Explain your method of attack and operation

Assignment Help Management Information Sys
Reference no: EM131570329

Case Study: The Ethical Hacker

Imagine for a moment that you are a hacker; an ethical one. You are called upon by law enforcement based on your expertise to hack into a network of a business known to be launching crimes against humanity as its primary mission for operation and capital gain. Assume you are not to be concerned with any politics of the job and your actions are legal and ethically justified.

This nefarious business takes its own security seriously and therefore has implemented several forms of network security such as firewalls, Web proxies for its Web gateways, and VPNs for remote users. You also know that this business exists much like any normal corporation, renting several floors of office space to accommodate between 100-200 employees.

Also imagine that the business's entire network topology is located in that same location. Your goal is to infiltrate the security enough to find evidence included in the local MSQL database. You need to remain anonymous and operate within the reasonable parameters of the law.

Write a four to five (4-5) page paper in which you:

Explain your method of attack and operation within reasonable parameters of the law.

Discuss specific malware, social engineer, or any other type of attacks you would deploy to achieve your desired goals.

Assess the hurdles you expect and how you plan to overcome them.

Determine how you would remain anonymous without blowing your cover.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Explain the essentials of Transmission Control Protocol / Internet Protocol (TCP / IP) behavior and applications used in IP networking.

Explain the concepts of network security and associated ethical issues in addressing exploits.

Use technology and information resources to research issues in network security design.

Write clearly and concisely about Advanced Network Security Design topics using proper writing mechanics and technical style conventions.

Reference no: EM131570329

Questions Cloud

Draw a picture of death : If that child asked you to draw a picture of death could be a grandparent or animal what would you put in that pictures
Calculate the project return on investment : ACT 5140 - Accounting for Decision Makers. Consider the following information about a potential project: Calculate the project's return on investment
Mass communication theory literature review : Your final research paper for this class must be related to mass communication theory. For this assignment, you will conduct a relevant literature review
How would your projected financial performance change : How would your projected financial performance change if sales fall 20% short of or are 20% higher than your base assumption?
Explain your method of attack and operation : Explain your method of attack and operation within reasonable parameters of the law.Assess the hurdles you expect and how you plan to overcome them.
What is the stimulus error : Describe the difference between experience as independent of the experiencing person and experience as dependent on the experiencing person
Survey of communication study-organizational communication : In one of the readings, "Survey of Communication Study, Organizational Communication", we have reviewed the five theoretical perspectives
Explain how negative reinforcement may play a role in drug : Explain how negative reinforcement may play a role in drug abuse
Describe the levels of management : Sparks is a leading train consultancy company that has been in the top ranks for more than 20years since its operations nationwide.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Identify cyber security risk components

Describe the challenges and benefits of implementing a cyber security risk mitigation strategy for a real or fictional company.

  Identify multiple business pressures on xerox

Describe some of the company's response strategies. Identify the role of IT as a contributor to the business technology pressures (for example, obsolescence).

  Explain offshore outsourcing for software development

Tablets Take Their Place in the PC Market - What will happen to offshore outsourcing for software development? Can outsourcing firms in India and China for example be expected to develop software systems for use in U.S. schools?

  Describe the evolution of the technology and the impact

Think of a technology that has evolved, or is evolving that has an impact on your business, your organization, or an industry you are familiar with. Describe the evolution of the technology and the impact

  Describe the proper procedures and policies

Describe the proper procedures and policies that would be implemented specific to the DR team personnel as well as special equipment.

  The whole foods alternative to obamacare

Brief letter in which you pretend to be John Mackey responding to a major supplier of Whole Foods that has threatened to terminate business dealings.

  What ethical theory you relied upon in drafting your code

Explain what ethical theory you relied upon in drafting your code of ethics (and why), and how it guided you in coming up with what you came up with. What caused you to select the ethical theory you selected?

  How information is used and how it flows in an organization

Write a 700- to 1,050-word paper identifying and describing how information is used and how it flows in an organization

  Integration of technology into business

MANAGEMENT OF IS/IT UPDATE PRESENTATION - What course of action needs to be adopted for this technical change or update?

  Auditing of infromation systems process

Auditing of infromation systems process, The body of your paper should reflect the results of your research, from peer reviewed sources, that support your thesis.

  Describe a fictional healthcare organization and its techno

How has the law protecting health information impacted access to healthcare information and According to the insights, posts, and press releases posted on the site, how successful has the law been at protecting health information?

  Explain what is the organization''s structure

What is the organization's structure? How decentralized or centralized is it and What are the lines of authority and communication?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd