Course: IT530 Unit: 5 Points: 120
Copyright Kaplan University
Unit 5 Assignment
Outcomes addressed in this activity:
Explain flow control and congestion management and their significance to overall network performance Evaluate standard routing techniques and their application to a business’ internet connectivity Recommend a comprehensive security plan
Plan and describe methods to secure data including encryption techniques and security protocols Assess LAN communications and management protocols and examine their significance in business environments
IT530-5: Analyze issues surrounding the connectivity and administration of networks. Assignment Instructions:
1. In recent years, the concept of “ethical” hacking has grown in importance as more companies consider hiring “black hat” hackers as security consultants. Research the elements that comprise “ethical” hacking. In what ways does ethical hacking differ from “black hat” hacking? Put yourself into the position of a system administrator considering hiring a hacker. How would you ensure that this individual was actually strengthening your company’s network security rather than hacking into your company’s sensitive data? Would you even consider hiring a hacker in the first place? Why or why not? Try to find at least one example of a real world “ethical” hacker being hired; was it a good or bad decision on the part of the company?
2. Based on your research, write an 8 to 10 page paper that researches the concept of “ethical” hacking, as well as the ethical dilemmas inherent in hiring a hacker as a security consultant. Preparing your Assignment
The written essay/paragraph formatted paper should be 8 - 10 pages long NOT including cover page and references. As you research ethical hacking, ALL of the pages must have citations and references. No more than one direct quotation (of 40 words or more) is allowed per page and bullet lists...