Topics: Black hat, Grey hat, Citation Pages: 3 (681 words) Published: April 15, 2013
Assignment Grading Rubric
Course: IT530 Unit: 5 Points: 120
Copyright Kaplan University
Unit 5 Assignment
Outcomes addressed in this activity:
Unit Outcomes:
Explain flow control and congestion management and their significance to overall network performance Evaluate standard routing techniques and their application to a business’ internet connectivity Recommend a comprehensive security plan

Plan and describe methods to secure data including encryption techniques and security protocols Assess LAN communications and management protocols and examine their significance in business environments

Course Outcomes:
IT530-5: Analyze issues surrounding the connectivity and administration of networks. Assignment Instructions:
1. In recent years, the concept of “ethical” hacking has grown in importance as more companies consider hiring “black hat” hackers as security consultants. Research the elements that comprise “ethical” hacking. In what ways does ethical hacking differ from “black hat” hacking? Put yourself into the position of a system administrator considering hiring a hacker. How would you ensure that this individual was actually strengthening your company’s network security rather than hacking into your company’s sensitive data? Would you even consider hiring a hacker in the first place? Why or why not? Try to find at least one example of a real world “ethical” hacker being hired; was it a good or bad decision on the part of the company?

2. Based on your research, write an 8 to 10 page paper that researches the concept of “ethical” hacking, as well as the ethical dilemmas inherent in hiring a hacker as a security consultant. Preparing your Assignment

The written essay/paragraph formatted paper should be 8 - 10 pages long NOT including cover page and references. As you research ethical hacking, ALL of the pages must have citations and references. No more than one direct quotation (of 40 words or more) is allowed per page and bullet lists...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • The Concept of Wireless Security Essay

Become a StudyMode Member

Sign Up - It's Free