Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

3. You acquire a network vulnerability scanning tool and try it out on a network

ID: 3717766 • Letter: 3

Question

3.

You acquire a network vulnerability scanning tool and try it out on a network address segment belonging to people at your university or business. The scanner identifies one computer named HalsHPlaptop that has many serious vulnerabilities. You deduce to whom the machine belongs. Explain the ethical implications of (a) telling the owner what you have found, (b) telling your local administrator or security officer what you have found, (c) exploiting one of the relatively minor vulnerabilities to show the owner how serious the exposure is, (d) exploiting a relatively minor vulnerability as a prank without telling the owner, (e) telling the owner what you have found and then demanding money for details on the vulnerabilities, (f) using one of the vulnerabilities to acquire control of the machine, downloading and installing patches and changing settings to address all the vulnerabilities, and never telling anyone what you have done.

Explanation / Answer

Vulnerability Scanning Tool

a) The speculates on the ethics of informing an owner about vulnerabilities over the network. The node is actual probable victim a future crime, it not only ethical highly advisable about the issue.

b) The problem speculates the ethics informing local administrator or security officer a vulnerable system the network. The actual point of administrator is control in this case. It is advisable and ethical to inform him r her the issue about possible, is also advisable suggest future of action.

c) The speculates the ethics of exploiting a minor vulnerability the network. The owner of the node is actual probable victim of a future infraction to advisable to inform him the issue the given consent be deemed ethical exploit vulnerability for owner information and knowledge possible threats.

d) The speculates the ethics minor vulnerability the network. The owner of the node is the acutal probable victim a future infraction to inform him the issue. It is unethical exploit without consent vulnerability the action is illegal and similar to hacking.

e) The speculates the ethics of exploiting minor vulnerability the network. The owner of the node is the acutal probable victim a future infraction to inform him the issue. And selling him further details borders of ethicality. It is the owner has already informed the vulnerability has a choice her or she of obtaining future services. Thus, detailed selling data is still ethical.

f) The problem speculates on the ethics of fixing vulnerabilities without consent over the network. Since the onwer of he nodes is the actual probable victim of a future infraction, it is advisable and unethical to exploit vulnerability without consent the purpose is honorable and noble.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote