Study & evaluate the extract below and answer the following questions. Today more and more softwares...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Study & evaluate the extract below and answer the following questions. "Today more and more softwares are developing and people are getting more and more options in their present softwares. But many are not aware that they are being hacked without their knowledge. One reaction to this state of affairs is a behaviour termed "Ethical Hacking" which attempts to pro-actively increase security protection by identifying and patching known security vulnerabilities on systems owned by other parties. A good ethical hacker should know the methodology chosen by the hacker like reconnaissance, host or target scanning, gaining access, maintaining access and clearing tracks. For ethical hacking we should know about the various tools and methods that can be used by a black hat hacker apart from the methodology used by him. From the point of view of the user one should know at least some of these because some hackers make use of those who are not aware of the various hacking methods to hack into a system. Also when thinking from the point of view of the developer, he also should be aware of these since he should be able to close loopholes in his software even with the usage of the various tools. With the advent of new tools, the hackers may make new tactics. But at least the software will be resistant to some of the tools. Ethical hacking also known as penetration testing or white- hat hacking, involves the same tools, tricks, and techniques that hackers use, but with one major difference that Ethical hacking is legal. Ethical hacking is performed with the target's permission. The intent of ethical hacking is to discover vulnerabilities from a hacker's viewpoint so systems can be better secured. It's part of an overall information risk management program that allows for ongoing security improvements. Ethical hacking can also ensure that vendors' claims about the security of their products are legitimate." Questions: 1. Evaluate the above extract and state at least three reasons with examples why this extract is relevant to today's cybersecurity landscape? [6 marks] 2. State at least one reason with an example why the above statement would not be relevant to today's cybersecurity landscape? [4 marks] 2 3. How can ethical hacking be applied to cloud computing? State your reasons giving clear and concise examples. [5 marks] 4. Although Ethical Hacking is categorized under intrusive security assessment, how can ethical hacking assist towards Non-intrusive assessments such as security audit, risk assessment and risk analysis? [6 marks] 5. Imagine you are surfing the Web and, after some time, a message pops up stating your system has been infected by malware and offering a button to click for removal of the virus. After you click the button, another message window appears stating the system has been locked due to the nature of the infection and provides a link with instructions to pay money in order to regain control of your computer. Discuss why or why not certified hacking could have prevented you from this security incident? [6 marks] Study & evaluate the extract below and answer the following questions. "Today more and more softwares are developing and people are getting more and more options in their present softwares. But many are not aware that they are being hacked without their knowledge. One reaction to this state of affairs is a behaviour termed "Ethical Hacking" which attempts to pro-actively increase security protection by identifying and patching known security vulnerabilities on systems owned by other parties. A good ethical hacker should know the methodology chosen by the hacker like reconnaissance, host or target scanning, gaining access, maintaining access and clearing tracks. For ethical hacking we should know about the various tools and methods that can be used by a black hat hacker apart from the methodology used by him. From the point of view of the user one should know at least some of these because some hackers make use of those who are not aware of the various hacking methods to hack into a system. Also when thinking from the point of view of the developer, he also should be aware of these since he should be able to close loopholes in his software even with the usage of the various tools. With the advent of new tools, the hackers may make new tactics. But at least the software will be resistant to some of the tools. Ethical hacking also known as penetration testing or white- hat hacking, involves the same tools, tricks, and techniques that hackers use, but with one major difference that Ethical hacking is legal. Ethical hacking is performed with the target's permission. The intent of ethical hacking is to discover vulnerabilities from a hacker's viewpoint so systems can be better secured. It's part of an overall information risk management program that allows for ongoing security improvements. Ethical hacking can also ensure that vendors' claims about the security of their products are legitimate." Questions: 1. Evaluate the above extract and state at least three reasons with examples why this extract is relevant to today's cybersecurity landscape? [6 marks] 2. State at least one reason with an example why the above statement would not be relevant to today's cybersecurity landscape? [4 marks] 2 3. How can ethical hacking be applied to cloud computing? State your reasons giving clear and concise examples. [5 marks] 4. Although Ethical Hacking is categorized under intrusive security assessment, how can ethical hacking assist towards Non-intrusive assessments such as security audit, risk assessment and risk analysis? [6 marks] 5. Imagine you are surfing the Web and, after some time, a message pops up stating your system has been infected by malware and offering a button to click for removal of the virus. After you click the button, another message window appears stating the system has been locked due to the nature of the infection and provides a link with instructions to pay money in order to regain control of your computer. Discuss why or why not certified hacking could have prevented you from this security incident? [6 marks]
Expert Answer:
Answer rating: 100% (QA)
2 Q1 The three reasons why this extract is relevant to todays cybersecurity landscape are 1 Variety ... View the full answer
Related Book For
Data Analysis and Decision Making
ISBN: 978-0538476126
4th edition
Authors: Christian Albright, Wayne Winston, Christopher Zappe
Posted Date:
Students also viewed these operating system questions
-
A 10-year, 4.5 percent, semiannual coupon bond issued by Tyler Rentals has a $1,000 face value. The bond is currently quoted at 100.2 percent of par. What is the clean price of this bond if the next...
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
Googles ease of use and superior search results have propelled the search engine to its num- ber one status, ousting the early dominance of competitors such as WebCrawler and Infos- eek. Even later...
-
If possible, completely factor the expressions in Problems 336. 9-x-2x
-
Identify the errors in the following trial balance. All accounts have normal balances. Dinero Co. Trial Balance For the Month Ending January 31, 2006 Cash 16,400 ...3,600 Accounts Payable 1,850 1,250...
-
The handmade snuffbox industry is composed of 100 identical firms, each having short-run total costs given by STC = 0.5q2 + 10q + 5 and short-run marginal costs given by SMC = q + 10 Where q is the...
-
3. Rebecca, in Honolulu, faxes a job offer to Spike, in Pittsburgh, saying, "We can pay you $55,000 per year, starting June 1." Spike faxes a reply, saying, "Thank you! I accept your generous offer,...
-
Inglis City had a beginning cash balance in its enterprise fund of $895,635. During 2014, the following transactions occurred: 1. Interest received on investments totaled $42,400. 2. The city...
-
NEEED AN ANSWER FOR THIS ASAP PLEASE? Orwell Futures has decided to acquire a travelling machine. Its cost is \( \$ 75,000 \). In five years it can be salvaged for \( \$ 25,000 \). Friendly...
-
1. The model should list the given financial information for all potential projects. 2. The model should associate with each proposed project a cell that is 1 if the project is approved and 0 if it...
-
a) (2 points) Identify the loop invariant. Willie's table may give a hint. b) (2 points) Using the loop invariant you defined above, show that the loop invariant holds before the first iteration of...
-
The cost of operating an gourmet cupcake shop is described by the function C(q) = 292+0.78q dollars when q cupcakes are produced. Each cupcake sells for $3.23, so R(q) =3.23q. What quantity of...
-
The Riteway Ad Agency provides cars for its sales staff. In the past, the company has always purchased its cars from a dealer and then sold the cars after three years of use. The company s present...
-
8. Let a, b R, a < b. Let n Z+. Suppose that f bounded on [a, b]. Let P = {x} be any partition of [a, b]. Calculate L(f, P) and U(f, P) for the following functions over [a, b]. Simplify as much as...
-
The master budget for Lily's Bakery assumes that the bakery will sell 1,000 wedding cakes during 2019. However, Lily had a banner year and actually sold 1,400 wedding cakes. Lily's master budget...
-
I see hundreds of reports come across my desk every day. I'm swamped with phone calls, emails, meetings, briefings on major incidents, and some field work. I having dislike to tell my officers to...
-
11.8 The table shows cost and revenue data for an outpatient surgery clinic. Calculate the clinics marginal cost, marginal revenue, and profits at each level of output. Which price maximizes its...
-
Read the following description and Write a response of it. The discretion of public administrators can be decreased, but not altogether eliminated. Officials will use their discretion in any given...
-
In the game of soccer, players are sometimes awarded a penalty kick. The player who kicks places the ball 12 yards from the 24-foot-wide goal and attempts to kick it past the goalie into the net....
-
Consider the Consumer Price Index (CPI), which provides the annual percentage change in consumer prices. The data are in the file P02_19.xlsx. a. Find the first six autocorrelations of this time...
-
The quarterly numbers of applications for home mortgage loans at a branch office of Northern Central Bank are recorded in the file P12_04.xlsx. Perform a runs test and find a few autocorrelations to...
-
Consider the following information for HandyCraft Stores for 2008 and 2009. Required a. Compute ROI for both years. b. Break ROI down into profit margin and investment turnover. c. Comment on the...
-
Return on Investment, Effect of Depreciation The Chief Operating Officer of the Wisconsin Corporation is considering the effect of depreciation on company ROI. In the most recent year, net operating...
-
Waste Management has a subsidiary that disposes of hazardous waste and a subsidiary that collects and disposes of residential garbage. Information related to the two subsidiaries follows: Required a....
Study smarter with the SolutionInn App