dicha finalidad, parte examinando brevemente su injusto en relación con …

A guide to penetration testing

A Tang - Network security, 2014 - Elsevier
The sophistication of organised cyber-criminals has evolved dramatically in recent years–to
the point that it's now not a question of whether businesses will be hacked, but when. It is …

First broad and systematic horizon scanning campaign and study to detect societal and ethical dilemmas and emerging issues spanning over cybersecurity solutions

A Pawlicka, M Choraś, R Kozik, M Pawlicki - Personal and Ubiquitous …, 2023 - Springer
Cybersecurity and cybercrime cannot exist without each other. They are not contraries, but
rather two opposite poles of the same idea. Although it may seem that it is a rather black and …

Ethical Social Media Marketing in Africa

RE Hinson, KK Twum, E Arhin - Digital Business in Africa: Social Media …, 2022 - Springer
Consumer perception of ethical standards in the use of social media marketing determines
trust and loyalty. Social media marketing in Africa is a dominant marketing channel and …