100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Other

Week6_CourseProject ALL ANSWERS 100% CORRECT FALL-2021/2022 SOLUTION GUARANTEED GRADE A+

Rating
-
Sold
-
Pages
6
Uploaded on
07-12-2021
Written in
2021/2022

The terms of hackers and being related to Hat denotes the intent of a person’s use of information in the hacker world. Ethics are the foundation of what het a hacker wears. The idea is that morals are the importance of what a hacker should do in a situation where there are vulnerabilities that could damage a system. In a situation where there are exploits in a system that could easily be used to get vital information should be records and fixed. If the ethics do not apply to that person typically they are Black hats. Then if the ethical code does apply by performing tasks using the information to strengthen a network would be a White hat. The Grey hats are a bit more complicated in the fact that they wish to perform on the ethical side as well as unethical. With the ultimate goal being the information and finding weaknesses in a system the hats are inevitably the future of security. Since the ethical code of a hacker is very straightforward it is easy to find a White hat. They are involved with companies and advertise skills to let other know what their capabilities are and how to fix them. “In the professional landscape, white hats work under the pretense of multiple job titles — security engineer, security analyst, ethical hacker, penetration tester, security researcher, etc.” (Knowles, 2016) These occupations operate under the ethical means through contracts and Non Disclosure Agreements (NDA). This protects the company and the hacker from any legal issue that may arise by performing tasks to find vulnerabilities. Since the information could be very sensitive and be used to exploit the company, the ethical hacker, is then doing the right thing by not releasing that information. The process of finding vulnerabilities is laid out step- by-step for the company prior to performing any tasks. This lets everyone know what is going to happen, what the results were, and how to fix them. There are no secrets when performing a penetration test, which is the ethics of a White hat. There is a more know name for hackers and that being the Black Hat. These are very skilled technicians at penetrating network systems and gaining access to information. Though there are variants to the malicious operations and how well they are performed. An attack of an experienced Black Hat enters the network then leaves without a trace of anyone being there. There may not be any intent of financial gain from an attack. The hacker may just out to see where the vulnerabilities are in the network to later plant code the will damage systems or computers. Also the political attack for information is common to getting control over a system to the funnel information out of the network without out alerting security. The Black Hats operate with out boundaries and rules that have to be approved. Which is also the other end of saying they are more experienced than any other hat since they operate without limitations.

Show more Read less









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
December 7, 2021
Number of pages
6
Written in
2021/2022
Type
Other
Person
Unknown

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Allan100 Rasmussen College
View profile
Follow You need to be logged in order to follow users or courses
Sold
644
Member since
4 year
Number of followers
605
Documents
3268
Last sold
3 weeks ago

3.5

92 reviews

5
36
4
17
3
15
2
5
1
19

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions