White Hat Hacking

Topic: White Hat Hacking

Abstract – Brief summary that identifies the purpose, goal, problem, methods, results, and conclusion of your work. (Format- Introduction, Body and Conclusion). 

Paper Format- Write 3 full-pages word, double spaced paper, written in APA format, showing sources and a bibliography.

Include this information for your research:

Purpose-

· Why did you decide to do this study or project?

· How did you conduct your research?

· What did you find?

· Why is this research and your findings important?

· Why should someone read your entire essay?

Problem-

· What problem is your research trying to better understand or solve?

· What is the scope of your study – a general problem, or something specific?

· What is your main claim or argument?

Method- 

· Discuss your own research including the variables and your approach.

· Describe the evidence you have to support your claim

· Give an overview of your most important sources.

Results-

· What answer did you reach from your research or study?

· Was your hypothesis or argument supported?

· What are the general findings?

Conclusion-

· What are the implications of your work?

· Are your results general or very specific?

References-

· Scholarly articles (ex. Harvard etc), peer-reviewed journals, publications, textbooks

w6

In 300 Words, Describe the plain view doctrine, and why  it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case.

Emerging threats_4.1

Question:

For this assignment, please review the below attachment and evaluate it in 3 pages (800 words), using your own words, by addressing the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.

Your paper should meet the following requirements:

  • Be approximately three pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Note: Answer should be in APA format and no plagiarism

4s week 4 assignment EH

In 350 words

There are many mobile platform vulnerabilities listed in the readings from this week (slides 8, 9, and 10 attached). Which do you feel is the greatest threat to users? Do you agree that people generally are not aware of the threats to their mobile devices? 

Include references, No copy paste.

Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.

 

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges. Once you have chosen an organization, this will be the organization you use throughout the remainder of the course. This paper should be written in third-person. The third-person point of view belongs to the person (or people) being talked about. The third-person pronouns include he, him, his, himself, she, her, hers, herself, it, its, itself, they, them, their, theirs, and themselves (Not I, we, us, our).

Write a one-page organizational overview using APA (7th Edition) formatting.  The Title and Reference pages do not count towards the page count requirements. The organizational overview should include:

  • A brief history
  • Mission (If you quote the mission directly, be sure to follow APA for direct quotes)
  • Goals
  • Achievements

The paper must adhere to APA guidelines including Title and Reference pages (no abstract).  There should be at least one scholarly source listed on the reference page.  Each reference cited in the text must appear in the reference list, and each entry in the reference list must be cited in text. APA requirements for this class include:

  • 12-point Time New Roman font
  • Your paper should be typed and double-spaced with 1″ margins on all sides
  • The first sentence of each paragraph should be indented one tab space
  • All papers should contain the page number, flush right, in the header of every page. Use the automatic page-numbering function of your word-processing program to insert page numbers in the top right corner; do not type page numbers manually.
Preview the document

read the attachment and answer the question.

Read the attached Ethics-V.pdfPreview the document which continues the discussion on the professional codes of software engineering ethics.

Then proceed to answer the questions inside the reading:

  • Questions 8.1 and 8.2
  • Case Study: Questions C1-C4

Because for many ethics questions there is no absolutely right or wrong answers as such, your responses will be graded based on completeness and thoughtfulness as opposed to rote or perfunctory ones. There are three grade levels for this assignment based on your responses to all the questions: 20 (no reasoning in responses), 35 (minimal to little reasoning), and 50 (sufficient reasoning and consideration).

Write your answers in a Word file using Times New Roman font (no smaller than 10 pt but no bigger than 12 pt), single spacing, 1″ margins on all sides.

Save your file as Ethics_5_FL where FL is your first and last name initial and Submit.

problem

 

  1. The following describes the simple hash function:

    Choose p, q primes and compute N = pq.
    Choose g relatively prime to N and less than N.

    Then a number n is hashed as follows:

    H = gn mod N

    If there is an m that hashes to the same value as n, then

    gm ≡ gn mod N

    so

    gm-n ≡ 1 mod N

    which implies that

    m –n ≡ 0 mod φ (N)

    So breaking this amounts to finding a multiple of φ (N), which is the hard problem in RSA.

    1. Write a function that takes a bit length n and generates a modulus N of bitlength n and g less than N and relatively prime to it.
    2. Show the output of your function from part (a) for a few outputs.
    3. Using N, g, n as arguments write a function to perform the hashing.
    4. For the following parts (a)-(d) compute the simple hash:
    5. N = 600107, g = 154835, n = 239715
    6. N = 548155966307, g = 189830397891, n = 44344313866
    7. N = 604766153, g = 12075635, n = 443096843
    8. Write a function that creates a collision given p and q.  Show that your function works for a couple of examples.

Writing assignment

In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs.