cyb505

Category: Information System

 

Ethics, and not knowledge, separates thieves from detectives and hackers from security administrators. However, a detective must think like a thief to catch a thief; in other words, white hat hackers should be able to think as black hat hackers in order to thwart their future attacks.

Research any case that pertains to a white hat and black hat hacker or a white hat and gray hat hacker. Then, from a white hat hacker standpoint, address the following:

  1. Summarize the case briefly.
  2. Describe what tools and technologies were used to support confidentiality, integrity, and intellectual property.
  3. Describe the threat vectors, motivations, and ideologies used by the black or gray hat hacker.
  4. Explain how the white hat hacker provided security solutions.

Present this information in any kind of visual (e.g., diagram, PowerPoint presentation, cartoon, graphic organizers, or infographics). Creativity is encouraged as long as the above concepts are clearly communicated.

APA style is not required, but solid academic writing is expected.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Pay Someone To Write Essay