Ethical hacking Assignments

Wk 6 Writing Assignment(250 Words)

Select one network scanning software tool (there is a list in your required reading slides) and explain in detail how it works and how detects network vulnerabilities. Provide the site where you obtained your information and include that in your assignment write-up.

Wk 8 Research Assignment (250 Words)

Locate an article on a system breach (Target stores, Sony Pictures, US Government, and many more).In 2-3 paragraphs, briefly explain the situation and what kind of information was compromised. How large was the breach and how long did it take to find the problem. Include a link to any of your Internet resources.

Wk 9 Written Assignment(250 words)

Using the following link as your reference, select TWO and explain the differences

(viruses, worms, trojans, and bots).

What Is the Difference: Viruses, Worms, Trojans, and Bots?

Tasks

 

There are TWO tasks that you would need to do( they are separate): 

Task 1:

Product Idea and Search Engines/Electronic Marketing. 

After reviewing the assigned reading materials, complete the following activities:

1.  You will develop a product service idea.

      A. Describe the product/service including the benefits of using the product/service

      B. Discuss the potential customers for this product/service

2.  Based on the nature of the product/service, recommend at least 3 possible ways to market the product electronically. Your suggestions must include at least one search engine. Describe your recommendations and discuss the advantages and disadvantages of each.

TASK 2:

Write a reply to the two responses in the attached document ( Response 1 and Response 2) with 150 words for each. 

There should be no plagiarism. Attach a plagiarism report with 0 % similarity index. 

Discussion

When are VPN’s used today? Do you use a corporate or individual VPN? If so what are the benefits? Be sure to find at least one article (academic or business) and cite and reference in APA format.

Module 2 Assignment

 

Module 2 Assignment

Due: Sunday, November 1st, 2020 by 11:00 pm EST

For this assignment, complete Chapter 1 – Introduction based on the instructions provided. 

INSTRUCTIONS:

This section requires that you complete all sections of Chapter 1 as specified in the CU Research Guide 

  •  Introduction 
    • Based on the literature sources, provide a background of the research problem to be explored. Elaborate on the impact of the problem and why your research is important to pursue. Indicate what the goal of the research will be
  • Problem statement
    • As per the CU guide
  • Relevance and significance 
    • As per the CU guide
  • Research questions
    • Add no more than 2 research questions as they relate to your research focus
  • Barriers and Issues
    • As per the CU guide

Structure  – CU Research Guide
Format – APA 

Penetration testing

 Do a bit of research on penetration testing techniques. Investigate and document the following

  • Five network penetration testing techniques
  • Advantages and disadvantages of each
  • One notable social engineering test
  • Possible negative implications of penetration testing

Please write between 200 and 300 words
 

BI: Week 12 Assignment

Chapter 11- discussion question #1-4 & exercise 4

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week. All work must be original (not copied from any source).

Discussion Question 1. Explain why it is useful to describe group work in terms of the time/place framework.

Discussion Question 2. Describe the kinds of support that groupware can provide to decision makers.

Discussion Question 3. Explain why most groupware is deployed today over the Web.

Discussion Question 4. Explain in what ways physical meetings can be inefficient. Explain how technology can make meetings more effective.

Exercise Question 4. Compare Simon’s four-phase decision-making model to the steps in using GDSS.

Research Paper

 

Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762): 

  1. Important: This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.
  2. Introduction
  3. Roles and Responsibilities
  4. Incident Response
  5. Plan Activation
  6. Document History
  7. Procedures

Your paper should meet the following requirements:

  • Be approximately six to eight pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least four scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.