Preview

It530

Satisfactory Essays
Open Document
Open Document
681 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It530
Assignment Grading Rubric
Course: IT530 Unit: 5 Points: 120
Copyright Kaplan University
Unit 5 Assignment
Outcomes addressed in this activity:
Unit Outcomes:
Explain flow control and congestion management and their significance to overall network performance
Evaluate standard routing techniques and their application to a business’ internet connectivity
Recommend a comprehensive security plan
Plan and describe methods to secure data including encryption techniques and security protocols
Assess LAN communications and management protocols and examine their significance in business environments Course Outcomes:
IT530-5: Analyze issues surrounding the connectivity and administration of networks.
Assignment Instructions:
1. In recent years, the concept of “ethical” hacking has grown in importance as more companies consider hiring “black hat” hackers as security consultants. Research the elements that comprise “ethical” hacking. In what ways does ethical hacking differ from “black hat” hacking? Put yourself into the position of a system administrator considering hiring a hacker. How would you ensure that this individual was actually strengthening your company’s network security rather than hacking into your company’s sensitive data? Would you even consider hiring a hacker in the first place? Why or why not?
Try to find at least one example of a real world “ethical” hacker being hired; was it a good or bad decision on the part of the company?
2. Based on your research, write an 8 to 10 page paper that researches the concept of “ethical” hacking, as well as the ethical dilemmas inherent in hiring a hacker as a security consultant.
Preparing your Assignment
The written essay/paragraph formatted paper should be 8 - 10 pages long NOT including cover page and references. As you research ethical hacking, ALL of the pages must have citations and references. No more than one direct quotation (of 40 words or more) is allowed per page and

You May Also Find These Documents Helpful

  • Good Essays

    That is why most big businesses have hired individuals that do what hackers do, which is to find gaps or spaces in an organisations or a person’s security and report the problem or at least fix/repair the space before it gets into the hands of worse hackers, very similar as to what Uber has done recently, which was that they paid a couple of hackers to delete their own stolen data on 57 million people. This is against the law…

    • 1232 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    4. Before you conduct an ethical hacking process or penetration test on a live production network, what…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    3. What must you obtain before you begin the ethical hacking process or penetration test on a live…

    • 652 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Week 4 Assignment

    • 815 Words
    • 3 Pages

    Today, organizations need not only to understand current trends in security threats but also be able to identify inherent vulnerabilities within existing systems.For this exercise to be successful, I would suggest employing an ethical hacker – a person who is not with the company but is very knowledgeable about and can use techniques that hackers use to break into corporate networks. An ethical hacker though is not a person who does so for malicious purposes, but to analyzed and discovered the top vulnerabilities and threats that have the most potential to negatively impact to the organization for security purposes. The reason for employing someone who is not with the company for this test is simple: it is to guage the response of those in the IT department. Since the IT department is relatively small – only 12 people, it would be difficult to run this test if one of them were roleplaying the hacker from outside of the company.…

    • 815 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The use of information technology in business presents major security challenges, poses serious ethical question, and affects society in significant ways. Especially, the computer crime is a growing threat to society and is caused by the criminal or irresponsible actions of individuals who are taking advantage of the widespread use and vulnerability of computers and the Internet and other networks. It presents a major challenge to the integrity, safety, and survival of most business systems.…

    • 1690 Words
    • 7 Pages
    Better Essays
  • Better Essays

    World Phone Hacking Scandal

    • 2502 Words
    • 11 Pages

    Small, M. (2011, November/December). The Lessons of the Hacking Scandal. Information World Review, 268, 14. Retrieved from Business Source Complete database. (72887448)…

    • 2502 Words
    • 11 Pages
    Better Essays
  • Good Essays

    Never allow any type of attack, successful or otherwise to go undocumented or wasted. “If you experience an attack, learn from it,” For example, let us analyze an information security breach case of a financial corporation that caught an employee trying to steal very private company trading algorithms. Accountability and authenticity must immediately be exercised to ensure…

    • 639 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Ethics of Hacking

    • 275 Words
    • 2 Pages

    The ethical question about unlocking seems to have been answered - by governments, at least - as to say that it is the corporations' hands that need slapping, and not the consumers. If I had to define what a "hacker" was, I'd say it's someone who possesses a rare technical discipline to alter the function of another work, and the ethical discipline to do it without lying, cheating, or stealing. So the real ethical challenge to a hacker is identifying the difference between corporate greed and theft of services. Hackers are the great equalizer of a capitalist society, and when conducted ethically, hacking can be of great benefit to both the consumer and the manufacturer. They have the power to balance out corporate greed and further improve on otherwise great products. If the ethical situations concerning computer hacking could be resolved, these hackers ideas could be potentially useful and could help to further advance our technological standing in…

    • 275 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Computer Hacking

    • 1438 Words
    • 6 Pages

    Since a large number of hackers are self-taught prodigies, some corporations actually employ computer hackers as part of their technical support staff. These individuals use their skills to find flaws in the company’s security system so that they can be repaired quickly. In many cases, this type of computer hacking helps prevent identity theft and other serious computer-related crimes.…

    • 1438 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Ethical Computer Hacking

    • 1026 Words
    • 5 Pages

    "The Year Hacking Became a Business." The Australian 30 Jan. 2007: 31. Newspaper Source. EbscoHost. Pittsburgh Technical Institute. 15 Mar. 2007 <http://search.ebscohost.com/login.aspx?direct=true&db=nfh&AN=200701301031832081&site=ehost-live>.…

    • 1026 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    The concept of hacking was introduced in the 1950s and 1960s by M.I.T. engineers and was referred to as constructive, clever technical work (Mitchell, B., 2012). At that time, hacking was intended for learning activities and technical experiments, not necessarily related to computer systems. Those outside of M.I.T., began using their hacking skills for less honorable activities such as modifying telephone lines to make free, illegal, long-distance telephone calls. As the use of computers and the Internet became more popular, data networks became the most common target of hackers and hacking. Hacking is now associated with…

    • 360 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Ethical Hacker

    • 5200 Words
    • 21 Pages

    Computers around the world are systematically being victimized by rampant hacking. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything of value and completely erase their tracks within 20 minutes. The goal of the ethical hacker is to help the organization take preemptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. This philosophy stems from the proven practice of trying to catch a thief, by thinking like a thief. As technology advances and organization depend on technology increasingly, information assets have evolved into critical components of survival. If hacking involves creativity and thinking ‘out-of-the-box’, then vulnerability testing and security audits will not ensure the security proofing of an organization. To ensure that organizations have adequately protected their information assets, they must adopt the approach of ‘defense in depth’. In other words, they must penetrate their networks and assess the security posture for vulnerabilities and exposure. The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods as a Hacker. Hacking is a felony in the United States and most other countries. When it is done by request and under a contract between an Ethical Hacker and an organization, it is legal. The most important point is that an Ethical Hacker has authorization to probe the target. The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking…

    • 5200 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    Hacking has been around for more than a century. At first, the term “hacker” was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do. But because of the exploitation of these knowledge and the obsession to forbidden information, it soon became a threat to computer technology. The root of computer hacking was dated back in the early 1960’s by a group of university students, especially in M.I.T. and Stanford.…

    • 3072 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    A white hat hacker breaks security for non-malicious reasons, for instance testing their own security system. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. Often, this type of 'white hat' hacker is called an ethical hacker. The International Council of Electronic Commerce Consultants, also known as the EC-Council has developed certifications, courseware, classes, and online training covering the diverse arena of Ethical Hacking.…

    • 456 Words
    • 2 Pages
    Good Essays

Related Topics