100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Overig

Ethical Hacking - Assignment 1 ()

Beoordeling
-
Verkocht
1
Pagina's
20
Geüpload op
09-02-2022
Geschreven in
2021/2022

This assignment fully covers the following and has carefully been checked to achieve top marks possible. Part A & B 1. EXPLAIN AND CRITICALLY DISCUSS THE ETHICAL ISSUES RELATING TO THE PERFORMANCE OF PENETRATION TESTING. 2. EXPLAIN AND ANALYSE THE STAGES REQUIRED BY AN ETHICAL HACKER TO SUCCESSFULLY COMPROMISE A TARGET. 3. DEMONSTRATE A CRITICAL KNOWLEDGE OF THE TOOLS, METHODS AND PROCEDURES USED WITHIN THE NETWORK SECURITY ARENA.

Meer zien Lees minder
Instelling
Vak










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Studie
Vak

Documentinformatie

Geüpload op
9 februari 2022
Aantal pagina's
20
Geschreven in
2021/2022
Type
Overig
Persoon
Onbekend

Onderwerpen

Voorbeeld van de inhoud

15/01/2022 Ethical Hacking –
Assignment 1 (Final)




GENC Muhammed
STUDENT ID: 20021350
SUBJECT: ETHICAL HACKING

,Table of Contents
Task 1: Cyber Attacks...............................................................................................................2
Introduction.............................................................................................................................................2
Discussion of five attacks:........................................................................................................................2
Conclusion:..............................................................................................................................................6
Task-2: Network Traffic Analysis..............................................................................................7
Network security tools:............................................................................................................................7
Network Traffic Analysis:.........................................................................................................................7
Benefits of Network Traffic Analysis:.......................................................................................................8
Wireshark:...............................................................................................................................................9
Kali Linux:...............................................................................................................................................10
Packet Capturing File Analysis:..............................................................................................................11
References:............................................................................................................................18




1

, Task 1: Cyber Attacks

Introduction
The term Ethical hacking is the practice of hacking into a network by an individual or a company
to determine where potential security threats may originate within the organization's computer
network. It is then necessary to manipulate the information that the ethical hacker has
discovered in order to address potential threats and strengthen the computer network as
needed. It is the process of bypassing or cracking security measures that have been
implemented by a system in order to identify vulnerabilities, data breaches, and potential
threats. It is only considered ethical if the regional or organizational cyber laws/rules are
followed in the process. Penetration testing is the term used to describe this job informally. As
the name implies, this practice entails attempting to infiltrate a system and documenting the
steps taken because of the attempt.

Discussion of five attacks:
In the below section of the report, the selected platform is the IoT. And based on this platform
the selected 5 attacks are-

a. DoS attack,
b. Password attack,
c. SQL injection,
d. Phishing and
e. Cross-site scripting

DoS attack vector:

An attack associated with Distributed Denial-of-Service associated with overloading a website
and rendering it inoperable in order to cause traffic to be diverted away from it. However,
attacks are typically transferred out with the guidance of botnets that are used to overwhelm a
website's ability to respond to requests until the site is no longer functional (Georg et al., 2018).




2

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
johnatkinson Staffordshire University (London)
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1536
Lid sinds
6 jaar
Aantal volgers
996
Documenten
18
Laatst verkocht
6 maanden geleden
BTEC National Extended Diploma IT Level 3 (RQF 2016/17) Resources

Hello and welcome to my page! My target is to help the students pass courseworks and those that aim to be achieving top marks (i.e Merit/Distinction). I had recently been new to this website for about a few months ago and I do feel amazed to bring all the content I have and release to the public for delivering their support plus guiding them through step by step. My assignments are mostly 100% plagiarism-free containing useful content and headings to cover all grade criteria. Payment is 100% reliable! If you have any particular problem? simply contact me and you will be refunded. 100% Money Back Guarantee Coming soon: Furthermore, I will be publishing assignments for Cyber Security BSc (hons) soon which may be able to fulfil your expectations and satisfactions, stay updated with the latest news!

Lees meer Lees minder
3,7

390 beoordelingen

5
167
4
86
3
52
2
24
1
61

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen