unit 1 Discussion board for Ethical Hacking and penetration testing

User Generated

froyrlr16

Computer Science

AIU ONLINE

Description

Assignment Details

Assignment Description

In your own words, answer this unit's discussion questions in a main post (recommended minimum 300 words), and respond to at least 2 peers’ postings (recommended minimum 75 words).

After you have reviewed the Assignment Details below, click the Discussion Board link under the My Work heading above to open the Discussion Board and make your post.

Assignment Details

Your colleagues heard that you are starting to hack the company's systems, and they start asking you questions, initially focusing on the ethical nature of the topic. You want to tell them how and why the hacking that you will be doing will actually help the company.

  • Discuss the process of hacking, in terms of white hat, black hat, and grey hat hackers.
    • How does each one of these differ, and how are they the same?
    • Why do ethical hackers study the methods of black hat hackers?
  • Provide definitions for the following concepts:
    • White hat hackers
    • Grey hat hackers
    • Black hat hackers
  • Describe why white hack hackers need to learn what black hat hackers do and the mechanisms they use to accomplish their tasks.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hello, kindly find the attached completed work. Thank You

Running head: THE HACKING PROCESS

1

The Hacking Process
Name
Institution of Affiliation
Date

THE HACKING PROCESS

2

Process of Hacking
Hacking is commonly known and referred to as a mischievous act which many people
dread. However, hacking is not all about unauthorised access as people deem. It is important
to note that all hackers have knowledge about hacking (Boy, 2015). What they intend to do
with the information on how to hack, whether to help or for malicious causes is what
differentiates the hackers. There are three main types of hackers, these are:
i)

Wh...


Anonymous
Really helpful material, saved me a great deal of time.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags