Now that you better understand the role of a white hat hacker, and how to stay ethical during the penetration scenario, design a plan to carry out a white hat penetration test of a company.

User Generated

Nn75

Other

Stratford University

Description

THERE ARE 2 PARTS (PLEASE FOCUS ON POINTS NOT TOO MUCH DESCRIPTIVE)

PART 1(2 PAGES) 

Please summarize the article below;

https://www.howtogeek.com/157460/hacker-hat-colors-explained-black-hats-white-hats-and-gray-hats/

PART 2 (5 TO 6 PAGES)

White Hat Hacking and Planning a Hack

Module Description:

In order to carry out an effective white hat operation for a company you first need a plan.To better understand how to develop a plan you need to understand who the hacker is and how they function.

First, learn about the hacker and telling the white hats, gray hats, and black hats apart.Also learn why it is important to stay ethical.

Second, investigate how to devise a white hat plan to penetrate a system.

Third, apply basics of planning for a white hat penetration by working through the iLabs

  • ECSA Certified Security Analyst Course ECSAv9, Module 03 Pre-penetration Testing Steps
  • Certified Security Analyst Course ECSAv9, Module 04 Information Gathering Methodology

Task 

Now that you better understand the role of a white hat hacker, and how to stay ethical during the penetration scenario, design a plan to carry out a white hat penetration test of a company.

