Sign In
Not register? Register Now!
Essay Available:
You are here: HomeResearch PaperTechnology
1 page/≈275 words
7 Sources
Research Paper
English (U.S.)
MS Word
Total cost:
$ 6.48

An Ethical Hacking Technology Research Paper Essay (Research Paper Sample)


Part I: Laws and Contracts (10 Marks)
The company has appointed you as the main pen-tester for its organization.
Your job is to identify different any vulnerabilities in the systems and suggest corrective
a) Identify and provide details of the various laws applicable to your profession in
Singapore. (3 marks)
b) Create a legal contract sample based on the job assigned to you. Make any
appropriate assumptions required, but they should be stated clearly (7 marks)
Part II: Network and Application Based Attacks (15 Marks)
It is noted that the company has a mail, web, DNS, and database servers. You are required to
identify the possible network and application-based threats/attacks, vulnerabilities to each
of the servers.
You are also expected to suggest defence strategies and recommend software and/or
device/s that provide security for each type of the servers.


Ethical Hacking
By name
Course name and code
Professor’s name
Date of submission
Part 1
In Singapore, the Personal Data Protection Act defines personal data as any information relating to an individual, whether real or false. Organizations that have access to personal data must protect them from misuse. Personal Data Protection Act imposes data protection obligations on any organization whenever they do an activity involving collection, use or disclosure of personal data. According to the provisions of the law in Singapore, PDPA has powers to bring enforcement actions on organizations that do not comply with the data protection obligations. In most cases, such penalties include fines.

Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Philosophy And Ethics For Computing And Information Science
    Description: Humans, animals and machines have always remained distinct and leave no space for overlapping or comparable characteristics....
    1 page/≈550 words| 20 Sources | Harvard | Technology | Research Paper |
  • The Global Economy: Security Policy Development Report
    Description: Security Policy Development Report: This essay identifies some of the most common computer risks and threats that organizations face...
    1 page/≈275 words| 7 Sources | Harvard | Technology | Research Paper |
  • Investigation of Flow in a Low-Speed Wind Tunnel
    Description: Accelerated air passes through Contraction that has the screen mounted to allow smooth flow of air before entering the working section...
    1 page/≈275 words| 4 Sources | Harvard | Technology | Research Paper |
Need a Custom Essay Written?
First time 15% Discount!