New England College White Hat Hacking Paper

User Generated

Puvagh074

Computer Science

New England College

Description

Paper : White-hat Hacking

    • 500-700 word, double spaced, written in APA format, showing sources and a bibligraphy
    • Prepare a 15 slides presentation on paper
  • Create a single archive (zip not RAR)

Note : Abstract for the paper is attached for reference .

Please use simple vocabulary in PPT Slides.

Unformatted Attachment Preview

Running head: WHITE-HAT HACKING White-Hat Hacking Name : Laxmi Narasimha Reddy Paduru Project Abstract: White-Hat Hacking 1 WHITE-HAT HACKING 2 White-hat hacking is a process that involves identifying and revealing the susceptibilities and deficiencies in computer networks or systems. A white-hat hacker has a good purpose for invading the active computer systems or networks to pinpoint flaws. By doing so, the system’s security is boosted and malicious hackers find no vulnerabilities that they can exploit to cause harm. Technology has made it easier for cyber-attackers to locate the weakness in a company, government, and even personal systems and data. This, therefore, makes it a necessity for individuals, companies, and government to pursue white-hat hacking to keep their networks secure and inaccessible to terrorists. Research shows that about 90 percent of attacks occur from the inside, hence making it clear it is easier for insiders to attack the system/network (Al-Sharif et al., 2016). I have attempted to analyze the moral principles and issues surrounding white-hat hacking. My project is on white-hat hacking and I will start by introducing the general topic, hacking, and then proceed to discuss my topic. The discussion will mainly describe ethical hacking, specifically white-hat hacking. In this section, I will review previous literature, and discuss the information details. The aim is to ensure that the reader does not miss any details that may leave them doubting the ethics behind this noble process. For this reason, I will also explore the distinctions between white-hat hacking, gray, and also black hacking. This will set the topic apart and help the reader to differentiate them with ease. Next, I will provide a detailed discussion on the techniques and elements that make up white hat hacking and the characteristics that make a hacker to termed as a white-hat hacker. Here, I will explore the process and steps involved in keeping track and detecting the loopholes and susceptibilities in systems or networks. WHITE-HAT HACKING ‘To catch a thief, one has to think like the thief,’ therefore, I will study the process of collecting information and avoiding being detected by malicious hackers. Not every hacker can be classified as a white-hat hacker, hence I will also discuss the process of becoming one. It is not easy for organizations to expose their system/network details and contents to people without proper qualifications or credentials (Pike, 2013). Therefore, I will make the reader (companies) understand what to look for when hiring a white-hat hacker. Finally, I will discuss the most prominent white-hat hackers and the legal considerations related to white-hat hacking. 3 WHITE-HAT HACKING 4 References Al-Sharif, S., Iqbal, F., Baker, T., & Khattack, A. (2016, November). White-hat hacking framework for promoting security awareness. In 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS) (pp. 1-6). IEEE. Pike, R. E. (2013). The “ethics” of teaching ethical hacking. Journal of International Technology and Information Management, 22(4), 4.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: ANNOTATED BIBLIOGRAPHY ON WHITE-HAT HACKING

Annotated Bibliography on White-Hat Hacking
Student’s Name
Professor’s Name
Course Title
Date

1

ANNOTATED BIBLIOGRAPHY ON WHITE-HAT HACKING

2

Annotated Bibliography on White-Hat Hacking
Pike, R. E. (2013). The “ethics” of teaching ethical hacking. Journal of International
Technology and Information Management, 22(4), 4.
This journal is written by Ronald Pike to expound on the ethics of teaching ethical
cyberattacks. It explores mechanisms that instructors can implement to minimize the threat of
students using skills they acquire in classes of ethical hacking to commit criminal activities. The
study involves data collection through interviewing over 200 information security experts to get
their view regarding teaching ethical hacking in schools. Besides, Ronald illustrates the leading four
approvals from industry practitioners through academic literature. This resource is essential for my
project to review the literature regarding the essence of ethical hacking.
Al-Sharif, S., Iqbal, F., Baker, T., & Khattack, A. (2016, November). White-hat hacking
framework for promoting security awareness. In 2016 8th IFIP International
Conference on New Technologies, Mobility, and Security (NTMS) (pp. 1-6). IEEE.
Al-Sharif et al wrote this informative material. The writers explore the vulnerabilities which
hackers exploit to accomplish their mission which can be manipulation, abuse or theft of private
information. Increased hacking activities are attributed to the increase in gaming and social media
applications. This resource guides my project in understanding the increasing number of
cybercrimes related to black hat hacking. Furthermore, I would use it to describe the various forms
of this attack, which distinguish it from the ethical white hat hacking. The understanding of the
multiple dimensions of hacking facilitates the promotion of the best security awareness programs.
EC-Council. (March 30, 2019). How to Become a White Hat Hacker - EC-Council Official
Blog. Retrieved October 3, 2019, from https://blog.eccouncil.org/how-to-become-awhite-hat-hacker/

ANNOTATED BIBLIOGRAPHY ON WHITE-HAT HACKING

3

The EC-Council organization published this blog post. It focuses on the steps of becoming a
professional white hat hacker to prevent malicious hackers from infiltrating our systems and
networks. The bog post accurately describes qualities of an ethical hacker, scope, and job market,
and suggested path for this hacker. This blog is essential for my project for illustration of the
elements, characteristics, and techniques which make up white hacking. I will use the resource to
explore the steps and processes of detecting and keeping track of susceptibilities and loopholes in
networks or systems. A white hacker requires a lot of expertise to control black hat hackers who are
incredibly innovative.
Olushola, O. B. (January 10, 2018). The Legality of Ethical Hacking. IOSR Journal of
Computer Engineering. Pp 61-63.
This journal is written by Omoyiola Olushola to describe the legality of white hat hacking.
Ethical hacking has drawn mixed reactions from various quarters. Its proponents argue that it is a
proactive measure against cyberattacks while the opponents claim that the term itself contradicts the
intention of the activity. In this regard, Olushola analyzes the acceptability and legality of this
practice with an emphasis on why it is not a criminal activity. This resource ...


Anonymous
Great content here. Definitely a returning customer.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags