Answered You can hire a professional tutor to get the answer.

QUESTION

Hello, I am looking for someone to write an essay on Ethical Hacking the three shades White Hat, Black Hat, Gray Hat. It needs to be at least 1000 words.Download file to see previous pages... The rese

Hello, I am looking for someone to write an essay on Ethical Hacking the three shades White Hat, Black Hat, Gray Hat. It needs to be at least 1000 words.

Download file to see previous pages...

The researcher employed both qualitative and quantitative research design methods of attacking a computer network. In the conclusion part, the summary was included that summed up the research work. The researcher recommended that there is a need for future research to offer adequate analysis on the way ethical hackers will implement effective risk management plan, which will enable Internet users or businesses to protect their data from hacking activities. INTRODUCTION Ethical hacking as a risk management technique is the use of programming skills in determining vulnerabilities in the computer system. There are varied types of ethical hackers including the White Hat, Black Hat and Grey Hat. thus, both focus on building a risk management program effective for eliminating vulnerabilities. The rapid advancement of technology has brought many constructive and significant solutions to the life of people. New areas of research have tremendously increased in e-commerce, electronic activities and information sharing areas. However, with the increased technology advancement, there have been a growing number of cybercrimes and criminal hacking activities. Businesses and other Internet users are nowadays scared of computer experts who will offer risk management through penetrating into their web server to offer adequate security. Therefore, there is a need for computer science students to advance their ethical hacking techniques in order to fight against the increasing problems of criminal hacking. Project Goals The project attempts to offer a comprehensive risks management plan effective for eliminating hacking activities in varied organizations. It identifies the risks resulting from hacking and offer effecting hacking methods that hackers will employ to manage organizational risks. It analyses the process of ethical hackings and also attempt to find out the pros or cons arising from ethical hacking. LITERATURE REVIEW This chapter will employ varied literature materials in order to examine the way the previous scholars have argued about ethical hacking issues. Tiller (2005) offer varied methodologies and unwritten convention that ethical hackers should employ in order to offer the maximum value to companies that want to manage organizational risks. The author reveals the technical aspects of penetration testing in order to address the engagement rules necessary for successful technical tests. Jahankhani (2010) also reveals the way cybercrimes has become one of the biggest problems in many industries across the globe. thus, reveals varied aspects including implementation, investigative techniques and criminal intelligence in fighting cybercrimes. The author aimed to educate the academia members, public and private sectors, as well as, students on the way to overcome cybercrimes issues. Logan and Clarkson (2005) reveal the significant need to educate computer science students to hack. thus enabling them to become experts in managing risks or vulnerabilities arising from hacking activities. HYPOTHESIS Hacking will likely to pose risks such as exposing sensitive user data and risk user privacy. thus making information vulnerable to illegitimate use and manipulation. Therefore, it triggers theft of critical business information because important information may be lost in the process hacking. This is because hacking can convert computer into zombies.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question