0% found this document useful (0 votes)
64 views2 pages

Ethical Hacking V2-Update

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views2 pages

Ethical Hacking V2-Update

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Gateway Level 3 Cyber Security

Ethical Hacking

(F/618/5213)

Completion Instructions

• Please complete all scenarios to best of your knowledge.


• Word Limit per Scenario is maximum 2000 words.
• Appropriate referencing is required if applicable.
• Referencing is Mandatory using Harvard referencing.
• You are allowed to use hand drawn diagrams or images.
• Please upload Word (.docx) file only.

Total Scenarios: 3

Assessment Hand Out Date: 30/10/2024

Assessment Submission Date: 04/11/2024

Trainer: Abhishek Sharma


Assessor: Aastha Chhabra
IQA: Sagar Allagh

Please add the below mentioned details on the first page of your submission:

Module Name: Ethical Hacking


Module ID: F/618/5213
First Name:
Last Name:
Student Email ID (Waltham):
Scenario 1

They must write an essay that would portray that they have been hired by a technical
start up firm to undertake an audit of their cyber security and advice on what needs to
be done. If a startup firm is handling client data that can be considered as sensitive
data, then the company’s systems should be secure and have to meet certain
specifications. As an ethical hacker in your line of duty you will need to assess the
current state of security in their organizations and guide them on how they can consider
hiring ethical hackers as a method of enhancing security. For the task, you are required
to write a report to the company as to why ethical hacking is useful and what plan of
action should be taken towards your project for that firm. You are also to educate the
organization about the process of vetting for a new employee, in case the organization
wants to hire another ethical hacker in future.

Scenario 2

First of all, your job as an ethical hacker occurs in detecting weaknesses of the startup’s
systems. This means that one should have devised a number of ethical hacking attacks
in order to enable identification of the same. It involves evaluating the likelihood of gains
of the physical, logical and social engineering techniques with the aim of identifying the
available vulnerabilities. In order to successfully carry out the above mentioned tasks,
you are to, firstly, analyze various hacking tools and approaches which would, in turn,
expose the aforementioned vulnerabilities from the physical, logical, and social aspects.
In response to the analysis you are then supposed to come up with a strategy that will
help one look for the weaknesses and then proceed to perform a number of ethical
hacking hacks in line with the formulated strategy. This way the company requires
evidences as screenshots/images so the context of your hack should be described and
additionally the screen shots should be provided.

Scenario 3

That is it!! Congratulations are in order, you have just conducted the penetration testing
for the tech startup. You are now required to ensure that you develop a comprehensive
report of the vulnerabilities that you identified and outcome of varied assaults. The
cases expounded in this report will be presented to the management of the startup so
that they may be in a position to understand the security situation in their business and
what needs to be done to ensure that risks are managed effectively. In the manner that
you are required, you should point out the outcomes of the attacks. (Attach
Screenshots)

You might also like