Unformatted Attachment Preview

Module 1 Overview of DBMS Module Competencies: • Analyze current and future data needs. • Define data integrity requirements based on organizational requirements. • Define security requirements based on organizational requirements • Analyze a business case and determine the appropriate data needs for the organization.. Task 1: Complete a Data Analysis and Definition of the Database Requirements for the DBMS 1. Overview of the DBMS • Read/Review the following chapters from: Introduction to Database Management System. o Chapter 1 (Introduction to Database) o Chapter 14 (Database Design Project) • Review the “Understanding Databases” at Microsoft’s TechNet Library. • Watch the “Understanding Databases” – Video | Lynda. (Understanding Databases) • Watch the “Database Fundamentals” – Video | Lynda. (Database Fundamentals) 2. Database Development Management Research • Conduct research for the “Database Development Life Cycle (DDLC)” management using Agile SCRUM project management techniques 3. Data Analysis and Requirements • Read/Review Chapter 9 (Database Security and Authorization) from: Introduction to Database Management System • Define Requirements for database • Define end-users view for database • Define Outputs and Transactions Reports for database • Define Security Requirements for database 4. Project Management • Read/Review the following chapters from: Agile Database Techniques: Effective Strategies for the Agile Software Developer. o Chapter 01 (The Agile Data Method) o Chapter 23 (How You Can Become Agile) o Chapter 24 (Bringing Agility into Your Organization) Module 1 Resources eBook: • • • • Introduction to Database Management System – By: Satinder Bal Gupta and Aditya Mittal (http://library.books24x7.com.ezp02.lirn.net/assetviewer.aspx?bookid=34047&chunkid=518679005&rowid=1072) Agile Database Techniques: Effective Strategies for the Agile Software Developer – by: Scott W. Ambler http://library.books24x7.com.ezp-01.lirn.net/toc.aspx?bookid=11189 Lynda: Foundations of Programming: Databases http://www.lynda.com/Programming-tutorials/Foundations-ProgrammingDatabases/112585-2.html Websites: APA – Purdue University https://owl.english.purdue.edu/owl/resource/560/01/ Microsoft: (Databases) http://technet.microsoft.com/en-us/library/ms189317(v=sql.105).aspx Software: Microsoft Project Discussion Live session discussion on: Your experience in gathering / figuring out the requirements for database: • Who are the stakeholders? • What are the stakeholders’ views of the database? • What are the business rules you considered? • What resources did you use and what research did you conducted to come up with the requirements? • How are you managing your agile project? Module 2 Database Design Introduction: This Module is all about database design. It provides an overview of the Database Design and process. The conceptual design process will be explored and applied to the company database project. The data and database modeling will be reviewed. The Entity Relationship Diagram (ERD) for the database will be created according to the defined requirements from module 1. Module Competencies: • Organize a team and associated tasks and resources to gather customer requirements and business rules develop an ERD, develop the processing and security requirements, and develop the physical database structure. • Develop an entity relationship diagram that reflects an organization's business structure and business rules. • Convert a conceptual model to a physical model based on the selected database management system. Task 2: Database Design Process – complete an ER Diagram for the proposed Database to include: • Physical Model Diagram • Design Presentation Slides • Project Status . 1. Logical Design Process • Read/Review Chapter 2 (E-R and EER Models) from: Introduction to Database Management System • Watch “Data Modeling” Video | Lynda Database Modeling 2. Entity Relationship Modeling • Read / Review the following Sections from: Data Modeling-Logical Database Design o Section 1 (Data Modeling Theory & Concepts) ▪ Workshop Section: Review and Complete the exercise o Section 2 (Building an Initial Data Model) ▪ Workshop Section: Review and complete the exercise o Section 3 (Drawing A Model Using Software Engineering Tools) ▪ Workshop Section: Review and complete the exercise • Watch “Data Modeling” Video | Lynda Database Modeling: Relationships • Investigate on the web and in the resources: entities, attributes, domains and relationships • Develop the ER Diagram for database 3. Normalization Process • Read/Review Chapter 6 (Functional Dependency and Normalization) from: Introduction to Database Management System • Watch “Data Modeling” Video | Lynda Database Modeling: Optimization • Normalize set of tables 4. Physical Design Process • Read / Review the following Section from: Data Modeling-Logical Database Design o Section 10 (Logical / Physical Model Transformation) ▪ Workshop Section: Review and complete the exercise Presentation Slides Prepare presentation slides for database design Module 2 Resources eBook: • • Introduction to Database Management System – By: Satinder Bal Gupta and Aditya Mittal (http://library.books24x7.com.ezp02.lirn.net/assetviewer.aspx?bookid=34047&chunkid=518679005&rowid=1072 Data Modeling—Logical Database Design By: By: Sideris Courseware Corporation http://library.books24x7.com.ezp02.lirn.net/assetviewer.aspx?bookid=45790&chunkid=1&rowid=2 Lynda: Database Modeling http://www.lynda.com/Programming-tutorials/Foundations-ProgrammingDatabases/112585-2.html Websites: Microsoft: http://msdn.microsoft.com/enus/library/windows/desktop/ff728828(v=vs.85).aspx Software: Microsoft Visio Discussion Live session discussion on: • Your experience in creating the ER diagram o What did go right? Why? o What did go wrong? Why? • Database design presentation (30 Minutes) Module 3 SQL and Creating Database Structure Introduction This module provides an overview of the Structured Query Language (SQL). The database will be created according to the database design and will be tested to satisfy the database defined requirements from Module 1. Module Competencies: • Determine the SQL (DDL and DML) requirements to support an organizations data needs. Task 3: Create a Database Structure for the project. Provide sample copies of the structure and an update on project status. 1. SQL Essentials • Watch “SQL Essential Training” Video | Lynda SQL Essential Training 2. Database Structure (DDL) • • Read / Review the following Section from: Data Modeling-Logical Database Design o Section 11 (RDBMS Implementation of the Physical Model) • Workshop Section: Review and Complete the exercise Create the Database Structure Module 3 Resources eBook: • Introduction to Database Management System – By: Satinder Bal Gupta and Aditya Mittal (http://library.books24x7.com.ezp02.lirn.net/assetviewer.aspx?bookid=34047&chunkid=518679005&rowid=1072 • Data Modeling—Logical Database Design By: By: Sideris Courseware Corporation http://library.books24x7.com.ezp02.lirn.net/assetviewer.aspx?bookid=45790&chunkid=1&rowid=2 Lynda: SQL Essential Training Video | Lynda http://www.lynda.com/SQL-tutorials/SQL-Essential-Training/1399882.html?srchtrk=index:1%0Alinktypeid:2%0Aq:sql%0Apage:1%0As:relevance%0Asa:true %0Aproducttypeid:2 Websites: Microsoft (Databases) http://msdn.microsoft.com/enus/library/windows/desktop/ff728828(v=vs.85).aspx Software: One of the following database platforms: • Microsoft MySQL • Microsoft SQL Server • Oracle SQL Server Discussion Discuss the creation of the Database structure: Questions: 1. What is the database structure? 2. How many tables did you create? 3. What SQL platform are you using? Module 4 Creating the Database Prototype Introduction In this Module the database will be created. The Database will be populated from a given databank with sufficient data to represent a reasonable model of the actual large database. The database will be tested for the database defined requirements. Module Competencies: • Determine the SQL (DDL and DML) requirements to support an organizations data needs. Task 4: Create a Prototype of the database to include sample database tables, Database Test Plan document, and Project Status 1. Complete the prototype development of the database. 2. Complete the database test plan document. 3. Populate the database (DML) with data from the company databank. 4. Test the database for defined requirements, including security requirements. Discussion Discuss your Test Plan and your approach for testing the UI prototype Questions: 1. Did you test the database? How did it go? 2. Did you have to modify the database design? 3. Did you create scripts to automate some DML functions? Module 5 Final Database Project and Reports Introduction: This module is to provide business reports from the database. The BI reports are generated using the database prototype. The Database prototype is Competencies: Apply Agile SCRUM project management techniques in the development and management of a database development project. Task 5: You are a member of a consultant team brought in to design and implement a Database Management System for the Innovative company. The team should deliver a well-tested and live prototype of the proposed RDBMS. The implemented RDBMS (prototype) must be at the level and details that could be expanded later and fully implemented. This includes: Complete set of Database documents and other artifacts Sample of database Reports Deliver DBMS (prototype) for the chosen company. A live demonstration of the proposed RDBMS (prototype) is also required. Generating BI Reports 1. Watch the “Database Modeling: Querying” Video | Lynda Database Modeling: Querying 2. Generate the BI report according to the defined requirements. 3. Prepare for the presentation / demonstration Complete the RDBMS and prepare to deliver the DBMS (prototype) to the company managers. Project deliveries include documentations for: • Data and Requirement Analysis, • Database Design Diagrams • Database Test Plan • Sample Database Tables and Reports • Project Management Reports You should now be ready to give a live demonstration of the proposed RDBMS (prototype) to management. Module 5 Resources eBook Lynda: Database Modeling: Querying http://www.lynda.com/Programming-tutorials/Foundations-ProgrammingDatabases/1125852.html?srchtrk=index:1%0Alinktypeid:2%0Aq:foundations%2Bof%2Bprogramming% 2B%5C-%2Bsql%0Apage:1%0As:relevance%0Asa:true%0Aproducttypeid:2#
Purchase answer to see full attachment
Explanation & Answer:
2 parts
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hello, I have uploaded the final copy. Please review the paper, and let me know in case you need any edits. Thank you for giving me an opportunity to serve you😍 😍

