BEFORE CONTINOUS ASSESSMENT AFTER CONTINOUS ASSESSMENT I used the Gantt chart above to plan and monitor all the blogs I had to write for this module. It was a rewarding experience to explore these topics and share my insights with you. The chart also helped me stay focused and motivated by showing me my progress and achievements. REFERENCE https://online.officetimeline.com/app/#/file/5cacb847-5749-4e92-9d55-25480acdc8b4/gantt-view [Accessed Date: 4th June 2023]
This academic journal is an excerpt from a research article on ethical hacking methodologies by Ashraf. M (2021). The article explores the concept and practice of ethical hacking, which is a form of hacking that aims to improve the security of networks without causing harm. The article reviews different ethical hacking techniques and tools, such as penetration testing, vulnerability scanning, password cracking, network sniffing, and malware analysis. It compares them based on their principles and mechanisms, such as black-box testing, white-box testing, grey-box testing, active scanning, passive scanning, brute-force attack, dictionary attack, rainbow table attack, packet capture, packet injection, and reverse engineering. The article also provides a graphical and score-based analysis of the tools based on their effectiveness, efficiency, accuracy, and usability. It suggests how to choose the best tool for a specific scenario based on the criteria and constraints. The article i...