CASE STUDY ON HACKING

CASE STUDY ON HACKING

Week 5 Discussion – Develop a case study related to hacking

Week 5 Discussion

THIS IS NOT A BUSY WORK ASSIGNMENT, it is a serious assignment meant to help you prepare for the term paper in week 9. A senior paper cannot be well researched and written in a weekend. I grade and provide feedback at the senior level, and having a strong foundation which you then take weeks to develop a solid research foundation and an outline leading to strong conclusions and takeaway begins here.

So take some time, think the proposal through, then present it. It is not an essay, the proposal does not need documentation, as it is your words explaining what you are going to do, and why, and what you expect to learn and takeaway. It is not an history paper or background paper, but uses some background to lay out the basics.

Develop a case study related to hacking. Have an original post of no less than three to five paragraphs, and yes it can be more if you wish. In addition to your proposal, offer advice of a paragraph or two to at least two other students. This is the proposal for your term paper due in week 9. Papers should not be written in a one week or weekend, but should take some time to research, consider, and then draft. Once drafted, ideally, one sleeps on the paper, so one can proof and revise one last time before submitting the final draft. I expect a 400 level paper in week 9, so give some thought to your case study and provide me a short synopsis of what you hope to look at, why, and what you hope to learn or accomplish.

  • Research the web and find an appropriate incident related to either a successful or failed penetration testing effort, or a successful or unsuccessful hacking attempt against an organization, business or government facility. For the discussion lay out the basic details of the case, why you chose this case, and speculate on what specific lessons you learned from the case, as well as possible recommendations for future situations. This proposal should be no less than three or four paragraphs. (For those taking SEC420 concurrent with SEC435 this must be a different case study.)
  • I will repost the assignment nine requirements in the week five weekly update announcement.
  • Do not go to some website and copy and paste this assignment or worse the paper itself, there is one paper out on the web that has been presented to me as original no less than eight times in the past year and half. I have seen them all, and recognize them. Plagiarism is not worth the effort. Even if you try to disguise it by changing a few words, it really doesn’t work. I can see patterns that most students don’t realize. 🙂 Homework helper and other such sites are rip offs, avoid the temptation, even if other professors may have let these slide, trust me, I am not worth the gamble. 😉
  • No, you can’t use the SEC435 paper, or SEC402 paper or any other paper from any other course you took. Most have been submitted to SafeAssign or Turnitin and will show up when you submit as having been submitted and graded. One cannot use a paper that has been graded for credit in one course for submission for another

Answer preview

Hacking had been a significant threat in organizations where issues like data theft, denial of service attacks and malware interfere with data and information systems. Data breach leaves organizations at risk since this threatens the security of the client’s information and the company’s. Organizations that fail to establish robust security measures have experienced hacking considering that these cases are heightening and are becoming sophisticated as time goes by. Critical security measures such as the advancement of technology for combatting hacking are still hanging in the balance since hackers have advanced their skills for launching attacks in organizations.

The issue of poor security infrastructure in organizations has been a reason why one of the organizations I worked for a while back…

(650 words)

Scroll to Top