Computer Science and Ethical Hacking Questions
Description
Hello,
Please answer the following tasks separately and add references at the end of the document
Sub: Ethical Hacking
Task: Discussion
Write in 350 words,
Tech companies prepare for cyberattacks using common cybersecurity resources. Select one of the resources listed and explain how you could implement that particular policy to prevent an attack: 1. monitoring and assessment, 2. policies and controls, 3. hiring, 4. software, 5. firewalls, 6. authentication and access, 7. encryption.
Task: Writing Assignment
Search the Internet and locate an article that relates to the topic of HACKING and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements.
What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.A reference citation is also required for this assignment. You may just include a link to your article.
.
===============================================================================
Sub: policy, legal and compliance
Task: Assignment
In a WORD document, answer each these questions in a paragraph with at least five sentences. Include the question and number your responses accordingly. Provide a citation for each answer.
1. What is privacy?
2. What risks, if any, does facial recognition software raise?
3. How much information about you can be found on-line with a simple google search?
4. How much information about you can be found by searching government and commercial databases?
5. Describe informed consent.
6. Should secondary use of consumer provided data be available without notice to the consumer?
7. How do data mining and predictive analytics work?
8. Watch this Science Friday video by Ira Flatow. And, offer your opinion – Are advancing algorithms taking our free will?
9. Should Facebook be regulated, at least as far as it’s privacy and data policies?
10. How many public cameras is too many?
==============================================================
Sub: Building Web Applications
Do a bit of research on CWE, Common Weakness Enumeration.
Write a brief overview of their scoring system.
Pick one of common weaknesses identified on their site and describe it.
Your assignment should be 250-300 of your own words.
Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."