Applied Ethics and Hacking, Computer Science Assignment Homework Help
1st assignment Applied Ethics DeliverableLength: 2 pagesThroughout the course, you have researched ethics andidentified determinants that influence the decision-making process. Choose acurrent event related to 1 of the following topics: media ethics, war, animalwelfare, or capital punishment.Describe how this event displayed ethical or unethicalbehavior. You are required to provide a thorough discussion for the currentevent using explanations provided by the ethical theories you have learned.Explain why the behavior was ethical or unethical. In the case of the unethicalevent, what could have been done differently to change the behavior fromunethical to ethical? In the case of the ethical event, what ethical guidelineswere displayed?You are required to demonstrate your understanding of theseprinciples by providing a thorough discussion using a minimum of 2 credibleacademic sources (APA format).2nd assignment System Hacking Deliverable Length: 2–3 PagesIdentify and describe the phases that are involved in anethical hacking exercise. Describe how an ethical hacker can also perform thesesteps, and whether a not a boundary exists in the steps that an ethical hackershould not cross. If is there is a line, why should it not be crossed?A task that may be conducted during a vulnerabilityassessment or penetration test is to ascertain the strength or weaknesses ofthe passwords on a system. This may take the shape of simply running a testagainst known passwords or exploiting vulnerability and stealing the passwordhashes and trying to crack them. In either case, the concept is the same; thedifference is how the password hashes are obtained. There are many toolsavailable to perform this task. To help give an understanding of these tools,this activity will have you explore some of these tools and analyze them tofind the right fit for you and your organization. Complete the following steps:Research and find a method to extract or access passwordhashes for your server that meet your needs (this could be the attack or targetplatform from your lab environment that has been used in previous assignments).Extract the password hashes from a machine.With the extracted password hashes, try to crack them byusing the program that you selected in Activity 2.Submit an obfuscated list of users and cracked passwords,output generated from the program.Please submit your assignment.
THIS QUESTION IS UNSOLVED!
Request a custom answer for this question