Reference no: EM133861492
Question: You began working on the Case Study investigation last week. This week, you will conduct an ethical hack of the case study assigned to you by your Instructor at the end of Week 8.
Here is Week 8 assigning that was did in week 8 In Week 8, you designed a case study; this week you will be ethically hacking it. The case study is all about assessing a system to detect potential cybercrimes that could target it. In addition, you will need to propose possible preventative actions or controls for those cybercrimes.
the case study investigation will consist of two aspects:
1. A technical investigation, as you try to ethically hack the infrastructure to report possible flaws that could be used by a cybercriminal.
2. A theoretical study, in which you critically analyze all possible design alternatives in that case study.
(Example: If the case study proposes an internal mail server that does not use SSL connection, since it targets local employees, what would be your concerns here? The design decision not to use SSL could be based on that employees are part of the trust-computing base.)
Here is week 10
Submit a 3- to 5-page report in Microsoft Word and APA format of your ethical hack in which you include the following:
Question 1: Identify vulnerabilities identified in the hack and how they might be exploited. Include screenshots. Provide an assessment of all potential cybercrimes that could target that system, including the human factor of the system.
Question 2: Propose prevention methods for those vulnerabilities and discuss how to prevent the cybercrimes from both technical and legal points of view.
Your document should be 3-5 pages long (not including the Title page or Reference list) but the quality of the work is most important, not the number of pages. Cite and reference all sources using APA format and style guidelines. Submit in a single document.