Skip to main content

Primary Research (General Questions Analysis)

This is the link to the questionnaire https://docs.google.com/forms/d/e/1FAIpQLSeVadVMpyEB7r37n9Dx5JOb3lJWrWVACNSvhH3zNCRTyfAZvA/viewform





The aim of these questions was to:
1. Know the user's knowledge level in ethical hacking
2. Get their stance on authorized hacking
3. Know their stance on legal implications for ethical hackers
4. Their review of the survey

Comments

Popular posts from this blog

Case Study - Method

Source: https://www.google.co.uk/url?sa=i&url=https%3A%2F%2Fwww.facebook.com%2Fmethoduk%2F&psig=AOvVaw1TjPOsSrMz-Vs9czJ_mxRc&ust=1685998095949000&source=images&cd=vfe&ved=0CBAQjRxqFwoTCJCq48K-qv8CFQAAAAAdAAAAABAj Method The methodology employed in the case study described in the book "Cyber Security: Case Study" reflects a systematic and meticulous approach to ethical hacking. This section outlines the key steps and processes undertaken by the ethical hacking team to assess the organization's cybersecurity measures. The first step in the methodology involved the selection of a qualified and experienced ethical hacking team. The team's expertise in various aspects of cybersecurity, such as network security, web application security, and social engineering, ensured a comprehensive assessment across different attack vectors. Careful consideration was given to the team's certifications, qualifications, and track record of successful engagements...

MAJOR PROJECT THEME - ETHICAL HACKING

Source: https://www.softwaretestinghelp.com/wp-content/qa/uploads/2020/06/Ethical-Hacking.png Ethical hacking is a practice in which cybersecurity professionals use their skills to identify vulnerabilities in computer systems and networks. This approach helps organizations proactively detect and fix potential security issues before malicious hackers exploit them. Ethical hacking is a vital tool in today's world where cyber threats constantly evolve and become more sophisticated. The concept of ethical hacking is based on the idea that the best defence against cyber attacks is a good offence. Organizations can identify and fix vulnerabilities before malicious actors can exploit them by conducting controlled and authorised attacks on their own systems. Ethical hacking also helps to improve the overall security posture of an organization, making it more resilient against future cyber attacks. However, ethical hacking is not a license to conduct attacks indiscriminately. Ethical hacker...

Initial Project Plan(Gantt Chart Update)

 BEFORE CONTINOUS ASSESSMENT AFTER CONTINOUS ASSESSMENT I used the Gantt chart above to plan and monitor all the blogs I had to write for this module. It was a rewarding experience to explore these topics and share my insights with you. The chart also helped me stay focused and motivated by showing me my progress and achievements. REFERENCE https://online.officetimeline.com/app/#/file/5cacb847-5749-4e92-9d55-25480acdc8b4/gantt-view [Accessed Date: 4th June 2023]