Description
Paper : White-hat Hacking
- 500-700 word, double spaced, written in APA format, showing sources and a bibligraphy
- Prepare a 15 slides presentation on paper
- Create a single archive (zip not RAR)
Note : Abstract for the paper is attached for reference .
Please use simple vocabulary in PPT Slides.
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Attached.
Running head: ANNOTATED BIBLIOGRAPHY ON WHITE-HAT HACKING
Annotated Bibliography on White-Hat Hacking
Student’s Name
Professor’s Name
Course Title
Date
1
ANNOTATED BIBLIOGRAPHY ON WHITE-HAT HACKING
2
Annotated Bibliography on White-Hat Hacking
Pike, R. E. (2013). The “ethics” of teaching ethical hacking. Journal of International
Technology and Information Management, 22(4), 4.
This journal is written by Ronald Pike to expound on the ethics of teaching ethical
cyberattacks. It explores mechanisms that instructors can implement to minimize the threat of
students using skills they acquire in classes of ethical hacking to commit criminal activities. The
study involves data collection through interviewing over 200 information security experts to get
their view regarding teaching ethical hacking in schools. Besides, Ronald illustrates the leading four
approvals from industry practitioners through academic literature. This resource is essential for my
project to review the literature regarding the essence of ethical hacking.
Al-Sharif, S., Iqbal, F., Baker, T., & Khattack, A. (2016, November). White-hat hacking
framework for promoting security awareness. In 2016 8th IFIP International
Conference on New Technologies, Mobility, and Security (NTMS) (pp. 1-6). IEEE.
Al-Sharif et al wrote this informative material. The writers explore the vulnerabilities which
hackers exploit to accomplish their mission which can be manipulation, abuse or theft of private
information. Increased hacking activities are attributed to the increase in gaming and social media
applications. This resource guides my project in understanding the increasing number of
cybercrimes related to black hat hacking. Furthermore, I would use it to describe the various forms
of this attack, which distinguish it from the ethical white hat hacking. The understanding of the
multiple dimensions of hacking facilitates the promotion of the best security awareness programs.
EC-Council. (March 30, 2019). How to Become a White Hat Hacker - EC-Council Official
Blog. Retrieved October 3, 2019, from https://blog.eccouncil.org/how-to-become-awhite-hat-hacker/
ANNOTATED BIBLIOGRAPHY ON WHITE-HAT HACKING
3
The EC-Council organization published this blog post. It focuses on the steps of becoming a
professional white hat hacker to prevent malicious hackers from infiltrating our systems and
networks. The bog post accurately describes qualities of an ethical hacker, scope, and job market,
and suggested path for this hacker. This blog is essential for my project for illustration of the
elements, characteristics, and techniques which make up white hacking. I will use the resource to
explore the steps and processes of detecting and keeping track of susceptibilities and loopholes in
networks or systems. A white hacker requires a lot of expertise to control black hat hackers who are
incredibly innovative.
Olushola, O. B. (January 10, 2018). The Legality of Ethical Hacking. IOSR Journal of
Computer Engineering. Pp 61-63.
This journal is written by Omoyiola Olushola to describe the legality of white hat hacking.
Ethical hacking has drawn mixed reactions from various quarters. Its proponents argue that it is a
proactive measure against cyberattacks while the opponents claim that the term itself contradicts the
intention of the activity. In this regard, Olushola analyzes the acceptability and legality of this
practice with an emphasis on why it is not a criminal activity. This resource ...