An Ethical Hacking Technology Research Paper Essay (Research Paper Sample)
Part I: Laws and Contracts (10 Marks)
The company has appointed you as the main pen-tester for its organization.
Your job is to identify different any vulnerabilities in the systems and suggest corrective
measures.
a) Identify and provide details of the various laws applicable to your profession in
Singapore. (3 marks)
b) Create a legal contract sample based on the job assigned to you. Make any
appropriate assumptions required, but they should be stated clearly (7 marks)
Part II: Network and Application Based Attacks (15 Marks)
It is noted that the company has a mail, web, DNS, and database servers. You are required to
identify the possible network and application-based threats/attacks, vulnerabilities to each
of the servers.
You are also expected to suggest defence strategies and recommend software and/or
device/s that provide security for each type of the servers.
Ethical Hacking
By name
Course name and code
Professor’s name
City
Date of submission
Part 1
a)
In Singapore, the Personal Data Protection Act defines personal data as any information relating to an individual, whether real or false. Organizations that have access to personal data must protect them from misuse. Personal Data Protection Act imposes data protection obligations on any organization whenever they do an activity involving collection, use or disclosure of personal data. According to the provisions of the law in Singapore, PDPA has powers to bring enforcement actions on organizations that do not comply with the data protection obligations. In most cases, such penalties include fines.
Other Topics:
- Introduction To Information Technology Technology Research PaperDescription: Identification of the framework for explaining the system of E-commerce1) E-Business/E-commerceThe terms E-business and E-commerce are interchangeably used. But the meaning of the terms is different, and to todays companies the difference matters. Using electronic medium the buying and selling is made...5 pages/≈1375 words| 10 Sources | Harvard | Technology | Research Paper |
- Philosophy And Ethics For Computing And Information ScienceDescription: Humans, animals and machines have always remained distinct and leave no space for overlapping or comparable characteristics....1 page/≈550 words| 20 Sources | Harvard | Technology | Research Paper |
- The Global Economy: Security Policy Development ReportDescription: Security Policy Development Report: This essay identifies some of the most common computer risks and threats that organizations face...1 page/≈275 words| 7 Sources | Harvard | Technology | Research Paper |