Question: The difference between ethical hacking and cyber attacks can be as simple as if the person performing the attacks obtained a WRITTEN PERMISSION from the
The difference between ethical hacking and cyber attacks can be as simple as if the person performing the attacks obtained a WRITTEN PERMISSION from the target. The white hat hackers are AUTHORIZED, while the black hat hackers are not. There are always grey areas and ethical issues that deserve great concerns and discussions before we engage in more hacking activities. In academic settings, we practice hands-on in closed or sandboxed environment using virtual machines in private networks. However, many of you may be interested in applying what you learned to a real-world environment.
This week, lets discuss what you can and cant do to the public network. Are reconnaissance and scanning to the public domains legal? Can you scan or sniff UC internal network? Are passive scanning ok? Find an interesting article on ethics or a case study and summarize it here. Share your findings and opinions with the class. Some sample articles are
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
