Cyber Attack & Ethical Hacking

Cyber Attack & Ethical Hacking

01a1] Unit 1 Assignment 1

Week 1 –

[u01d1]

Unit 1 Discussion 1

Ethical Hacking Roles and Vulnerability Management

(1-page Discussion)

Introduction

The term hacker has changed over the years and might be difficult to categorize. Likewise, the reasons for hacking are myriad. Understanding some of the most common reasons for hacking is important in defensive efforts. For example, the motivations of a hacker interested in correcting a social wrong are much different from those who use hacking as an expansion of a criminal enterprise, even if their techniques are similar. Understanding these different motivations is key to protecting an environment against attack.

An information technology professional can use skills and techniques acquired from troubleshooting operating systems and applications, and an understanding of the mindset of a hacker, to become an effective ethical hacker.

Instructions

Initiate a discussion of your concepts, ideas, and thoughts on three different groups of hackers and explain their motivations.

[u01d2]

Unit 1 Discussion 2

Laws on Ethical Hacking and Penetration Testing

(1-page Discussion)

Introduction

Ethical hackers are individuals who break into systems legally and ethically to detect vulnerabilities and determine threats that malicious outside hackers or malicious inside attackers can exploit.

Ethical hackers are bound by strict rules governing their behavior, while other types of hackers face no such constraints. The ethical hacker must work hard to earn and maintain trust. Further, since ethical hackers are placed in a position of great trust, they must always carefully consider their actions to ensure they are following the rules. Breaking the rules erodes trust and in some cases may be illegal. For these reasons, it is important for an ethical hacker to adhere to a strict code of ethics and to be knowledgeable about local laws regarding their activities.

Cases exist where an ethical hacker has become a gray hat hacker and subsequently a black hat hacker. This type of transition leaves organizations highly vulnerable. Loss of trust and legal implications are two of the major aspects that an ethical hacker should consider when breaking the rules and regulations of ethical hacking.

Instructions

Initiate a discussion of your concepts, ideas, and thoughts on three major regulations, laws, or directives that an ethical hacker should know.

The post Cyber Attack & Ethical Hacking appeared first on Homeworkshine.

No matter what kind of paper writing service you need, we’ll get it written. Place Your Order Now!