Study & evaluate the extract below and answer the following questions. Today more and more softwares...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Study & evaluate the extract below and answer the following questions. "Today more and more softwares are developing and people are getting more and more options in their present softwares. But many are not aware that they are being hacked without their knowledge. One reaction to this state of affairs is a behaviour termed "Ethical Hacking" which attempts to pro-actively increase security protection by identifying and patching known security vulnerabilities on systems owned by other parties. A good ethical hacker should know the methodology chosen by the hacker like reconnaissance, host or target scanning, gaining access, maintaining access and clearing tracks. For ethical hacking we should know about the various tools and methods that can be used by a black hat hacker apart from the methodology used by him. From the point of view of the user one should know at least some of these because some hackers make use of those who are not aware of the various hacking methods to hack into a system. Also when thinking from the point of view of the developer, he also should be aware of these since he should be able to close loopholes in his software even with the usage of the various tools. With the advent of new tools, the hackers may make new tactics. But at least the software will be resistant to some of the tools. Ethical hacking also known as penetration testing or white- hat hacking, involves the same tools, tricks, and techniques that hackers use, but with one major difference that Ethical hacking is legal. Ethical hacking is performed with the target's permission. The intent of ethical hacking is to discover vulnerabilities from a hacker's viewpoint so systems can be better secured. It's part of an overall information risk management program that allows for ongoing security improvements. Ethical hacking can also ensure that vendors' claims about the security of their products are legitimate." Questions: 1. Evaluate the above extract and state at least three reasons with examples why this extract is relevant to today's cybersecurity landscape? [6 marks] 2. State at least one reason with an example why the above statement would not be relevant to today's cybersecurity landscape? [4 marks] 2 3. How can ethical hacking be applied to cloud computing? State your reasons giving clear and concise examples. [5 marks] 4. Although Ethical Hacking is categorized under intrusive security assessment, how can ethical hacking assist towards Non-intrusive assessments such as security audit, risk assessment and risk analysis? [6 marks] 5. Imagine you are surfing the Web and, after some time, a message pops up stating your system has been infected by malware and offering a button to click for removal of the virus. After you click the button, another message window appears stating the system has been locked due to the nature of the infection and provides a link with instructions to pay money in order to regain control of your computer. Discuss why or why not certified hacking could have prevented you from this security incident? [6 marks] Study & evaluate the extract below and answer the following questions. "Today more and more softwares are developing and people are getting more and more options in their present softwares. But many are not aware that they are being hacked without their knowledge. One reaction to this state of affairs is a behaviour termed "Ethical Hacking" which attempts to pro-actively increase security protection by identifying and patching known security vulnerabilities on systems owned by other parties. A good ethical hacker should know the methodology chosen by the hacker like reconnaissance, host or target scanning, gaining access, maintaining access and clearing tracks. For ethical hacking we should know about the various tools and methods that can be used by a black hat hacker apart from the methodology used by him. From the point of view of the user one should know at least some of these because some hackers make use of those who are not aware of the various hacking methods to hack into a system. Also when thinking from the point of view of the developer, he also should be aware of these since he should be able to close loopholes in his software even with the usage of the various tools. With the advent of new tools, the hackers may make new tactics. But at least the software will be resistant to some of the tools. Ethical hacking also known as penetration testing or white- hat hacking, involves the same tools, tricks, and techniques that hackers use, but with one major difference that Ethical hacking is legal. Ethical hacking is performed with the target's permission. The intent of ethical hacking is to discover vulnerabilities from a hacker's viewpoint so systems can be better secured. It's part of an overall information risk management program that allows for ongoing security improvements. Ethical hacking can also ensure that vendors' claims about the security of their products are legitimate." Questions: 1. Evaluate the above extract and state at least three reasons with examples why this extract is relevant to today's cybersecurity landscape? [6 marks] 2. State at least one reason with an example why the above statement would not be relevant to today's cybersecurity landscape? [4 marks] 2 3. How can ethical hacking be applied to cloud computing? State your reasons giving clear and concise examples. [5 marks] 4. Although Ethical Hacking is categorized under intrusive security assessment, how can ethical hacking assist towards Non-intrusive assessments such as security audit, risk assessment and risk analysis? [6 marks] 5. Imagine you are surfing the Web and, after some time, a message pops up stating your system has been infected by malware and offering a button to click for removal of the virus. After you click the button, another message window appears stating the system has been locked due to the nature of the infection and provides a link with instructions to pay money in order to regain control of your computer. Discuss why or why not certified hacking could have prevented you from this security incident? [6 marks]
Expert Answer:
Answer rating: 100% (QA)
2 Q1 The three reasons why this extract is relevant to todays cybersecurity landscape are 1 Variety ... View the full answer
Related Book For
Data Analysis and Decision Making
ISBN: 978-0538476126
4th edition
Authors: Christian Albright, Wayne Winston, Christopher Zappe
Posted Date:
Students also viewed these operating system questions
-
A 10-year, 4.5 percent, semiannual coupon bond issued by Tyler Rentals has a $1,000 face value. The bond is currently quoted at 100.2 percent of par. What is the clean price of this bond if the next...
