Anda di halaman 1dari 44

PROJECT REPORT

ON

“MARKET STUDY OF ETHICAL HACKING"

Submitted in Partial Fulfillment for the Award of the


Degree of Bachelor of Business Administration
(Banking & Insurance)
(2008 – 2011)

Under the guidance of: Submitted by:


Mrs Usha Nair Gaurav Juneja
Faculty, MAIMS 0461471808
V SEMESTER

MAHARAJA AGRASEN INSTITUTE OF MANAGEMENT


STUDIES
(Affiliated to Guru Gobind Singh Indraprastha University, Delhi
PSP Area, Plot No. 1, Sector 22, Rohini Delhi 110086)
TABLE OF CONTENTS

Student declaration………………………………………………………..i

Certificate from Company/Organization …………………………………ii

Certificate from Guide…………………………………………………….iii

Acknowledgement…………………………………………………………iv

Executive Summary………………………………………………………..v

Chapter Scheme……………………………………………………………vi

Page no.

CHAPTER 1- INTRODUCTION

1.1 Purpose of the study………………………………………………..

1.2 Research Objectives of the study…………………………………..

1.3 Research Methodology of the study……………………………….

1.3.1 Research Design……………………………….

1.3.2 Data Collection …………………..

1.3.3 Research design

1.3.3.1 Population…………………………………………

1.3.3.2 Sample size………………………………………..

1.3.3.3 Sampling technique……………………………………..

1.3.4 Method of data collection……………………………

1.3.4.1 Instrument for data collection…………………………

1.3.5 Limitations ………………………………………….


CHAPTER -2

About the Organization / Company Profile……………………………………………

CHAPTER -3
Findings and Analysis……………………………….
…………………………………………………….

CHAPTER -4
Suggestions………………………….…………………………………………………….

CHAPTER -5
Conclusion ……….…………………………………………………….

Bibliography

Annexures

Miscellaneous

Evaluation Attendance Sheet

Schedule for Project Completion.


STUDENT UNDERTAKING

This is to certify that I have completed the Summer Training Project titled “market

study of ethical hacking” under the guidance of “Mrs Usha Nair” in partial fulfillment

of the requirement for the award of degree of Bachelor of Business Administration at

Maharaja Agrasen Institute of Management Studies, Delhi. This is an original piece of

work & I have not submitted it earlier elsewhere.

GAURAV JUNEJA
CERTIFICATE

This is to certify that the summer training project titled “Market study of

ethical hacking” is an academic work done by “GAURAV JUNEJA”

submitted in the partial fulfillment of the requirement for the award of the

degree of Bachelor of Business Administration (banking & insurance) from

Maharaja Agrasen Institute of Management Studies, Delhi, under my

guidance & direction. To the best of my knowledge and belief, the data &

information presented by him in the project, has not been submitted earlier.

Mrs. USHA NAIR


CERTIFICATE FROM THE COMPANY/ORGANISATION
(On Company Letter Head)

This is to certify that (name of the student) son/daughter of (name of the

father) pursuing BBA from Maharaja Agrasen Institute of Management

Studies , Delhi has successfully completed Summer Training Project in our

organization on the topic titled, “(Name of the topic)” from _____________

to_________200X.

During his / her project tenure in the organization/company, we found

him/her hard working, sincere and diligent person and his/her behavior &

conduct was very good during the project.

We wish him/her success for his/her future endeavors.

Signature of the issuing authority

Name of the issuing authority

Designation of the issuing authority

• DESIRED FORMAT, THE COMPANY CAN ISSUE IT ON OTHER FORMAT, IF ANY.


ACKNOWLEDGEMENT

Before we get into thick of the things, I would like to add a few heartfelt words for the
people who were part of this project in numerous ways, people who gave unending
support right from the stage the project was conceived. I wish to express my deep sense
of gratitude to Innobuzz Knowledge Solutions and its officials, especially Mr. Ankit
Oberoi (MD), Mr. Atul Aggarwal (Manager, Network Security Department) and Mr.
Deepesh Madan (BM). I also thank to my project guide Mr. Surender Khatri & Ishan
Girdhar. I would like to extend my thanks to all the officials in the divisions of
Information Security. I would also like to thank the faculty and staff of my college,
Maharaja Agrasen Institute Of Management Studies, especially Mrs Usha Nair for
guiding me at each step.
EXECUTIVE SUMMARY

This project is an attempt to study the market of ethical hacking.


Ethical hacking is basically use of hacking skills by an ethical hacker for defensive
purposes.
A project survey has been done to collect data about the awareness level of people about
ethical hacking and its related issues. For this, the use of questionnaire was made.
Respondents were asked about there involvement with hacking issues, there awareness
about ethical hacking, and about use of internet.
All the respondents here are students aged 18-23.
This project tries to analyze the answers of respondents and judge its relation with the
market study of ethical hacking.
CHAPTER SCHEME

CHAPTER-1:- INTRODUCTION

THIS CHAPTER INCLUDES:


PURPOSE - To know the awareness level of respondents about hacking and information
security issues.

OBJECTIVE - To know the whole segment of people who are interested in ethical
hacking courses.
.

CHAPTER-2 COMPANY PROFILE

This chapter includes the company profile of innobuzz knowledge


solutions ltd. It includes the history, aim, achievements, etc. of the company. It also
includes the basic definitions of the some of the terms related with the project.

CHAPTER-3 FINDINGS AND ANALYSIS

This chapter shows the collected data and its analysis in an understandable
form.

CHAPTER-4 SUGGESTIONS

This chapter includes the suggestions to the company after data analysis.
CHAPTER-5 CONCLUSION

This chapter concludes the overall study.

CHAPTER-1
INTRODUCTION

PURPOSE OF THE STUDY

The purpose behind the market study of ethical hacking is to know the awareness level of
people regarding hacking and information security issues. It helps us to know whether
they would be interested in various ethical hacking courses offered by organizations like
innobuzz knowledge solutions ltd.

The people interested in ethical hacking courses are the potential customers for the
various business organizations which provide training in these courses.
Also, all those potential customers form the market of ethical hacking.
RESEARCH OBJECTIVES OF THE STUDY

Objective behind the market study of ethical hacking is:

 To know the whole segment of customers who are interested in training programmes
of ethical hacking.

 To know the awareness level of customers about hacking and information security
issues.

 To know the customers perception towards different courses offered.


RESEARCH METHODOLOGY

1. RESEARCH DESIGN:-

Descriptive research design has been used in this study to collect data for
analysis of the awareness level of assesses. The research design used help in
generating qualitative information from the study.

2. DATA COLLECTION:-

The data or the information collected through the descriptive research design
for the study is primary in nature i.e. the information is collected from primary
resources rather than secondary resources. Survey has been conduced for
collecting the primary data from its sample.

REASEARCH DESIGN

Descriptive design has been used to collect information or data from the samples.

1. POPULATION:-

Population here refers to those individuals who reside in Delhi, India . The individuals
should be literate or well educated.

2. SAMPLE SIZE:-
Sample size refers to the actual units used from the population of a particular study for
the purpose of collecting data or information for the analysis of the data to complete the
study. Here the sample size is very small in accordance to its population. The sample size
is of 100 samples from the population.

3. SAMPLING TECHNIQUE:-

Probability sampling technique has been used to conduct the study where each unit of
population has equal chance of being selected. Probability of each unit is equal and there
is no bias on the selection procedure of the samples. Random sampling which is a type of
probability sampling is used in this project. Randomly means that each unit drawn from
the population to form sample have equal chance of being drawn. Therefore, random
sampling technique is used to collect the sample size.

DATA COLLECTION

For study, the data is collected from primary sources and not from secondary sources.
Primary sources are those where the information is collected at the time of the study and
is an original source of information. It has been collected by the researcher from the
sample at the time of the study.

I. METHOD OF DATA COLLECTION:-


Method used for collecting data from sample size is questionnaire method. In this
method, the researcher for collecting the data make a series of questions that needs to be
answered by the sample unit. This series of questions is known as questionnaire. It
consists of only those questions that are related to the study. Questionnaire records the
responses of the sample unit and provide useful information for its analysis and
interpretation.

II. INSTRUMENT FOR DATA COLLECTION:-

QUESTIONNAIRE

LIMITATIONS

Limitations for collecting the data are:-

1. The sample size is very less or negligible in respect of the population size and
therefore won’t be able to present the whole population.

2. Due to small sample size the information collected may not prove beneficial for the
analysis and interpretation of the data.
3. The questionnaire designed to gather data is not appropriate as it does not cover all the
essential elements that are required in the study.

CHAPTER
2
COMP
ANY
PROFILE

INNOBUZZ KNOWLEDGE SOLUTIONS

Innobuzz is headquartered at Delhi, India with strong presence in Australia, United


State of America and Canada, apart from many other countries. The main activity of
Innobuzz is providing training in Information Security, which is delivered to its
audience all over the world via Computer Based Training Courses, Onsite Training
Programs and Company Owned learning centers.

Pioneers in High Knowledge Domains

Apart from Information Security, they have been actively involved in


training and
implementation in many other High Knowledge Domains. Some of
them are:
PHP/MySQL
Ruby-on-Rails
Online Marketing / SEO
Technical and Fundamental Analysis of Stock Markets

Aim

Information Security is still a less explored field in the Indian technical


domains. They aim
to impart practical knowledge in Information Security and Ethical
Hacking to the
budding technical workforce of the country. Information Security is the
need of the day,
and people having such skills are very much in demand. We aim to bridge
the gap
between the demand and supply of Information Security professionals.
Active Participation in Various Initiations

We have also has been supporting and actively participating various National Level
Information Security Seminars and Summits such as EliteX 2008 organized by
Department of Information Technology (Govt. of India), Security Vision 2008 (an
IDG Initiative), NASSCOM Security Summit, 2 Day National Seminar on
Information Security at Delhi College of Engineering, Training Workshops in
Modern School, Central Bureau of Investigation and IIT Delhi, IMS Ghaziabad
Etc.

Industry Tie-Ups

We have strong linkages with the industry. Being partners with organizations like
Microsoft Corporation, IBM, HP and Symantec, we have conducted training
programs in many big corporate houses of India. Innobuzz has been training and
certifying experts in Ethical Hacking and Information Security with its Certified
Information Security Expert (CISE) certification. In the short span of less than
two years, we have catered to over 5500 students in Information Security alone.
Clients

Innobuzz has provided its services to some of the best colleges in India. Included in there
Client list are names such as IIT Delhi, Delhi College of Engineering, St.
Stephens College, Faculty of Management Science, Ambedkar Institute of
Technology, Modern School Barakhamba, Delhi Public School etc.
Some of Our Corporate Clients are DLF India, IBM, Spice Jet, Computer Society
of India, Colt Telecom, Fidelity Investments, Arya Ventures, Dewsoft, L&T,
Godrej, FICCI, Govt. Of India and many more.

Achievements

.: Trained more than 12,000 Students globally.


.: Presence in more than 20 Countries via there Distance Learning Programs.
.: Having Centers Across India including cities such as Delhi, Mumbai, Pune &
Hyderabad.

.: Made Clients including Government of India, FICCI, Colt Telecom, Fidelity


Investments, DLF, IBM, Microsoft, etc.
.: Conducted Training Programs for IIT Bombay, IIT Delhi, IIT Kharagpur, NIT
Trichy, BITS Pilani, BITS Goa, FMS Delhi, Delhi College of Engineering, St.
Stephens College, etc.

Course Description

The course is designed for people who have theoretical knowledge of basic concepts
about networking & the internet. This course will provide detailed & practical
knowledge
on various hacking concepts. The course will be followed by an exam, clearing in which
student become a Certified Information Security Expert (CISE)
CISE (Certified Information Security Expert) certification is one of the most recognized
Indian certification in Information Security and Ethical Hacking. The Program covers all
aspects of Information Security and Ethical Hacking, enabling one to become an
Information Security Expert. Online Security Breaches are happening at a very fast rate
and experts are needed to check and cure these. ITS (IT Security) Experts are in
demand. According to NASSCOM, the demand for ITS Experts will be 10 Lakh by 2011

in India. ITS is a THE next big thing in IT and one should make the best of it.

In today's scenario, everything depends on IT. From tax collections, booking the cheapest
airline tickets, banking online to trading shares online. If one is not a
Chapter of IT revolution yet, he is missing on a lot of ease and opportunities. But as
they say, everything comes at a price, and the price one pays here is risking his privacy
and probably his bank balance! Online Security Breaches are happening at a very fast
rate and experts are needed to check and cure these. The demand for IT Security
Professionals is expected to be 1 million by 2011.
DEFINITIONS

• Hacker – refers to a person who enjoys learning the details of computer systems
and stretch their capabilities.

• Hacking – describes the rapid development of new programs or reverse


engineering of already existing software to make the code better and efficient.
• Cracker – refers to a person who uses his hacking skills for offensive purposes.

• Hactivism – refers to an act of hacking in order to communicate a politically or


socially motivated message. An Internet enabled way to practice civil
disobedience and protest.

• Ethical Hacker – refers to security professional who apply their hacking skills
for defensive purposes on behalf of its owners.

• Ethical hacking — also known as penetration testing or white-hat hacking —


involves the same tools, tricks, and techniques that hackers use, but with one
major difference: Ethical hacking is legal. Ethical hacking is performed with the
target’s permission. The intent of ethical hacking is to discover vulnerabilities
from a hacker’s viewpoint so systems can be better secured. It’s part of an overall
information risk management program that allows for ongoing security
improvements. Ethical hacking can also ensure that vendors’ claims about the
security of their products are legitimate.

CHAPTER
3
FINDINGS &
ANALYSIS

1. Do you use Internet?

YES- 98% NO- 2%


ANALYSIS- As per the information collected through the survey, it was found that 98%
of the respondents use internet. It is a positive response as the market of ethical hacking
would include the people who use internet frequently and 98% is a strong response for it.
Ethical hacking is directly related with the internet as hacking skills are most often
performed in the internet. So it is obvious that people who use internet would want to be
safeguarded from evil hackers. Also the people who would want to become ethical
hackers would be frequent users of internet.

2. Do you have any E-Mail account ?

YES-98% NO-2%

Analysis- As per the information collected through the survey, it was found that 98% of
the respondents have e-mail accounts. It shows how involved the respondents are in
internet. The people who would want to secure personal information would want to learn
ethical hacking.
Personal information basically comprise of e-mail accounts and bank accounts , etc.
There would be many who would want to secure there e-mail accounts and would want to
learn ways of doing it.
Hence, It is important to know whether respondents have e-mail accounts or not as it
would eventually show whether they would be interested in ethical hacking or not.

3. On which Portal you have your E-Mail account?

Yahoo-61% G mail- 24%


Rediff-7% Others-8%

Analysis- - As per the information collected through the survey, it was found that over
60% of the respondents have e-mail accounts on yahoo portal. It shows that majority of
people are grabbed by yahoo. Though yahoo has a good name in the portal segment, but
even it can be infiltrated by hackers. It is a fact that no portal is safe from evil hackers.
Also, it has been seen in the past that e-mail accounts of celebrities being hacked and
there personal information being taken.
This question in a way shows that how involved people are in internet and in which portal
they own there account.

4. Do you have a personal computer/laptop?

YES-83% NO-17%

Analysis- As per the information collected through the survey, it was found that 83%
of the people own there computer systems. The people who own there computer
systems are the ones who are more involved in internet related activities. Hacking is
an internet related activity and it is more known to those who own there systems and
use it frequently.
Also, the market of ethical hacking would involve more of those people who own
there computer systems.

5. At which place do you usually use internet

Home-69% institute/college/workplace-13%

cyber café-11% other places-7%


Analysis- As per the information collected through the survey, it was found that
almost 70% of the respondents use internet at there homes. It is a fact that people who
use internet at there homes are more interested in securing there personal information
as they are more involved in internet related activities.
The people use internet at there colleges or workplace are most often those who use
internet for work reasons.
The people who use internet at cyber cafes are most often those people who rarely use
internet.
Hence, most of the respondents using internet facilities at there homes is a positive
response as market of ethical hacking would most often involve those people who use
internet at homes.

6. Do you know the meaning of “Hacking”?

YES-78% NO-6% Cant Say-16%

Analysis- As per the information collected through the survey, it was found that 78% of
the people know the meaning of hacking. Though many of the respondents who feel that
they know the meaning are not clear about what hacking really is. As a matter of fact,
market of ethical hacking would involve those people who know the meaning of hacking.
Hence, majority of respondents knowing the meaning of hacking is a positive response.

7. Do you think that Hacking can be Ethical?

YES-36% NO-64%
Analysis- As per the information collected through the survey, it was found that just 36%
believe that hacking could be ethical. It shows the scope of market of ethical hacking as
most of the respondents are unaware of the fact that hacking could be ethical. Ethical
hacking basically is use of hacking skills by an ethical hacker for defensive purposes.
Most of the respondents are unaware of ethical hacking, and spreading awareness among
them about ethical hacking and its various courses offered could expand the market of
ethical hacking.
It can be said that its negative and as well as positive point that most of the people are
unaware of hacking being ethical. People being unaware about ethical hacking increases
the scope of ethical hacking, so it is a positive point. Only 36% respondents think that
hacking could be ethical shows the low level of awareness among them. Also, it would
mean that less number of people would be interested in ethical hacking courses as less
number of people feel that hacking could be ethical. Hence, it is a negative point as well.

8. Do you know the difference between Hacking and Cracking?

YES-9% NO-91%
• Analysis- As per the information collected through the survey, it was found that a
meager 9% of the respondents know the difference between hacking and cracking.
It shows that they are unaware about basic hacking definitions. It also shows there
low level of knowledge about hacking. Hacking – describes the rapid
development of new programs or reverse engineering of already existing software
to make the code better and efficient.

Cracker – refers to a person who uses his hacking skills for offensive purposes
People generally misunderstand hacking as cracking. Cracking is use of hacking skills for
offensive purposes , while people think hacking is an offensive activity.
Most of the people do not know about cracking. Thus, there is a lot of scope in the market
of ethical hacking as majority of respondents are unaware about it .

9. Do you think only E-Mail account can be Hacked?

YES-92% NO-8%

Analysis- As per the information collected through the survey, it was found that over
90% of the respondents feel that e-mail account can be hacked. It is a positive result as it
is true. E-mail accounts are easy to hack for the high skilled crackers.

The respondents would be interested to know the ways of securing there e-mail accounts
and personal information. Telling them about ethical hacking would definitely generate
there interest. Most of the respondents would be interested in learning the ways of
securing information.
Thus, those respondents would be the potential customers of the organizations like
innobuzz knowledge solutions . It can be said that those potential customers depict the
market of ethical hacking.

10. Has your account ever got Hacked?

YES-5% NO-95%

Analysis- As per the information collected through the survey, it was found that 5% of
the respondents has experienced there account being hacked.
These 5% people would be the definite people who would want to learn to secure there
personal accounts and information.
These respondents would be a part in the market of ethical hacking as they would be
interested in the different courses offered of ethical hacking.

11. Do you think Hacking can cause damage to you in Monetary terms?

YES-67% NO-13% Cant Say-20%


Analysis- As per the information collected through the survey, it was found that 67% of
the people feel that hacking can cause damage to them in monetary terms. It is known to
the most of the respondents that hacking is a serious issue which could cost them in
monetary terms. Hacking of bank accounts can lead to loss of money from bank account.
It’s a positive result that most of the respondents feel that hacking can cause monetary
loss to them because it shows there awareness about severity of losses through hacking.
Also, it can be said that majority of respondents would be interested in ethical hacking
and its courses, as they would want to learn to tackle evil hackers.
The whole lot of respondents who are interested in learning ethical hacking are a part of
market of ethical hacking.

12. Who would you approach if in case your account got hacked?

Local Police-34% computer professional-43% no one-23%

Analysis- As per the information collected through the survey, it was found that most of
the people would approach a computer professional if there account got hacked(43%).
Also, a significant number of respondents(34%) opted to approach the local police.

According to law, cyber crimes like account hacking are punishable. So, it is a good step
to approach the police. But a computer professional who is an expert in ethical hacking
could even examine how the account got hacked.
Here, it can be seen that respondents would approach professionals for solving there
cyber problems.
Hence, it can be said that a considerable number of respondents would be interested in
ethical hacking courses in order o tackle cyber crimes.

13. Do you think that your local Police would be of any use if your account has
been hacked?

YES-21% NO-69% May Be-10%

Analysis- As per the information collected through the survey, it was found that almost
70% respondents feel that local police would be of no help. According to information
technology act 2000 any cyber crime like account hacking are punishable under law. So,
to approach the police would be a right step, but a majority number of respondents do not
feel the same as they don’t trust the police in solving cyber crimes, and also among them
are people who are unaware about the information technology act.

14. Are you aware of IT Act 2000?

YES-14% NO-86%
Analysis- As per the information collected through the survey, it was found that 75% of
the respondents are unaware about the information technology act, 2000. According ti IT
Act 2000, any cyber crime like hacking e-mail accounts are punishable under Indian
laws.
Three in four respondents are not aware about IT Act 2000. It gives a strong message
depicting the level of unawareness about cyber crimes and laws against them.
It shows that people need to learn about these issues and ethical hacking courses are a
good prospect for them. These respondents would form a part of market of ethical
hacking.

15. Would you like to know the ways to make your system more secure?

YES-74% NO-26%

Analysis- As per the information collected through the survey, it was found that over
80% of the respondents are interested in knowing the ways to make there system more
secure. It is a positive response as more number of respondents would be interested in
learning to secure information and ethical hacking. These respondents could be the
potential customers of ethical hacking trainers like innobuzz.. They all would form a part
of market of ethical hacking.
CHAPTER
4
SUGGESTIONS
SUGGESTIONS

 Marketing: Innobuzz knowledge solutions ltd. Should do more aggressive


marketing in order to capture the eye of more and more people.
As most of the people are unaware about ethical hacking and information
security, so they should adopt more aggressive marketing measures to sell these
services

 Company should promote the concept of Ethical Hacking and Information


Security and should collaborate with some companies to extend there working
efficiency.
By collaborating with other companies, it would be able to expand its reach to
new customers and new places.

 Company should alter its training programs /courses according to the needs of the
customers. It would make the courses more customer friendly. Also, it would
result in increased productivity.

 Company should tell the customers about their System and Information Security
so that they can self analyze that there is no unethical information are being used.
 Company should make the website where customers can put there views and
show what actually they want. It would give the customers a chance to tell what
they think and what should be introduced.
They should also use effective ways of advertising like computer based
magazines where they would find more people interested in there training
programs.
CHAPTER
5
CONCLUSION
CONCLUSION

This study indicates that awareness level of most of the people is low reharding
ethical hacking. It shows that they are willing to learn new ways of securing there
systems. Also, it is seen that there is a wide scope of ethical hacking, as more
number of people are unaware about it and need to learn it. According to
NASSCOM, the demand of IT Security professionals is expected to be one
million by 2011.

INNOBUZZ KNOWLEDGE SOLUTIONS LTD. is gaining experience year to


year and its effective sale of services shows its efficiency and demand. Also, it
needs to adopt good marketing strategies to further expand its business. It still has
a long way to go , though, it is established in various cities like Delhi, Kolkata,
Vishakhapatnam, etc. and even in foreign countries.

To conclude, there is a vast scope of ethical hacking in India and there is a need of
more IT Security companies like Innobuzz in India.
BIBLIOGRAPHY

Books Referred:

1. Hacking Dummies

By Kevin Beaver

2. Network Security : A Hacker’s Perspective

By Ankit Fadia

3. The Happy Hacker

By Kevin Metnick

4. Hacking Expose

By Kurtz

Website Referred:

 www.innobuzz.in
 www.hackersden.com
 www.hackingtruths.in
 www.onlineaccount.co.in
 www.go4expert.com
ANNEXURE

Query form
(ONLINE)

Name : *

Address : *

City : *

State : *

Country : *

Telephone No. : *

Fax :

E-Mail ID : *

Information Required : *
(limited to 50 words)

SUBMIT RESET
QUESTIONNAIRE
(FORM)

………………………………………………………………………………

Name of respondent :

Contact no. :

City :

State :

Country :

E-mail ID :

………………………………………………………………………………

1. Do you use Internet?

YES NO

2. Do you have any E-Mail account ?

YES NO

3. On which Portal you have your E-Mail account?

Yahoo En Gmail

Rediff AOL

Others
4. Do you know the meaning of “Hacking”?
YES NO

5. Do you think that Hacking can be Ethical?

YES NO

6. Do you know the difference between Hacking and Cracking ?

YES NO

7. Do you think only E-Mail account can be Hacked?

YES NO

8. Has your account ever got Hacked?

YES NO

9. Do you think Hacking can cause damage to you in Monetary terms?

YES NO

10.Would you approach your local police in case your account got
hacked?

YES NO

11.Do you think that your local Police would be of any use if your
account has been hacked?

YES NO

12.Are you aware of IT Act 2000?


YES NO

13.Would you like to know the ways to make your system more secure?

YES NO

14. According to you learning Ethical Hacking is important because

__________________________________________________________

__________________________________________________________

__________________________________________________________

(Thank you for your cooperation)

Anda mungkin juga menyukai