A Plan for Carrying Out a White Hat Penetration Test of a Company
Name
Institution
Professor
Course
Date

PART ONE: SUMMARY OF AN ARTICLE
This article is authored by Chris Hoffman and published on the How-To Geek
technology magazine. Chris is the editor in chief of this magazine. In this article, he provides
a meticulous explanation of each of the three hacker hat colors, which include black hat,
white hat and gray hat. According to Chris, hackers are not intrinsically bad. On the same
note, being a hacker does not mean that an individual is a criminal. This is the reason why
hackers have been classified into different categories depending on the motive behind their
acting activity. Chris clarifies that the work hacker is an ambiguous term that could either be
used for describing an individual who compromises the security of computer systems or a
highly knowledgeable software developer in open-source movements. Each of the different
types of hackers is described below.
Black-Hat Hackers
According to Hoffman (2017), black-hat hacker is the most popular type of hacker.
Most media platforms focus on this type of hacker. These are hackers whose aim is infringing
computer security for their gains. For example, they interfere with the security of a computer
system with the aim of stealing confidential information such as credit card numbers, social
security numbers or even stealing money from an organization. Also, the black-hat hacker
can comprise the security of a computer system for purely malicious purposes. For example,
the black hacker can carry out malicious activity on a system by developing a botnet and
using the same to conduct DDOS attacks against the targeted system. In doing so, they
interrupt the normal functioning or working of the computer system. Besides, they can cause
enormous losses to the targeted organization. Thus, black hats can better be described as
computer criminals.

White-Hat Hackers
They are normally referred to as white hats. This is the perfect opposite of the blackhat hackers. According to Hoffman (2017), white-hat hackers are ethical hackers. They are
whizzes in the hacking of computer systems. However, they use their hacking knowledge and
expertise for legal and ethical purposes instead of felonious and unethical purposes. The
majority of the white hats are hired by firms for purposes of testing organization’s computer
security systems and consequently advising the firm on what needs to be done in order to
toughen the computer security systems. White hats are authorized by firms to try to comprise
their computer systems. They use their ability to penetrate a firm’s computer system not to
sabotage or steal from the firm but to help it to advance its defences. The hac...


Anonymous
Just the thing I needed, saved me a lot of time.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags