This website uses cookies to ensure you have the best experience. Learn more

Hacking Technologies Midterm Study Guide Essay

3917 words - 16 pages

Mid-term Exam
Unit 1 Questions:
1. Explain the Morris Worm and its significance.
It is considered to be the first Internet Worm. It was designed to count the number of systems connected to the Internet, however due to a flaw the worm replicated quickly and caused widespread slowdown across the globe.

2. Explain what____ hackers are.
White-Hat- Those that know how hacking works but use skills for good
Black-Hat – Those that through actions or stated intent, indicated that their hacking is designed to break the law, disrupt systems or businesses, or generate an illegal return
Grey-Hat – Rehabilitated hackers or those that once were on the (black-hat) dark side but are now ...view middle of the document...

Candy-from-a-baby – If it is so easy to copy a program or download a song how can it be illegal
f. Hacker – Information should be free. No one should have to pay for books or media.

7. What is ethical hacking?
Hacking a system with the “written” consent of the asset owner to review their security vulnerabilities

8. What role does professional organizations and certifying bodies play in regards to ethical standards?

9. What is the issue with conducting security assessments without prior authorization?
Engaging in any hacking activity without the explicit permission of the owner of the target you are attacking is a crime whether you get caught or not. You will be treated as a hostile threat and persecuted by the law.
Unit 2 Questions:
1. From (Chap 2) of The Art of Intrusion, what are some of the countermeasures that can be used to reduce the threat of terrorist hacking?
Patch and update your system regularly, use defense in depth by placing publically accessed systems in a DMZ, Monitoring activity for unusual or suspicious, stronger authentication or passwords, it boils down to what you want to protect and how far you are willing to go to protect it.
2. From (Chap 1) of The Art of Intrusion, explain the importance of doing research to discover exploitable vulnerabilities when it comes to defending an existing computer system or network.
It was extremely helpful to the individuals that were trying to hack the casino machines. First they found out which type of machine then bought one, next they checked on a ROM chip under patents and found a working binary printout of the chip, they then engineered a way to count how they could exploit the random number generator. So I think that research worked out well for them. They also did the same for a newer machine and it worked then also.

3. Explain asymmetric encryption.
An algorithm that requires two separate keys one which is secret and one which is public they are mathematically linked. Public is used to encrypt plaintext or verify a digital signature private is used to decrypt or create a digital signature (they are inverse of each other)

4. What is MD5 hashing?
An improved/redesign of MD4. It provides a unique data fingerprint that is used to verify data sent and received. It changes dramatically if the message is altered. They are used for authentication and integrity of the data. One way encryption that produces 128 bit digest used to verify integrity (if file has been altered the hash should not match, but it is vulnerable to collision attacks)

5. What is IPSEC and what is it used for?
It stands for IP security and is used for information protection. It can be used to encrypt just the data or the data and the header of the information being sent.

6. What does hashing provide?
Security of integrity of a message or data, it gives the person opening the file a way of determining whether or not it has been tampered with.


Other Papers Like Hacking Technologies Midterm Study Guide

We Are Dead Essay

629 words - 3 pages What type of farming was practiced in New York? Cash Crops Review terms for Midterm Midterm Study Guide for US History History Midterm Study Guide new.docx Tobacco and Jamestown Changed Jamestown Wampanoag and Plymouth What is the theory of mercantilism? What is the importance of the following acts? Sugar Act, Stamp Act, Embargo Act, Indian Removal Act, Fugitive Slave Act Who

Bus 515 Midterm Exam Assignment

951 words - 4 pages • developing employee schedules • monitoring inventory Multiple Choice Question 7 At the GAP, which function plans and coordinates all the resources needed to design, produce, and deliver the merchandise to its various retail locations? • engineering • human resources • marketing • operations management • purchasing Strayer University Midterm Exam Study Guide BUS 515 Midterm Exam Multiple Choice Question 24 When does productivity increase

Gm520 Midterm Exam

823 words - 4 pages GM520 Midterm Exam Study Guide YOU MAY WANT TO PRINT THIS GUIDE. 1. The midterm exam is "open book, open notes." The maximum time you can spend in the exam is 2 hours, 30 minutes. If you have not clicked the Submit For Grade button by then, you will be automatically exited from the exam. In the midterm exam environment, the Windows clipboard is disabled, and so you will not be able to copy exam questions or answers to or from other


529 words - 3 pages Brandon Kabbash Professor James Rhea IS 3100 15 November 2012 Case Study 6 1. Read the “Thinking Exponentially” Guide on pages 194-195. Keeping the principles of that guide in mind, list five possible commercial applications for mobile WiMax. Consider applications that necessitate mobility. After reading the case study, I firmly believe that five potential commercial applications of mobile WiMax would be to create a quicker, faster and

Fi504 Mid Term

859 words - 4 pages 1-4A on page 35 • Exercise 2-4 on page 79 • Exercise 2-7 on page 80 • Exercise 3-1 on page 140 • Exercise 3-16 on page 144 • Problem 3-2A on pages 145 and 146 • Exercise 4-4 on page 204 • Exercise 4-13 on page 207 • Exercise 5-7 on page 260 • Problem 5-4A on pages 263 and 264 • Exercise 6-4 on page 315 End of Study Guide for Midterm Exam.

The Natives

1249 words - 5 pages from October 25, 2012 until March 5, 2013 of 2nd semester of school year 2012-2013. Data Gathering Tools and Procedure The researchers used questionnaires in gathering data. The questionnaires were distributed after the Midterm examination so that students are not the bothered with their exams and to answer the questionnaire responsively and comprehensively. The procedure for the study was done by specifying the statement of the problems

Port Development

667 words - 3 pages Containerization and Unit Loading. 12 ed. USA. Sheridan-House Inc. 4. Seaborne Cargoes and Dangerous Goods Study Guide 5. Internet Sources Course Schedule |Date |Week |Lecturer: (Lessons) |Hours | | |1

Social Legal and Ethical Issues

5339 words - 22 pages Chapter 5 Social, Legal, and Ethical Issues in the Information Age Teaching Objectives Students should be able to answer the following questions: 1. What ethical, social, and political issues are raised by information systems? 2. Are there specific principles for conduct that can be used to guide decisions about ethical dilemmas? 3. Why does contemporary information technology pose challenges to the protection

Networking and Security Issues

5170 words - 21 pages , who asked not to be identified, said that the MPAA is currently “experiencing problems with their public Web site, and they suspect a denial-of-service attack.” The attack was first rumored on, a Web site for news on computer hacking. Most of the attacks are becoming more frequent and more damaging, and they are using well-known techniques and methods to exploit vulnerability in security policies and systems. 1

We Have a Problem

565 words - 3 pages to another machine, hacking, dumpster diving, social engineering, bribery, and hiring away key employees. I believe Corporate Intelligence is an ethical issue because it is “the collection and analysis of information on markets, technologies, customers, and competitors, as well as on socioeconomic and external political trends” (Ferrell, Fraedrich & Ferrell, 2011). First, there are the problems that arise with the obtaining of corporate

Cyber Crimes-a Diabolic Jeopardy

542 words - 3 pages brought transformations in all areas of society. If cyber space is a type of community, a giant neighborhood made up of networked computer users around the world, then it seems natural that many elements of a traditional society can be found taking shape as bits and bytes. CYBER SECURITY is too in question. In this precarious situation the question is “HOW TO COMBAT THIS PERIL???” As per the study of the international institute of cyber

Related Essays

Acct504 Midterm Exam Study Guide Essay

1354 words - 6 pages ACCT504 Midterm Study Guide YOU MAY WANT TO PRINT THIS GUIDE. 1. The Midterm is open book and open notes. The maximum time you can spend in the exam is 2 hours and 30 minutes. If you have not clicked the Submit for Grading button by then, you will be exited from the exam automatically. In the exam environment, the Windows clipboard is disabled, so you will not be able to copy exam questions or answers to or from other applications. 2. You

Profesor Slokin Midterm 1 Study Guide

933 words - 4 pages • Scarcity o Definition: situation in which unlimited wants exceed the limited resources available to fulfill those wants  UNLIMTED WANTS. LIMITED RESOURCES • Marking choices, we assume that: o People are rational o They respond to economic incentives o Optimal decisions are made at the margin • ECONOMISTS REASON THAT OPTIMAL DECISION IS WHEN MC=MB • Marginal o Definition=next unit o Marginal cost=cost for next unit o Marginal

Ethical Hacking Essay

1144 words - 5 pages (Perl), C, C++, Python, JavaScript, Visual Basic, SQL, and many others  Script  Set of instructions that runs in sequence Hands-On Ethical Hacking and Network Defense 5  This class alone won’t make you a hacker, or an expert  It might make you a script kiddie   It usually takes years of study and experience to earn respect in the hacker community It’s a hobby, a lifestyle, and an attitude  A drive to figure out how

Chemistry Essay

4728 words - 19 pages they can change their plans in accordance to what was hacked and try to build strategies that cause failure and damage to others. This leads us to analyze and study the motivations and the thoughts of hackers and the reason behind performing illegal activities. Motivations behind Hacking The motivations behind hacking are an issue that is discussed heavily due to the importance of understanding the hacker’s psychology and the fuel that