How you would remain anonymous without blowing your cover

Assignment Help Management Information Sys
Reference no: EM131365866

Assignment: The Ethical Hacker

Imagine for a moment that you are a hacker; an ethical one. You are called upon by law enforcement based on your expertise to hack into a network of a business known to be launching crimes against humanity as its primary mission for operation and capital gain. Assume you are not to be concerned with any politics of the job and your actions are legal and ethically justified. This nefarious business takes its own security seriously and therefore has implemented several forms of network security such as firewalls, Web proxies for its Web gateways, and VPNs for remote users. You also know that this business exists much like any normal corporation, renting several floors of office space to accommodate between 100-200 employees. Also imagine that the business's entire network topology is located in that same location. Your goal is to infiltrate the security enough to find evidence included in the local MSQL database. You need to remain anonymous and operate within the reasonable parameters of the law.

Write a four to five page paper in which you:

1. Explain your method of attack and operation within reasonable parameters of the law.

2. Discuss specific malware, social engineer, or any other type of attacks you would deploy to achieve your desired goals.

3. Assess the hurdles you expect and how you plan to overcome them.

4. Determine how you would remain anonymous without blowing your cover.

5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.

The specific course learning outcomes associated with this assignment are:

• Explain the essentials of Transmission Control Protocol / Internet Protocol (TCP / IP) behavior and applications used in IP networking.
• Explain the concepts of network security and associated ethical issues in addressing exploits.
• Use technology and information resources to research issues in network security design.
• Write clearly and concisely about Advanced Network Security Design topics using proper writing mechanics and technical style conventions.

Reference no: EM131365866

Questions Cloud

Write essay on what exactly is message : Write about one of the topics provided:- Comedy is a great way to talk about societal problems/norms, in ways that would otherwise be seen as offensive, by getting people to react positively in an emotional way.
Explain the significant of stocking-placing timely orders : Dr. Smith has a full morning of minor office surgeries scheduled for today. Sarah, his nurse, has set up the room and prepared the patient. Prior to starting, Dr. Smith requests anesthetic without epinephrine due to the location of the surgical si..
Identify all of the spectator ions : Consider the solubility rules and identify all of the spectator ions when the following chemicals react: A) lead (II) nitrate and ammonium chloride B) Barium bromide and potassium carbonate. You must show all work (equations) clearly and in detail..
Distilled or deionized water : Why is it important to use distilled or deionized water rather than tap water when performing all experiments?
How you would remain anonymous without blowing your cover : Assess the hurdles you expect and how you plan to overcome them. Determine how you would remain anonymous without blowing your cover.
Write a mission statement and three goals for travel agency : Use your imagination and suggest at least one strength, weakness, opportunity, and threat that your business faces.
Barium bromide and potassium carbonate : 1. Consider the solubility rules and identify all of the spectator ions when the following chemicals react: A) lead (II) nitrate and ammonium chloride B) Barium bromide and potassium carbonate. You must show all work (equations) clearly and in det..
Suggest two scenarios that depict the potential effect : According to the textbook, consumer-driven health plans often rely on large deductibles funded via a health savings account framework. Suggest two (2) scenarios that depict the potential effect(s) of a large deductible on price elasticity for heal..
Calculate atomic mass using weighted average : Calculate the atomic mass using the weighted average mass method and identify the element. Write a 2-to-3-page report discussing the data and the calculations performed.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Discuss idea that applications have to visually consistent

Imagine you are the manager of a medium-sized IT department. While walking through the hall one day, you overhear a senior-level software developer telling a newly hired developer to focus on improving his coding skills rather than learning about ..

  What was the most difficult part of this assignment

Did your team discuss and/or divide up the major tasks before completing the INDIVIDUAL WBSes? How did your team "merge" the WBSes of individual teammates?

  Discuss about the planning database design

The proper implementation of a database is essential to the success of the data performance functions of an organization. Identify and evaluate at least three considerations that one must plan for when designing a database. Suggest at least two ..

  Do john and jane have any recourse against david

John and Jane have also been left empty handed as David's contract with Big Blue Co Ltd was in his own name, making no reference to Start Up Pty Ltd. Do John and Jane have any recourse against David?

  Explain the role of information systems in an organization

Briefly explain the role of information systems in an organization

  Identified compliancy and privacy laws

HIPAA is one example of a well-known act passed by Congress that has identified compliancy and privacy laws for certain types of organizations. Choose at least two other acts from the list provided and discuss the rules for privacy and confidentia..

  Can you exploit a connection to an isp

These concepts are explored briefly in the NIST SP800-34 Section 5, but you can easily find more information on the Web. In a disaster recovery situation, what is the benefit of a leased circuit over an open or virtual circuit? Can you exploit a c..

  Create zoom powerpoint presentation of your technology plan

Create a Zoom PowerPoint presentation of your Technology Plan to include the your name, business name and description. Marketing strategy you will employ.

  Describe the relationship between number of calories

Describe the relationship between number of calories and amount of carbohydrates (in grams) that Starbucks food menu items contain

  Create a context diagram of the system

Describe the information system organization you selected. Create a context diagram of the system - be sure you use a readable software program such as MS Word, MS PowerPoint, or Visio to create your diagram

  Explain why certain activities should be included in design

Building an interface can be broken down into the phases of design and development. Analyze the activities that take place in both phases, and explain why certain activities should be included in design but not in development.

  Differences between data warehouses and data marts

Write a one- to two-page (250-500 word) paper that discusses the differences between data warehouses and data marts. Also, discuss how organizations can use data warehouses and data marts to acquire data. You must use the CSU Online Library to loca..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd