Free Essay

White Hat

In:

Submitted By Boorchi
Words 523
Pages 3
Танд өдрийн мэнд хүргэе
Энэхүү судалгааны зорилго нь Монгол улсын банк санхүүгийн салбарт ажиллаж буй ажилчдын цалин, хөлсөнд нөлөөлөгч хүчин зүйлсийг тодорхойлоход оршино.
Ажил эрхлэлтийн байдал 1. Таны ажилласан жил: 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | | | | | | | | | | | | | | | | | | | | |

2. Та мэргэжлээрээ давхар ажил хийдэг үү? a. Тийм b.Үгүй 3. Та долоо хоногт хэдэн цаг ажилладаг вэ? b. 30-35 цаг b.36-40цаг c. 41-45цаг d. 45-50цаг e.50-аас дээш 4. Та амралтын өдрүүдээр нэмэлт цагаар ажилладаг уу? c. Тийм b.Үгүй 5. Та ямар байгууллагад ажил эрхэлж байна вэ? d. Банк e. ХЗХ f. Даатгал g. ББСБ h. Брокер диллерийн компани i. Санхүүгийн зөвлөгөө өгдөг консалтинг j. Аудитын компани k. Бусад/............................/ 6. Та ямар мэргэжлийн чиглэлээр ажилладаг вэ? a. Маркетинг b. НББ c. Санхүү удирдлага d. Бизнес удирдлага e. Эдийн засаг f. Худалдаа, борлуулалт g. Бусад/............................/ 7. Таны албан тушаал: l. Туслах ажилтан m. Мэргэжилтэн n. Ахлах мэргэжилтэн o. Хэлтсийн дарга p. Газрын дарга q. Захирал r. Бусад/...................../
Карьер төлөвлөлт 8. Та хэдэн жил суралцсан бэ? s. 4 хүртэл жил t. 4-6 жил u. 6-8 жил v. 8-10жил w. 10-аас дээш жил 9. Таны эрдмийн зэрэг x. Бакалавр y. Магистр z. Доктор {. Профессор |. Дэд доктор }. Дэд профессор 10. Та гадаадад суралцаж байсан уу? ~. Тийм b.Үгүй 11. Та өмнө нь ажлаа сольж байсан уу?/Үгүй бол 11-р асуулт руу/ . Үгүй b.1 удаа c.2удаа d.3-c дээш 12. Та хуучин ажлаа ямар шалтгаанаар орхисон вэ? . Цалин бага байсан . Ачаалал ихтэй байсан . Илүү өсөн дэвжих боломжтой ажил олсон . Хамт олны уур амьсгал муу байсан . Бусад/................................................./

13. Та мэргэжлийн тусгай зэрэгтэй юу?(Мэргэшсэн нягтлан-CPA, CFA гэх мэт) . Үгүй . Тийм 1)...........
2)….......
3)……...
Ажлын байрны бүтээмж 14. Та ажлын цагаа бусад ажилчидтай харьцуулахад хэр бүтээмжтэй өнгөрүүлдэг вэ? . 0-20% b.20-40% c.41-60% d.61-80% e. 81-100% 15. Та өөрийн ажлын орчноо үнэлнэ үү ? /1-Маш муу, 5-маш сайн/ | 1 | 2 | 3 | 4 | 5 | Ажиллах орчны таатай байдал | | | | | | Ажилд шаардлагатай тоног төхөөрөмжийн хүрэлцээтэй байх | | | | | | Ажлын байрны зай, саруул байх | | | | | | Ажлын байрны хангамж сайн байх | | | | | | Ажилтай холбоотой сургалт семинартогтмол зохион байгуулагддаг | | | | | | Хамт олон эерэг уур амьсгалтай байх | | | | | | 16. Та цалингаа өөрийн бүтээмжтэй харьцуулахад тань ямар хувь эзэлдэг гэж боддог вэ? . 60% . 80% . 100% . 120% . Бусад/.............../
Хувийн мэдээлэл 17. Таны хүйс a. Эрэгтэй b. Эмэгтэй 18. Таны нас: a. 20-22 b. 23-25 c. 26-28 d. 29-31 e. 32-34 f. 35-37 g. 38-40 h. 41-43 i. 44-46 j. 47-49 k. 50-аас дээш 19. Гэрлэлтийн байдал . Тийм b. Үгүй 20. Ам бүлийн тоо 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | | | | | | | | | | |

21. Таны нэрлэсэн цалингийн хэмжээ . 300000-400000₮ . 400001-500000₮ . 500001-600000₮ . 600001-700000₮ . 700001-800000₮ . 800001-900000₮ . 900001-1000000₮ . 1000001-1100000₮ . 1100001-1200000₮ . 1200001-1300000 . 1300001-1400000₮ . 1400001-1500000₮ . 1500001-1600000₮ . 1600001-1700000₮ . 1700001-1800000₮ . 1800001-1900000₮ . 1900001-2000000₮ . 2000001-2100000₮ . 2100001-2200000₮ . 2200001-2300000₮ . 2300001-2400000₮ . 2400001-2500000₮ . 2500001-2600000₮ . 2600001-2700000₮ . 2700001-2800000₮ . 2800001-2900000₮ . 2900001-3000000₮ . 3cаяас дээш 22. Таны утасны дугаар:...................................

Similar Documents

Free Essay

People Manager Prgramme

...advantages of social media are: * connect with distant friends and family * play games with friends and make new friends * learn about new things and research topics of interest * watch films, videos and TV shows from around the world * listen to music from 100's of different artists however with a positive there is also a negative these are: * stalkers, people who learn about your personal life and find ways to blackmail you into inappropriate tasks * pedophiles, people who ask for 'nudes' from both genders who are considered minors * 'hackers', these are people who gain access to personal files without permission. hackers fall into two categories these are; white hat hackers, who hack in to files to improve their efficiency and/or security or black hat hackers, who hack in to networks for personal or financial gain, not to help others. * cyberbulling, people who send hertful messages to other people on social media website * propaganda, people who spred mass lies to hundreds of people about a certain topic. and through all this we still use these site from day to day blind to the risks. so the next time you use a social media website such as face book take a minute to think about the risks....

Words: 269 - Pages: 2

Premium Essay

Computer Crime

...cases their knowledge is actually useful and most are authorized to hack into the systems. Some Hackers believe that hacking is a learning experience; including creative problem solving and educating others about the vulnerabilities with computer security. I feel that Hackers that are trying to protect other people are the Hackers that don’t find themselves criminals; however it is hard to determine in certain cases and situations what is legal and illegal hacking. The White Hat Hacker is the Hacker that wouldn’t consider their job a crime; some have graduated from college and work for large companies testing software, testing defenses, and creating defenses. Although they use their knowledge in a legal manner there are those that use their skills in an illegal manner. The Gray and Black Hat Hackers do use their skills in an unethical manner. The Gray Hackers usually performs in an ethical manner; however in certain occasions they enjoy hacking even if it is an illegal system they are hacking into. The Black Hat Hacker...

Words: 697 - Pages: 3

Free Essay

The World of Cybercrimes

...The World of Cybercrimes Cybercrimes are one of the most dangerous threats to our Nation. There are no boundaries when it comes to cybercrimes. A cybercrime is one of the fastest growing crime types of the century and includes criminal activity involving computers and the internet. Hacking a computer is not the only thing considered a cybercrime. Downloading movies and music illegally is also a cybercrime. Once thought as something that only the military or other government officials had to worry about, it is now on the rise since everyone has a computer and it is easy to find out how to hack into computer systems. With the rise of internet usage among businesses and private users, the risk of being a victim of cybercrime is huge. The Security Tracking Study performed by the Pomemon Institute states that 83 percent of multinational companies feel that within the past 12 months they have been a target of a cybercrime. Price Water House Coopers states that the number of businesses having a security breach is more along the lines of 92 percent. Cybercrimes are attacks on computer hardware and software, downloading illegal movies and music, online fraud involving financial crimes and corruption with an organization, crimes against children and the elderly, cyber bullying and fraudulent telemarketing events for charitable donations. What was once something only “hackers” did is now something anyone can do. The term hacker was originally described as “any technical effort...

Words: 8856 - Pages: 36

Free Essay

Chemistry

...White hat hackers are the ethical, legal hackers (2002). Companies pay them to find holes in software or networks and fix the problems. The difference between white hat hackers and black hat hackers is that white hats have permission to carry out their attacks on a company to fix the problems. (2) A majority of company owners say that white hat protection is the only true way to ensue security in their businesses. White hats use the same programs and knowledge as black hats do. They usually stay in the cyber underworld to keep updated on attacks and information. Black hat hackers are the most rare and elite of all the hacker groups. Most are connected with criminal activities, such as espionage. (2001) Not all hackers labeled black hat hackers are connected with criminal activities in real life. There are many "old school" hackers considered black hat. They are the ones that are usually from the 1960's and use the word hacker with honor and freedom. (Quinter 2) Most of these hackers do not have a negative intent they are usually programs from Stanford or MIT. They have good ethics and believe in open source and fixing flaws in programming. Most black hat hackers are criminals and are very powerful. (Glenn 8) Political and personal revenge is a major motivating factor in becoming a true black hat hacker, but the most elite hackers go for the money. Industrial espionage is one of the best paid jobs for a hacker. A typical espionage attacks takes about three weeks and they...

Words: 4683 - Pages: 19

Free Essay

Computer Ethics

...different types of hacking. Bluetooth hacking is one form. Bluetooth hacking is when the Java programming language is used to gain access to various cellular phones. For this process to work the phone that is targeted to be hacked must be able to support JSR-82, this is the official Java Bluetooth Application Programming Interface. The best way to prevent your phone from being hacked using a bluetooth is to set your bluetooth security level to Security Level 3. In this mode an authorization and authentication is required in order to be used. Hackers comes in all different forms. Most of them are college students, mobsters, vandals, protesters, corporate spies, and even journalist. (Dysart, 2011). White hat hacking is when a person hacks or breaks security to test their own security. White hat hackers...

Words: 1560 - Pages: 7

Premium Essay

Network Security and Ethical Hacking

...Network Security & Ethical Hacking ------------------------------------------------- ------------------------------------------------- Neal Patrick and his friends did not realise they were doing anything unethical, in fact: when asked by Congress “At what point he questioned the ethics of his actions” – he answered “Once the FBI knocked upon my door.” “I have found that inadequate network security is usually caused by a failure to implement security policies and make use of the security tools that are readily available. It’s vital that companies complete professional risk assessments and develop comprehensive security plans and infrastructures that are publicly supported by upper management” Network security is not only about the WAN (Wide Area Network) but also the LAN (Local Area Network) as the two go hand in hand. It is possible to not only have an attack from the Internet but also internally. The moment any form of computer device becomes network capable or dependent of some form of network function, there is a given need for protection to safeguard the flow of information to and from the said device on a given network whether public or private and/or from a trusted to non-trusted source. The problem with locking down a network tightly is the administrative overhead it creates. The more secure the network becomes the greater the need is for someone or a team to administrate this. Eventually you would reach a point where it becomes impossible for the end-user...

Words: 5261 - Pages: 22

Premium Essay

Kentucky Derby Hat

...route=news/article&news_id=52 How to Choose the Perfect Derby Hat The Kentucky Derby has always proven to be synonymous with trendy clothing and high fashion. It is that time of the year for women to let their southern belle out. Billowing dresses and skirts as well as large embellished hats are considered the norm rather than an exception. What’s more, now, the Derby is renowned as much for the continuous display of gobsmacking hats as it is for the horse races. That being said, how to choose the perfect derby hat? Read on. (1) The Perfect Fit The hat’s fit is extremely important and can never be overlooked. It should fit in a comfortable manner, without sitting too far behind...

Words: 477 - Pages: 2

Free Essay

Aaaaaaaaaa

...old woman lived in this desolate spot with only her daughter and she had never seen Mr. Shiftlet before, she could tell, even from a distance, that he was a tramp and no one to be afraid of. His left coat sleeve was folded up to show there was only half an arm in it and his gaunt figure listed slightly to the side as if the breeze were pushing him. He had on a black town suit and a brown felt hat that was turned up in the front and down in the back and he carried a tin tool box by a handle. He came on, at an amble, up her road, his face turned toward the sun which appeared to be balancing itself on the peak of a small mountain.The old woman didn't change her position until he was almost into her yard; then she rose with one hand fisted on her hip. The daughter, a large girl in a short blue organdy dress, saw him all at once and jumped up and began to stamp and point and make excited speechless sounds.Mr. Shiftlet stopped just inside the yard and set his box on the ground and tipped his hat at her as if she were not in the least afflicted; then he turned toward the old woman and swung the hat all the way off. He had long black slick hair that hung flat from a part in the middle to beyond the tips of his ears on either side. His face descended in forehead for more than half its length and ended suddenly with his features just balanced over a jutting steeltrap jaw. He seemed to be a young man but he had a look of composed dissatisfaction as if he understood life thoroughly."Good evening...

Words: 4780 - Pages: 20

Free Essay

Hackers: Scourge of the Internet, or Information Superhero?

...the uninformed. Hacking is bad, and there is no arguing that… Or is there? Most of what people know of hacking comes from the news or Hollywood movies such as Hackers and Swordfish. What they see is only one facet of this fascinating, yet misunderstood world. Hacking is not the evil act that some make it out to be. Hacking can also be a good thing. Enter the White Hat, or Ethical Hackers. These are the network security professionals in which no movies are based. Ethical hacking is used to help analyze networks for security flaws, stop attacks in progress and help keep companies in compliance with government regulations such as PCI or SOX. What is Ethical Hacking? Ethical hacking sounds like an oxymoron, but it does exist and is a very handsomely paying career field. The average ethical hacker can make anywhere from $24,760 a year to $111,502 (InfoSec Institute, n.d.). It does not stop there however. Some contracts can net an ethical hacker up to $17,500 in bonuses. (Computer Hope, n.d.). The main role of the ethical hacker is to penetrate a business network in order to recognize and fix security flaws before a “Black Hat” hacker can get to it. There is no such thing as a “fully secure” network,...

Words: 2096 - Pages: 9

Premium Essay

Data Breach Research Papaer

...Secure or Breached? As technology is becoming more prevalent the manner in which we store information is changing. Gone are the days of information being stored into file cabinets. Instead information is stored in databases, a system of hard drives that stores information electronically normally accessible remotely. With this comes a rise in hackers and correspondingly a rise in security breaches, where hackers have access to sensitive information. Vulnerabilities are the root of all hacks. For businesses, they result in a decline in reliability. If an individual or a group wants to breach information, they will almost always find a way. With the increasing need for information databases, businesses have to weigh the risks of hacks. When an individual allows their information to be stored in a database, with or without their knowledge they are at risk. When this information enters the database, it becomes the business's responsibility to protect this information. With the amount of sensitive data being stored in databases, current cyber security measures and laws are not up to par. Infamous Data Breaches In 2015, there were 781 data breaches according to the Identity Theft Resource Center (ITRC). One of these infamous breaches being with Anthem, otherwise known as BlueCross BlueShield insurance company. In this breach, hackers stole over 80 million social security numbers and other sensitive information of customers was obtained by the hackers. Similar to Anthem, Target experienced...

Words: 1455 - Pages: 6

Premium Essay

Ethical Hacking

...Danish Jamil et al. / International Journal of Engineering Science and Technology (IJEST) IS ETHICAL HACKING ETHICAL? DANISH JAMIL Department of Computer Engineering, Sir Syed University of Engineering & Technology, Main University Road, Karachi, Sindh-75300,Pakistan mallick251@hotmail.com MUHAMMAD NUMAN ALI KHAN Department of Computer Engineering, Sir Syed University of Engineering & Technology, Main University Road, Karachi, Sindh-75300,Pakistan mallick89@yahoo.co.uk Abstract : This paper explores the ethics behind ethical hacking and whether there are problems that lie with this new field of work. Since ethical hacking has been a controversial subject over the past few years, the question remains of the true intentions of ethical hackers. The paper also looks at ways in which future research could be looked into to help keep ethical hacking, ethical. Keywords— Ethical hacking, hacking, hackers, education and training, risk management, automated security I. INTRODUCTION Understanding the true intentions of the general public is quite a hard task these days, and it is even harder so, to understand the intentions of every single ethical hacker getting into vulnerable systems or networks. Technology is ever growing and we are encountering tools that are beneficial to the general public, but in the wrong hands can create great controversy, breaching our basic right to privacy, respect and freewill. The constant issues highlighted by the media always reporting some type...

