Prepare and sign non-disclosure agreement documents

Assignment Help Software Engineering
Reference no: EM132161077 , Length: word count:250

Assignment -

Write a review on this article with 2 APA format references. Network security is becoming more and more crucial as the volume of data being exchanged on the Internet increases. When people use the Internet, they expect their confidentiality, data integrity, and authentication protected and secured. Due to the increasing dependency of our society on networked information system the overall security of these systems should be measured and improved. The most accurate method to evaluate organization's information security stance is to observe how it stands up against an attack. The best way of ensuring that the system is secure is to attempt penetration testing. This would be the most effective way to find exploits and to proof whether a system a vulnerable. Penetration testing often allows the security analyst to find new vulnerabilities. Passive reconnaissance is an attempt to gain information about targeted computers and networks without actively engaging with the system.

For example, a pen tester who does not have any information about the company, passively, he/she can be as simple as watching the building to identify what time employees enter/ leave the building. However, it is usually done using the Internet searches, or by Googling to gather information about their target. Some of the passive information gathering methods could be social engineering and dumpster diving (Walker, 2017). Every pen tester begins their asset hacking by learning as much as they can about their targets.

For example, they want to know IP addresses, OS platforms, applications, patch levels, advertised network ports, users, and anything else that can lead to an exploitation. Unfortunately, ethical hacker must follow the rules of hacking because there is a thin line between black hat and white hat hacking. Therefore, to stay out of any trouble, the ethical hacker should follow certain framework for performing audit of an organization (Kruger, Nickolay, & Gaycken, 2013).

Talk to the client, and discuss the needs to be addressed during testing. Prepare and sign non-disclosure agreement (NDA) documents with the client. Prepare a schedule for testing Conduct the test Analyze the results of the testing, and prepare a report Present the final report to the client When it comes to legal issues, before taking any further steps, ethical hacker should know the penalties of unauthorized hacking into a system. No ethical hacking activities associated with a network-penetration test should begin until a signed document giving the ethical hacker express permission to perform the hacking activities is received from the company. Furthermore, ethical hackers need to be judicious with their hacking skills and recognize the consequences of misusing those skills.

For example, the Cyber Security Enhancement Act of 2002, mandates life sentences for hacker who "recklessly" endanger the lives of others. Malicious hackers who create a life-threatening situation by attacking computer networks for transportation systems, power companies, or other public services or utilities can be prosecuted under this law (Graves, 2010). For example, I have a friend who conduct pen testing on a company, but he was detected by the security employees who noticed some illegal activities on their network system. Luckily, he had a document signed by the company to conduct pen testing on their system. The person should be brave and true to himself about conducting something beneficial to him and to society, "All Scripture is God-breathed and is useful for teaching, rebuking, correcting and training in righteousness, so that the servant of God may be thoroughly equipped for every good work." Timothy 3:16-17. The Scriptures instruct us to provide a good work ethically. Yet we must apply the word properly, follow the rules diligently, and pray for wisdom.

References - Walker, M. (2017). CEH Certified Ethical Hacker All-in-one Exam Guide. Third Edition. New York, NY: McGraw-Hill. Kruger, J., Nickolay, B., & Gaycken s. (2013). The secure information society: Ethical, legal, and political challenges (1. Aufl. ed). London: New York, Springer. DOI:10.1007/978-1-4471-4763-3. Graves, K. (2010). CEH Certified Ethical Hacker Study Guide. Indianapolis, Indiana: Wiley Publishing, Inc.

Attachment:- Assignment File.rar

Reference no: EM132161077

Questions Cloud

Do most people focus first on seeking to understand : Do most people focus FIRST on seeking to understand or seeking to be understood? Why? What effect does this have on others?
Information in the context of your selected business : Describe the relationship between data and information in the context of your selected business.
Geocentric focus and achieving potential gains : Determine critical success factors for the organization for transitioning from an ethnocentric approach to a geocentric focus and achieving potential gains.
What is the current organizational structure : What is the current organizational structure? How would you label or describe it?
Prepare and sign non-disclosure agreement documents : Talk to the client, and discuss the needs to be addressed during testing. Prepare and sign non-disclosure agreement (NDA) documents with the client
Examine the implication of change processes experienced : GSP6064 Leadership and Change Management Assignment, Gulf College Oman. Examine the implication of change processes experienced/implemented by Gosfield.
Role of the manager in managing business organizations : Assignment Task: What Managers Do? What is the role of the manager in managing business organizations
Article review - In Search of Ethical Code for Cybersecurity : Write a review on this article with 2 APA references. Article - In Search of an Ethical Code for Cybersecurity
Complete the scavenger hunt by identifying flora and fauna : Complete the scavenger hunt by identifying flora and fauna in your iSite habitat type whose survival depends on an effective strategy for the listed function

Reviews

Write a Review

 

Software Engineering Questions & Answers

  What are source and destination ip addresses for datagram

What are the source and destination IP addresses for datagram? What are the source and destination port numbers for the TCP segment in this IP datagram?

  Importance of proceeding with systems development

Discuss specific examples of the importance of proceeding with systems development even when there is doubt as to the feasibility of the proposed development effort.

  Identify computer and network resources that will be require

Identify computer and network resources that will be required in order for the system to be useable in a production mode of operation.

  Create a system context diagram of the system

CSC2407 - Create a system context diagram of the system and Create a use case diagram that summarises the use cases for the system

  Define the terms variable and constant

Discuss and define the terms "variable" and "constant" as used in computer programming. Estimate the many types of data that can be used in developing a solution.

  What is a race condition in software

How long was the Therac-25 in operation before the ?rst documented accident? How much longer did it take for the system to be declared unsafe?

  Identify the most complex user-system interaction

Identify the most complex user-system interaction (input/response couplet) within the normal flow (ie the step with the most number of side effects, or most complex internal logic), and produce an operation contract for that input-response couplet..

  Provides the capabilities specified in the frd

Your company agrees to provide the capabilities specified. The client agrees to find product satisfactory if it provides the capabilities specified in the FRD.

  The next main stage in software development life cycle sdlc

the next major phase in software development life cycle sdlc is testing. quality assurance methods and testing help

  Create crow-s foot erd for business rules for company

Create Crow's Foot ERD to include the following business rules for the ProdCo company: Each sales representative writes many invoices

  Apply principles of coding to using software to code data

While hand-coding is one way to organize your data, you may also want to take advantage of software programs that facilitate the coding process. Apply principles of coding to using software to code data

  Develop a mock-up for the high-level interface screens

Develop a mock-up or storyboard for the high-level interface screens - Design, and Implementation Specification title page with new date. Update the previously completed sections based on the instructor's feedback.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd