Monday, February 17, 2020

Ethical Hacking the three shades White Hat, Black Hat, Gray Hat Research Proposal

Ethical Hacking the three shades White Hat, Black Hat, Gray Hat - Research Proposal Example The researcher employed both qualitative and quantitative research design methods of attacking a computer network. In the conclusion part, the summary was included that summed up the research work. The researcher recommended that there is a need for future research to offer adequate analysis on the way ethical hackers will implement effective risk management plan, which will enable Internet users or businesses to protect their data from hacking activities. INTRODUCTION Ethical hacking as a risk management technique is the use of programming skills in determining vulnerabilities in the computer system. There are varied types of ethical hackers including the White Hat, Black Hat and Grey Hat; thus, both focus on building a risk management program effective for eliminating vulnerabilities. The rapid advancement of technology has brought many constructive and significant solutions to the life of people. New areas of research have tremendously increased in e-commerce, electronic activitie s and information sharing areas. However, with the increased technology advancement, there have been a growing number of cybercrimes and criminal hacking activities. Businesses and other Internet users are nowadays scared of computer experts who will offer risk management through penetrating into their web server to offer adequate security. Therefore, there is a need for computer science students to advance their ethical hacking techniques in order to fight against the increasing problems of criminal hacking. Project Goals The project attempts to offer a comprehensive risks management plan effective for eliminating hacking activities in varied organizations. It identifies the risks resulting from hacking and offer effecting hacking methods that hackers will employ to manage organizational risks. It analyses the process of ethical hackings and also attempt to find out the pros or cons arising from ethical hacking. LITERATURE REVIEW This chapter will employ varied literature materials in order to examine the way the previous scholars have argued about ethical hacking issues. Tiller (2005) offer varied methodologies and unwritten convention that ethical hackers should employ in order to offer the maximum value to companies that want to manage organizational risks. The author reveals the technical aspects of penetration testing in order to address the engagement rules necessary for successful technical tests. Jahankhani (2010) also reveals the way cybercrimes has become one of the biggest problems in many industries across the globe; thus, reveals varied aspects including implementation, investigative techniques and criminal intelligence in fighting cybercrimes. The author aimed to educate the academia members, public and private sectors, as well as, students on the way to overcome cybercrimes issues. Logan and Clarkson (2005) reveal the significant need to educate computer science students to hack; thus enabling them to become experts in managing risks or vulnera bilities arising from hacking activities. HYPOTHESIS Hacking will likely to pose risks such as exposing sensitive user data and risk user privacy; thus making information vulnerable to illegitimate use and manipulation. Therefore, it triggers theft of critical business information because important information may be lost in the process hacking. This is because hacking can convert computer into zombies; thus contributing to spamming and phishing

Monday, February 3, 2020

Andrea and Overfield, The Human Record, Sources of Global History Vol Essay

Andrea and Overfield, The Human Record, Sources of Global History Vol. II (Cengage) hereafter AO - Essay Example In the year 1789, the assembly passed the declaration of the rights of man and the citizen. This declaration was a result of the direct consequences of what was taking place in France during this period. This declaration was important during that time since it help in annulling the right of the nobles to demand tithes, taxes and labor from peasants who were working on their family land. This was a great step in the liberation of man and the fight for human rights. This declaration was partly inspired the revolution that was taking place in America at that time (Andrea and Overfield 254). Unlike the declaration in America that â€Å"all men are equal†, the declaration made in France stated, â€Å"Men are born and remain free and equal in rights. The distinction in society may be founded only upon the general good†. This declaration left room for racial prejudice to take place. It stated that despite man being free there will always be a social difference. During this time, the blacks were mistreated for social purposes and were not fully given their rights in the society. Even though they were facing mistreatment from the general French public, the black French population had the right to resist the oppressions as this was provided by the declaration. The period of revolution and declaration of the right of man was volatile/ most of the churches were closed and priests were being hunted down. Politics at this time had taken a different twist and idea of persecution of the Catholics as well as the Protestants began. Several churches were closed, and others converted to temples for fear of persecution. The church was not safe no more. In respect to human rights and dignity, there was the abolishment of the water wheel and introduction of the guillotine. It is no coincidence that the universal declarations of the rights of humans, the European Convention for the human rights protection and the first treaty of the communities in Europe have their origins