How you would remain anonymous without blowing your cover

Assignment Help Management Information Sys
Reference no: EM131365866

Assignment: The Ethical Hacker

Imagine for a moment that you are a hacker; an ethical one. You are called upon by law enforcement based on your expertise to hack into a network of a business known to be launching crimes against humanity as its primary mission for operation and capital gain. Assume you are not to be concerned with any politics of the job and your actions are legal and ethically justified. This nefarious business takes its own security seriously and therefore has implemented several forms of network security such as firewalls, Web proxies for its Web gateways, and VPNs for remote users. You also know that this business exists much like any normal corporation, renting several floors of office space to accommodate between 100-200 employees. Also imagine that the business's entire network topology is located in that same location. Your goal is to infiltrate the security enough to find evidence included in the local MSQL database. You need to remain anonymous and operate within the reasonable parameters of the law.

Write a four to five page paper in which you:

1. Explain your method of attack and operation within reasonable parameters of the law.

2. Discuss specific malware, social engineer, or any other type of attacks you would deploy to achieve your desired goals.

3. Assess the hurdles you expect and how you plan to overcome them.

4. Determine how you would remain anonymous without blowing your cover.

5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.

The specific course learning outcomes associated with this assignment are:

• Explain the essentials of Transmission Control Protocol / Internet Protocol (TCP / IP) behavior and applications used in IP networking.
• Explain the concepts of network security and associated ethical issues in addressing exploits.
• Use technology and information resources to research issues in network security design.
• Write clearly and concisely about Advanced Network Security Design topics using proper writing mechanics and technical style conventions.

Reference no: EM131365866

Questions Cloud

Write essay on what exactly is message : Write about one of the topics provided:- Comedy is a great way to talk about societal problems/norms, in ways that would otherwise be seen as offensive, by getting people to react positively in an emotional way.
Explain the significant of stocking-placing timely orders : Dr. Smith has a full morning of minor office surgeries scheduled for today. Sarah, his nurse, has set up the room and prepared the patient. Prior to starting, Dr. Smith requests anesthetic without epinephrine due to the location of the surgical si..
Identify all of the spectator ions : Consider the solubility rules and identify all of the spectator ions when the following chemicals react: A) lead (II) nitrate and ammonium chloride B) Barium bromide and potassium carbonate. You must show all work (equations) clearly and in detail..
Distilled or deionized water : Why is it important to use distilled or deionized water rather than tap water when performing all experiments?
How you would remain anonymous without blowing your cover : Assess the hurdles you expect and how you plan to overcome them. Determine how you would remain anonymous without blowing your cover.
Write a mission statement and three goals for travel agency : Use your imagination and suggest at least one strength, weakness, opportunity, and threat that your business faces.
Barium bromide and potassium carbonate : 1. Consider the solubility rules and identify all of the spectator ions when the following chemicals react: A) lead (II) nitrate and ammonium chloride B) Barium bromide and potassium carbonate. You must show all work (equations) clearly and in det..
Suggest two scenarios that depict the potential effect : According to the textbook, consumer-driven health plans often rely on large deductibles funded via a health savings account framework. Suggest two (2) scenarios that depict the potential effect(s) of a large deductible on price elasticity for heal..
Calculate atomic mass using weighted average : Calculate the atomic mass using the weighted average mass method and identify the element. Write a 2-to-3-page report discussing the data and the calculations performed.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd