Review on Ethical Hacking and its Relationship with Artificial Intelligence

Versions

PDF (Español (España))

Keywords

Hacking
ethical hacking
artificial intelligence
machine learning
malware
regulatory framework Hacking
hacking ético
inteligencia artificial
malware
marco regulatorio
aprendizaje automático

How to Cite

Ardila Osma, J. A. ., Salcedo Gonzalez, E. F. ., Pedraza Aguirre, C. A. ., & Saavedra, M. (2021). Review on Ethical Hacking and its Relationship with Artificial Intelligence. Reto, 8(1), 11–21. https://doi.org/10.23850/reto.v8i1.3064 (Original work published February 11, 2021)

Abstract

This document provides an overview of the main characteristics of ethical hacking processes as a computer security tool applying artificial intelligence (AI), taking into account that the adoption of information protection strategies in organizations is no longer a luxury that only some adopt, but practically a requirement that takes into account the need to counteract risks in local networks and the Internet. AI is a technological paradigm that is increasingly used in industry and organizations to support their processes and has become so relevant that refusing to use it will imply significant difficulties in the medium term to keep up with the demands and not stay relegated from the future. The structure of the document is made up of several sections, first the definition and the historical origin of hacking and ethical hacking are presented, then the concept of artificial intelligence and its relationship with ethical hacking, its most used algorithms and its advantages and disadvantages. Disadvantages The current context of ethical hacking at global and local level, as well as its regulatory framework, is detailed below; then the main vulnerabilities detected in ethical hacking are mentioned, brief recommendations are presented and finally the most relevant conclusions are shown.

https://doi.org/10.23850/reto.v8i1.3064
PDF (Español (España))

References

:2012, I. T. (2012, 12). ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection. 18. Retrieved from http://www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.htm?csnumber=43755

Andes, U. d. (2019). Inteligencia artificial. Contacto, 6.

Asobancaria. (2018, 08 06). Retos de Colombia en ciberseguridad a proposito de la adhesión al "Convenio de Budapest". Semana Económica 2018(1148), 1,2,5,6. Retrieved 06 20, 2020

BBC. (2015, 10 11). BBC.COM. Retrieved from https://www.bbc.com/mundo/noticias/2015/10/151007_iwonder_finde_tecnologia_virus_stuxnet

Blum, R. (2007, Marzo 25). Course Hero. Retrieved Junio 04, 2020, from Course Hero: https://www.coursehero.com/file/29043414/BT-INS-IT-Industry-Survey-Ethical-Hackingpdf/

Blum, R. (2007, 03 27). ETHICAL HACKING.

Chas, A. (2019). AURA PORTAL.

Chas, A. (2020, Mayo 15). AURO PORTAL. Retrieved Junio 08, 2020, from AURO PORTAL: https://www.auraportal.com/es/que-es-la-inteligencia-artificial/

Floridi, L. y. (2016). ¿Qué es la ética de los datos? Transacciones filosóficas de la Royal Society A: Ciencias Matemáticas, Físicas e Ingeniería(374(2083)). Retrieved 06 06, 2020, from https: //doi.org/10.1098/ rsta.2016.0360

González, R. C. (2019). eHack. Retrieved 06 29, 2020, from Las fases del Hacking Ético: https://ehack.info/las-fases-del-hacking-etico/

Grupo Funcional de Seguridad Informática, U. (2018, 07 27). Nueva modalidad de delitos informáticos en Colombia. Retrieved 06 29, 2020, from Nueva modalidad de delitos informáticos en Colombia: https://noticias.unad.edu.co/index.php/gidt/2333-nueva-modalidad-de-delitos-informaticos-en-colombia

Integra, N. (2020, 01 17). NEXUSINTEGRA. Retrieved from https://nexusintegra.io/es/blog/ventajas-y-desventajas-de-la-inteligencia-artificial/

Integra, N. (2020, Enero 17). Nexusintegra.io. Retrieved Junio 10, 2020, from Nexusintegra.io: https://nexusintegra.io/es/blog/ventajas-y-desventajas-de-la-inteligencia-artificial/

luz, S. d. (2015, 09 17). REDES ZONE. Retrieved from https://www.redeszone.net/2015/09/17/descubren-varios-routers-cisco-infectados-por-synful-knock-un-malware-oculto/

M., J. E. (2019, 10 16). IMPACTO TIC. Retrieved from https://impactotic.co/hacking-etico-y-ciberdelincuentes/

MinTic. (2019, 10). Ministerio de Tecnologías de la Información y las Comunicaciones . Retrieved from Estándares de la Industria: https://www.mintic.gov.co/arquitecturati/630/propertyvalues-8158_descargable_2.pdf

MOYA, R. (2016, Marzo 25). Jarroba. Retrieved Junio 10, 2020, from Jarroba: https://jarroba.com/que-es-el-clustering/

Moya, R. (2016, 03 25). Jarroba.com.

Orozco, F. J. (2016, 11 12). Prezi.com. Retrieved from https://prezi.com/yg8sd8sbe-jm/historia-de-hacking/

Osorio, F. V. (2016, Noviembre 12). Prezi. Retrieved Junio 09, 2020, from Prezi: https://prezi.com/yg8sd8sbe-jm/historia-de-hacking/

P., R. S. (2019, 07 20). SEGURIDAD DIGITAL EL MERCURIO. Retrieved Junio 08, 2020, from https://seguridaddigital.emol.com/noticias/hacking-etico/la-inteligencia-artificial-y-la-automatizacion-del-hacker/

Parraga, A. C. (2017). ANÁLISIS DE LOS DELITOS INFORMÁTICOS EN EL ACTUAL SISTEMA. Retrieved 06 20, 2020, from https://repository.unilibre.edu.co/bitstream/handle/10901/11041/AN%C3%81LISIS%20DE%20LOS%20DELITOS%20INFORM%C3%81TICOS%20EN%20EL%20ACTUAL%20SISTEMA%20PENAL%20COLOMBIANO%20revisado%20NHJ%20OK.pdf?sequence=3&isAllowed=y

Rouse, M. (2017, Abril 27). TechTarget. Retrieved Junio 10, 2020, from TechTarget: https://searchdatacenter.techtarget.com/es/definicion/Inteligencia-artificial-o-AI

Rouse, M. (2017, 04). TechTarget 20.

Solís, S. M. (2018, Abril 24). ICEMD. Retrieved Junio 09, 2020, from ICEMD: https://www.icemd.com/digital-knowledge/articulos/que-es-hacking-etico-en-que-marco-legal-se-mueve/

Solís, S. M. (2018, 04 24). ICEMD ESIC. Retrieved from https://www.icemd.com/digital-knowledge/articulos/que-es-hacking-etico-en-que-marco-legal-se-mueve/

Taddeo, M. (2014b). La lucha entre libertades y autoridades en la era de la información. Ciencia y Etíca de la Ingenieria. Retrieved 06 14, 2020, from https://doi.org/10.1007/s11948-014-9586-0

Taddeo, M. (2017a). Los límites de la teoría de la disuasión en el ciberespacio. Filosofía y Tecnología. Retrieved 6 6, 2020, from https://doi.org/10.1007/s13347-017-0290-2

Taddeo, M. y. (2018b). Cómo la IA puede ser una fuerza para el bien. Ciencia(361(6404)), 751-752. Retrieved 06 14, 2020, from Ciencia: https://doi.org/10.1126/science.aat5991

Yucatan. (2018, 05 19). Yucatan.com.mx. Retrieved from https://www.yucatan.com.mx/tecnologia/ventajas-desventajas-la-inteligencia-artificial

Yucatan, D. (2018, Mayo 19). yucatan.com.mx. Retrieved Junio 10, 2020, from yucatan.com.mx: https://www.yucatan.com.mx/tecnologia/ventajas-desventajas-la-inteligencia-artificial

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Copyright (c) 2020 Revista RETO

Downloads

Download data is not yet available.