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
Googles ease of use and superior search results have propelled the search engine to its num- ber one status, ousting the early dominance of competitors such as WebCrawler and Infos- eek. Even later...
-
If possible, completely factor the expressions in Problems 336. 9-x-2x
-
How much privacy should people expect when using a social networking site or going online for information, shopping, or other tasks?
-
How does capitalism alienate the worker in society? How does it affect the worker?
-
Consider the model \(y_{i}=\beta_{1} x_{i}+\varepsilon_{i}\), that is, regression with one explanatory variable without the intercept term. This model is called regression through the origin because...
-
Qamar, Inc., did not pay dividends in 2009 or 2010, even though 50,000 shares of its 6.5%, $50 par value cumulative preferred stock were outstanding during those years. The company has 800,000 shares...
-
. How would a person create and claim value in leadership ability via the use of resource allocation theory and constrained utility maximization?
-
On January 1, 2023, Psalm and Trisha formed PS Partnership. The articles of co-partnership provides that profit or loss shall be distributed accordingly: 15% interest on average capital balance....
-
What information about the intangible asset good will would be included in notes to the financial statements?
-
Exercise 2 E [4 points]. Given a training set D = {(x(i), y(i)), i = 1, .., M}, where x() RN and y() {1,2, ..., C}, derive the maximum likelihood estimates of the naive Bayes for real valued xmodeled...
-
Create a 3-page, mobile-only view for a web-based app. This is a front-end only build and will only mockup the app experience. This is NOT a functioning traditional phone app. Requirements: 3 pages...
-
QUESTION 8 Suppose the following program needs to be loaded on memory starting at address DO with the following simple computing system information: 16 general-purpose registers numbered 016 through...
-
Write an evaluator for a program (list of statements + return expression) that evaluates the program and returns the final value of the return expression after the statements in the program are run...
-
3.4 The following sequence of code has been observed in various programs: dup2 (fd, 0); dup2 (fd, 1); dup2 (fd, 2); if (fd > 2) close(fd); To see why the if test is needed, assume that fd is 1 and...
-
stion 4 (6 points) When a car rounds a curve at high speed, the tires exert a centripetal force on the road. there are no centripetal forces involved. the car exerts a centripetal force on the road....
-
Read the following description and Write a response of it. The discretion of public administrators can be decreased, but not altogether eliminated. Officials will use their discretion in any given...
-
In the game of soccer, players are sometimes awarded a penalty kick. The player who kicks places the ball 12 yards from the 24-foot-wide goal and attempts to kick it past the goalie into the net....
-
Consider the Consumer Price Index (CPI), which provides the annual percentage change in consumer prices. The data are in the file P02_19.xlsx. a. Find the first six autocorrelations of this time...
-
The quarterly numbers of applications for home mortgage loans at a branch office of Northern Central Bank are recorded in the file P12_04.xlsx. Perform a runs test and find a few autocorrelations to...
-
Demonstrate that for a closed path \(\operatorname{Tr} U_{\gamma}(x, x)\) is gauge invariant, where \(U_{\gamma}\left(x_{0}, x_{1} ight)\) is defined by Eq. (26.9).
-
Use Stokes' theorem [Eq. (27.5)] to prove that Eq. (27.4) leads to Eq. (27.6). Data from Eq. 27.4 Data from Eq. 27.5 Data from Eq. 27.6 = z ) ); A dr. - SA dr) = f A dr.
-
Prove the result of Eq. (26.10) that a path-dependent representation of a gauge group is sensitive to a gauge transformation only at the endpoints of the path.
Study smarter with the SolutionInn App