JNTU Ethical Hacking and Scamming and Phishing Attacks Discussion
Description
Sub: Ethical Hacking
Task: Discussion
Write in 300 words, Explain in your own words what FOOTPRINTING (or digital reconnaissance) is and how you would go about gathering the information you need to determine the location of a recently stolen late model car that was last seen in the parking lot of our college.
Task: Research Assignment
Write in 500 words, After responding to the weekly discussion topic on FOOTPRINTING, you now have an idea as to how to conduct a digital investigative project. For this assignment, you are asked to develop your own crime scenario. Explain the incident that occurred, and then list the steps you would follow to solve this case (examples might include: a lost child, an unauthorized charge on your credit card, an unidentified charge made with your EZ PASS, etc.).Be sure it includes your reference citation.
Sub: policy, legal and compliance
Task: Discussion
Discuss in 500 words your opinion whether Fair Use of copyrighted material should be expanded, contracted, or left alone. Justify your choice.
Use at least three sources. Use the Research Databases available from the Danforth Library, not Google. Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.
=================================================================
Sub: Building Web Applications
Task: Discussion
Learn About creating good password security.
An IT Security consultant has made three primary recommendations regarding passwords:
Prohibit guessable passwords
such as common names, real words, numbers only
require special characters and a mix of caps, lower case and numbers in passwords
Reauthenticate before changing passwords
user must enter old pw before creating new one
Make authenticators unforgeable
do not allow email or user ID as password
Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."