Ethical Hacking V2-Update
Ethical Hacking V2-Update
Ethical Hacking
(F/618/5213)
Completion Instructions
Total Scenarios: 3
Please add the below mentioned details on the first page of your submission:
They must write an essay that would portray that they have been hired by a technical
start up firm to undertake an audit of their cyber security and advice on what needs to
be done. If a startup firm is handling client data that can be considered as sensitive
data, then the company’s systems should be secure and have to meet certain
specifications. As an ethical hacker in your line of duty you will need to assess the
current state of security in their organizations and guide them on how they can consider
hiring ethical hackers as a method of enhancing security. For the task, you are required
to write a report to the company as to why ethical hacking is useful and what plan of
action should be taken towards your project for that firm. You are also to educate the
organization about the process of vetting for a new employee, in case the organization
wants to hire another ethical hacker in future.
Scenario 2
First of all, your job as an ethical hacker occurs in detecting weaknesses of the startup’s
systems. This means that one should have devised a number of ethical hacking attacks
in order to enable identification of the same. It involves evaluating the likelihood of gains
of the physical, logical and social engineering techniques with the aim of identifying the
available vulnerabilities. In order to successfully carry out the above mentioned tasks,
you are to, firstly, analyze various hacking tools and approaches which would, in turn,
expose the aforementioned vulnerabilities from the physical, logical, and social aspects.
In response to the analysis you are then supposed to come up with a strategy that will
help one look for the weaknesses and then proceed to perform a number of ethical
hacking hacks in line with the formulated strategy. This way the company requires
evidences as screenshots/images so the context of your hack should be described and
additionally the screen shots should be provided.
Scenario 3
That is it!! Congratulations are in order, you have just conducted the penetration testing
for the tech startup. You are now required to ensure that you develop a comprehensive
report of the vulnerabilities that you identified and outcome of varied assaults. The
cases expounded in this report will be presented to the management of the startup so
that they may be in a position to understand the security situation in their business and
what needs to be done to ensure that risks are managed effectively. In the manner that
you are required, you should point out the outcomes of the attacks. (Attach
Screenshots)