Unit 4 Journal Jasmine Battle IT 590 – Kaplan University 11/27/2013 Unit 4 Journal In Unit 4, I learned how hacking have become a huge issue with technology in today’s society. I learn three ways to capture someone username and password. You can do that by eavesdropping, dumpster diving, and social engineering. People are also hacking into users’ networks. Sidejacking is a way where hijackers capture a user cookie. I learned in details more about malware. Malware consists of virus, worm
Words: 273 - Pages: 2
must include finding and eliminating vulnerabilities and exploits. 3) Which application is used for Step 2 in the hacking process to perform a vulnerability assessment scan?Nessus is a vulnerability assessment scanner that can be downloaded for home and educational use but can also be licensed for corporate, enterprise features and functions. 4) Before you conduct an ethical hacking process or penetration test on a live production network, what must you do prior to performing the reconnaissance
Words: 296 - Pages: 2
Program Guidebook Master of Science, Information Security and Assurance The Master of Science in Information Security and Assurance is a competency-based degree program that encompasses the main security domains of knowledge developed following strict guidelines for information security and assurance education prescribed by the National Security Agency. Understanding the Competency-Based Approach Practically speaking, what does it mean when we say that WGU’s programs are competency-based
Words: 4226 - Pages: 17
and I could easily use their Network. By not securing their network they could easily set themselves up for someone hacking Their computers. I do not believe it is legal, or ethical to use another person’s wireless network Without getting permission. This is the same as stealing from your neighbor, because they are Paying for those services. I would not want anyone hacking my internet or private information Devices. Sources: 'Intro_to_Information_Systems_Ch03.pdf' B. Helm, “Click
Words: 314 - Pages: 2
getting harder to prevent. In this paper specific cybercrimes such as hacking, identify thief, embezzlement, and secure fraud will be analyzed. The one of the most common cybercrimes is hacking. Computer hacking is when someone gains access to another individual's or company's computer network without their knowledge or permission. There are several different types of hacking. Bluetooth hacking is one form. Bluetooth hacking is when the Java programming language is used to gain access to various
Words: 1560 - Pages: 7
The problem to be investigated is the ethical use of information technology in a modern society. “Information technology basically refers to the employment of computer hardware and software applications to manage data” (K Alliance). Historically, information technology had limited applications and its impact on society was also limited. Information technology has come a long way since Jean Hoerni first developed the planar transistor whereby microscopic circuit boards could be laid out on the silicon
Words: 1620 - Pages: 7
opportunities offered by global networks. We are living a technological and informational revolution. It is therefore important for policy makers, leaders, teachers, computer professionals and all social thinkers to get involved in the social and ethical impacts of this communication technology. The origins of computer ethics can be traced to the 1940s to the time at which cybernetics and digital computers were first developed. These developments prompted Wiener (1948) to recognize both the good
Words: 1236 - Pages: 5
iPad’s Security Breach Samuel D. Brown Dr. Daniel Frost Contemporary Business - BUS508013VA016-1116-001 August 21, 2011 Security and ethical issues has become very common over the past couple years. Recently we have seen an increase in e-crime. Boone and Kurtz (2011) states that “Computers provide efficient ways for employees to share information. But they may also allow people with more malicious intentions to access information. Companies may install firewalls, use encryption software
Words: 2401 - Pages: 10
We will be discussing business ethics and social responsibility in our presentation today, and relating these theories specifically to the News of the World phone hacking scandal that broke in 2007. This scandal involved journalists and editors of the publication, News of the World illegally hacking into people's phones in order to access information that would not have been available to them otherwise. Though exact numbers are not known, lists of phones were confiscated listing thousands of mobile
Words: 2910 - Pages: 12
the attack. During the second term of this two semester course, the students are taught how to hack into a system, how to create malware (including Trojan horses, viruses, and worms), and how to perpetrate a DOS attack. Choose one or more of the ethical theories discussed in Chapter 2 and combine that with research to determine whether this course should be taught. Be sure to discuss both sides of the issue before taking a specific side. Would it make a difference if this were a graduate or PhD level
Words: 1270 - Pages: 6