Wednesday, December 3, 2008

Unit 1 - Ethical Hacking Overview

Textbook: Simpson, Michael T. Hands-On Ethical Hacking and Network Defense. Thomson Course Technology, 2006.

Reading:
Textbook - Chapter 1, pp. 1–14

NIST SP 800-42
(http://www.csrc.nist.gov/publications/nistpubs/800-42/NIST-SP800-42.pdf )
Chapter 3, pp. 20–41
NIST SP 800-35
(http://www.csrc.nist.gov/publications/nistpubs/800-35/NIST-SP800-35.pdf )
Chapter 3, pp 21–23
Chapter 5, pp. 48–53

References:
“The trials of Kevin Mitnick” (CNN.com March 18, 1999)
http://www.cnn.com/SPECIALS/1999/mitnick.background/ (May 27, 2006).

Assignments:
Review Questions (RQ): Review Questions 1 - 20, pp. 15–17 Assignment due in class.
Write out question and answer.

Lab(s):
Lab 1:
PENETRATION TESTERS: JOB REQUIREMENTS
Complete Activity 1-1, Chapter 1, pp. 3 from your textbook.
After completing the activity, summarize the job descriptions you read on Monster.com.

Compare the requirements of the various corporations for penetration testers. Refer to specific organizations in the summary.

Deliverables and format: Assignment due in class.
Submit your answers in a Microsoft Word document in not more than 150 words.
Font: Arial; 11 Line Spacing: Double

Research Assignment 1 (RA1):
Title:
Ethical Vs. Unethical Hacking
Task:
1. Log on to ITT Tech Virtual Library, search for the article “The Legend and Legacy of Kevin Mitnick.” In all databases, access the article, and then read the section “The life of Kevin Mitnick.”

2. Answer the following question:
Based on the cyber hacking committed by Kevin and per your understanding of the definition of ethical hacking, do you consider Kevin Mitnick an ethical or unethical hacker?

3. Support your answer with logical reasons and references to Web sites, which support your point of view. Remember that references to .gov and .org Web sites will provide more credibility to your answer as compared to the Web sites that post personal opinions of people.

Deliverables and format:
Submit your answer in a Microsoft Word document in not more than 200 words.
Font: Arial; 11
Line Spacing: Double

Research Assignments are due before the start of the next class.

Submit each assignment type as a separate attachment (CA1, LAB1, RQ)

GMail Account:
Each student will email the Instructor from their gmail account tonight. If you do not have a gmail account then create one tonight. Your email should illustrate that you have read the General Course Information for Email and Assignments.


Refer to General Course Information for Email and Assignment Instructions.