Words: 3974 - Pages: 16

Free Essay

Hahhahuahuoh

...The reality, however, is that hackers are a very diverse bunch, a group simultaneously blamed with causing billions of dollars in damages as well as credited with the development of the World Wide Web and the founding of major tech companies. In this article, we test the theory that truth is better than fiction by introducing you to ten of the most famous hackers, both nefarious and heroic, to let you decide for yourself. Black Hat Crackers The Internet abounds with hackers, known as crackers or "black hats," who work to exploit computer systems. They are the ones you've seen on the news being hauled away for cybercrimes. Some of them do it for fun and curiosity, while others are looking for personal gain. In this section we profile five of the most famous and interesting "black hat" hackers. Jonathan James: James gained notoriety when he became the first juvenile to be sent to prison for hacking. He was sentenced at 16 years old. In an anonymous PBS interview, he professes, "I was just looking around, playing around. What was fun for me was a challenge to see what I could pull off." James's major intrusions targeted high-profile organizations. He installed a backdoor into a Defense Threat Reduction Agency server. The DTRA is an agency of the Department of Defense charged with reducing the threat to the U.S. and its allies from nuclear, biological, chemical, conventional and special weapons. The backdoor he created enabled him to view sensitive emails and capture employee...

Words: 1397 - Pages: 6

Free Essay

Compare and Contrast Hackers, Crackers & Ceh

...As long as there has been computer technology, individuals have sought to test the limits. The first computer virus, The Morris Worm, was little more than a young adult testing the boundaries of communication. In later interviews with (Morris name), he has often commented of his surprise at the results from his worm. Morris and others testing the boundaries is given the moniker “hacker," their mens rea is not malicious they simply seek to test, identify and communicate weaknesses in technology systems. The hacker label contrasts with "cracker" who seeks to discover weaknesses for personal or financial gain and is certainly malicious. Newer to the world of hackers and crackers is the certified ethical hacker. The EC-Council, responsible for the certified ethical hacker certification, distances itself from both labels and the negative connotations associated. This document will offer a comparison of crackers, hackers and the certified ethical hacker. The term hacker is said to have evolved out of MIT’s computer culture when the Tech Model Railroad Club hacked model trains to make them run faster. As Universities across the country embraced the hacker concept they remained isolated until the first year of ARPAnet in 1969, “the first transcontinental, high-speed computer network” ("Early Hackers," n.d., para. 3). For better or for worse, hacker has had quite a public history; it is the preferred label describing all activities from security research through credit card theft...

Words: 880 - Pages: 4

Free Essay

Hacking

...denial-of-service attack, hackers launched attacks against eBay, Yahoo!, CNN.com., Amazon and others. • 2007 – Bank hit by “biggest ever” hack. Swedish Bank, Nordea recorded nearly $1 Million has been stolen in three months from 250 customer account. Types of hackers Knowledge based: • Coders • Admins • Script kiddies Legality based: • Black hat hacker • White hat hacker • Grey hat hacker Script Kiddies: – who use scripts or programs developed by others to attack computer systems and networks and deface websites.[ Phreak – Person who breaks into telecommunications systems to [commit] theft Cyber Punk – Recent mutation of … the hacker, cracker, and phreak White hat hacker who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems. Black hat hacker A black hat is the villain or bad guy, especially in a western movie in which such a character would stereotypically wear a black hat in contrast to the hero's white hat. Gray hat hacker A grey hat, in the hacking community, refers to a skilled hacker whose activities fall somewhere between white and black hat hackers on a variety of spectra Ethical hacking • It is Legal • Permission is obtained from the target • Part of an overall security...

Words: 383 - Pages: 2

Free Essay

Lab 1

...a. An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. b. Black hat: Hacks systems to do damage, cause harm, or to steal information without a consent. Grey hat: Walks the line between good and evil hacking. These hackers have the potential to be either a white hat hacker or a black hat hacker. White hat: Gets hired by a company to hack into their system to test and see if there are potential weaknesses within the network. c. A malicious user is an individual or group who has the knowledge, skills, or access to compromise a system's security. A malicious user could be a black hat hacker, grey hat hacker, or and white hat hacker. d. Hacking your own system exposes your system’s weaknesses. Once your system’s weaknesses have been fixed, it decreases your chances of a potential threat. e. The goals of an ethical hacker is to use penetration testing methods on the customer’s system. It’s a structure means of investigating, uncovering, attacking and reporting. f. Trojan: Looks innocent, but its meant to cause harm. Malicious attacks: getting hacked. Spyware: is used to gather a user’s personal information. g. Formulate your plan, Execute your plan, Evaluate your results. 2. a. * Track what worked in previous tests and why. * Help prove what you did. * Correlate your testing with intrusion detection systems (IDSs) and other log files if trouble...

Words: 499 - Pages: 2