Course paper revision and report
Course Paper Revision And Report Instructions
Instructions: This step has two different parts:
1. Revise and improve your course paper according to your GRST instructors and the OWC tutors feedback. The goal is to significantly improve your drafts original score in all four areas of the GRST rubric, scoring a 3 or higher in each.
2. Next, answer the Revision Report questions. See the ten questions below and submit your answers to the assignment link on Blackboard.
Assignment Goal: Receive feedback from your GRST instructor and from an OWC tutor, think critically about the feedback, and apply that feedback to improve your paper and writing process. Significantly improve your original score in all four areas of the GRST Course Paper Grading Rubric.
Instructions: Revise and improve your paper. Next, in a separate document, respond to the feedback you received during the course by answering the following questions. Use at least 40 words per question.
Was the feedback helpful? Why or why not?
What surface level problems do you have?
What deep level problems do you have?
Based on the feedback, what are your major weaknesses as a writer?
Which step of the writing process will help you overcome this weakness?
Based on the feedback, what are your major strengths?
What part of your writing process relates to this strength?
What can you do in the future to improve your strength?
In which way was this course most helpful to you?
Will you use the Online Writing Centers tutoring service in the future? Why or why not?
Be sure to turn in both parts of this assignment via the provided assignment submission link on Blackboard. Upload your revised paper as one attachment and your answers to the questions as a second attachment.
Note: You must show your GRST instructor that you have received a full OWC review of your paper (due Module/Week 6). Then, to pass the class, you must submit a final, improved revision of your paper that earns at least a 3 or higher in each category of the rubric (due Module/Week 7).
Submit this two-part assignment 11:59 p.m. (ET) on Sunday of Module/Week 7.
Running head: ETHICAL HACKING ROUGH DRAFT 1
Ethical Hacking Rough Draft
Trevor Henry
Liberty University
August 9, 2020
Commented [ER2]: The running head is now uniform
across all pages of a submission. It should be formatted as
follows:
Flush left with all-capital lettering followed by a right
aligned page number. All information should fit on a single
line. The running head should be at maximum 50 characters
or spaces long. There is no different heading for the first
page, and the label running head is not utilized on any page.
An example of this can be in your APA Publication Manual
pages 50-60. The Online Writing Center has a sample paper
that you can refer to:
https://dcfwfuaf91uza.cloudfront.net/online/wp-
content/uploads/APA-7th-Sample-Paper-Graduate.pdf
Commented [ER3]: Unless your professor specified
otherwise, do not include a course name or number, date,
professors name, or student ID on your title page.
According to APA formatting, the title page contains the
following information in this given order:
Paper Title
Blank double-spaced line
Student Name
Affiliation of each author: Example: School of Business,
Liberty University
Center this information in the top half of the title page.
Liberty University has designated the Times New Roman
12-point font for academic submissions. For more
information on this and an example title page, you can see
your APA Publication Manual pages 30-32 or
https://www.liberty.edu/casas/academic-success-center/wp-
content/uploads/sites/28/2020/04/Sample-Paper-APA-7th-
professional-version-FINAL-03022020.pdf
Commented [ER4]: On the first line of the first page of
the text, write the title of the paper in title case, bold, and
centered. (American Psychological Association [APA], 2020,
p. 39). In title case, [the first word of the title or heading
and subtitle or subheading plus all] major words are
capitalized.Nouns, verbsadjectives, adverbs, pronouns,
and all words of four letters or more are considered major
words (APA, 2020, p. 167).
https://www.liberty.edu/casas/academic-success-center/wp-content/uploads/sites/28/2020/04/Sample-Paper-APA-7th-professional-version-FINAL-03022020.pdf
https://www.liberty.edu/casas/academic-success-center/wp-content/uploads/sites/28/2020/04/Sample-Paper-APA-7th-professional-version-FINAL-03022020.pdf
https://www.liberty.edu/casas/academic-success-center/wp-content/uploads/sites/28/2020/04/Sample-Paper-APA-7th-professional-version-FINAL-03022020.pdf
https://dcfwfuaf91uza.cloudfront.net/online/wp-content/uploads/APA-7th-Sample-Paper-Graduate.pdf
https://dcfwfuaf91uza.cloudfront.net/online/wp-content/uploads/APA-7th-Sample-Paper-Graduate.pdf
ETHICAL HACKING ROUGH DRAFT 2
Ethical Hacking Rough Draft
Introduction
‘Ethics’ is a term that involves several things that include, among other things, morals,
respect, and truth towards others. In ethical hacking, the principles involved comprise all of
these, including confidentiality, which is an additional factor of focus. Trainees studying ethical
hacking as well as trained professionals are, as such, expected to guarantee the observance of
these principles to ascertain that they do not engage in harm causing activities to others using
computer networks or the internet. There has been a rise in hacks to corporations such as JP
Morgan and Equifax in the past decade, and these have raised concerns concerning the moralities
of ethical hacking that involves trainees of ethical hacking and whether they could be the faces
behind these cyberattacks, which could also mean they are responsible for carrying out global
hacks. If trainees of ethical hacking are involved, then the ethical hacking principles should be
re-checked.
Tools of hacking
Ethical hacking intends to intrude on a computer system to find if there are any
vulnerable points, which in turn helps the target strengthen them to thwart future attempts. On
the other hand, a criminal hacker intrudes these systems intending to alter them for personal gain
or pleasure (Wulf, 2003). This often leaves the target in a vulnerable position of having their
information leaked or lost. A, for ethical hackers to be able to penetrate a computer system
successfully, they must utilize the tools and hacking paths that are used by criminal hackers.
Commented [ER5]: The heading Introduction is not
needed for APA formatted papers. The introduction is
assumed to follow the reiterated title. For more information
on this, you can see page 47 within your APA Publication
Manual.
Commented [ER6]: The standard quotation marking
should be utilized around direct quotations. The single
quotation markings are for quotations within direct
quotations. Example: In the beginning (New
International Version, 1978/2000, Genesis 1:1) or Genesis
1:3 shared, and God said, Let there be light, and there
was light (New International Version, 1978/2000).
Commented [ER7]: When a direct quote is used, be sure
to indicate either the page or paragraph number from
where the direct quote was taken. Examples: (Last name,
year of publication, p. #) or (Last name, year of publication,
para. #). For more information on this, you can see your APA
Publication Manual pages 271-272.
Commented [ER8]: This phrase is a bit repetitive as it
mentions things twice. Consider reworking it to improve the
flow of information. Apply throughout!
Commented [ER9]: A single space should be included
after most punctuation markings, such as periods, question
marks, colons, semicolons, and commas. Some stipulations
apply to this rule, including professors guidelines for …
Commented [ER10]: Great comma usage!
Commented [ER11]: The ordering of information here is
a bit hard to follow. Consider reworking it in a step-by-step
manner. First, find the subject and verb of your idea. Then, …
Commented [ER12]: Extra explanatory words and
phrases should be separated from the rest of the sentence
by commas. For example: When I walk outside, usually in …
Commented [ER13]: You have utilized two forms of the
same word, which is a form of repetitition that can detract
from the flow of information. Consider reworking this aspect
to avoid repetitive writing.
Commented [ER14]: Coordinating conjunctions (example:
and, but, or, nor, so, yet) require a comma to join two
independent clauses. Example: I want to go home, but John
wants to go out. For more information on this, you can see …
Commented [ER15]: There is no need to add extra blank
lines prior to or after headings. For more information on
this, you can see your APA Publication Manual page 45. …
Commented [ER16]: The first heading found in your
paper, placed after the reiterated title and introductory
section, should always be a level one heading.
…
Commented [ER17]: I am not sure what this is sharing.
ETHICAL HACKING ROUGH DRAFT 3
When ethical hackers penetrate past the security of a computer system, they are later able
to compare and adjust the privacy controls affected based on the successful outcome. This way,
they can minimize the risks involved, and assist the company managers with identifying the
weaknesses and strengths of their system as they help them understand the measures that should
be taken. As such, penetration tests are an essential way of finding out how vulnerable a
company is to attacks, and finding these helps the companies with minimizing the risks.
Penetration tests often take up to five days, where ethical hackers observe to see what occurs if
these are ignored and can advise their managers accordingly (Jamil & Khan, 2011).
The purpose of training and education on ethical hacking is to make competitive ethical
hackers in this volatile world of advancing technology (Pike, 2013). As such, the concern that
course leaders face is that of whether they are doing good of helping students improve on their
intrusion skills (Jamil & Khan, 2011). Another concern they face is whether the students they
teach have the right intentions, an element that is not easy to predict. However, they choose to
focus on teaching about the ethics of hacking, which involves helping their learners understand
the importance of penetrating a system and the value of discovering the knowledge used in
committing these crimes (Palmer, 2001). On the other hand, there is a need for the trainees to
acquire useful skills because the lack of this poses a high risk and threat to a company. Even so,
they are concerned that with such skills, the threat of having such people is high when they are
not offered competitive salaries. In such events, the chances of their intentions could change,
and they could turn into a protentional enemy. As such, Jamil & Khan (2011) argue the need for
them to be given good salaries based on their skills and capabilities.
Ethics of teaching attacker tools
Commented [ER18]: Is this comma joining two
independent clauses? For a clause to be independent it
should have a subject, a verb, and express a complete
thought. If these clauses are not both independent clauses,
then a comma should not be used to join them together.
Example of two independent clauses joined by a comma
and conjunction: Her name is Jessica, and she likes to eat
fish. For more information on this, you can see the APA
Publication Manual page 155 or the following link:
http://www.liberty.edu/media/1171/Comma_usage_compl
exity.doc
Apply throughout!
Commented [ER19]: Great format!
Commented [ER20]: I am not sure what this means.
Commented [ER21]: When listing authors within the
body of your sentence, the ampersand (&) should be spelled
out as the word and. Example: Mahler and Smith (2008)
found
Apply throughout!
Commented [ER22]: Use past tense verbs when referring
to research that has already been completed. Research that
has been published has already been completed. More
information on this can be found on pages 117-118 of your
APA Publication Manual. For example: Mahler (2008)
shared
Apply throughout!
Commented [ER23]: Is this the best level for this heading?
Headings should be used to help the reader follow the flow
of information within your paper. Main ideas are typically
set as level one headings, while subsets of these ideas are the
level two headings. You can think of the headings as
envelopes. Your submission, as a whole, is a large envelope.
The level one headings, your main points, are smaller
envelopes within the large envelope (your paper). Each
subsequent level of headings is placed inside the heading
above it.
Level one headings are centered, boldfaced, and includes
title case lettering. In title case, [the first word of the title or
heading and subtitle or subheading plus all] major words are
capitalized.Nouns, verbsadjectives, adverbs, pronouns,
and all words of four letters or more are considered major
words (APA, 2020, p. 167). The sections contents begin as
a new paragraph. For more information on this, you can look
inside the front cover and pages 47-49 of your APA
Publication Manual.
Level two headings: ensure that your level two heading is
flush left and boldfaced with title-case lettering. In title
case, [the first word of the title or heading and subtitle or
subheading plus all] major words are capitalized.Nouns,
verbsadjectives, adverbs, pronouns, and all words of four
letters or more are considered major words (APA, 2020, p.
167). The sections contents begin as a new paragraph. For
more information on this, you can look inside the front cover
and pages 47-49 of your APA Publication Manual.
Apply throughout!
http://www.liberty.edu/media/1171/Comma_usage_complexity.doc
http://www.liberty.edu/media/1171/Comma_usage_complexity.doc
ETHICAL HACKING ROUGH DRAFT 4
Ethics in ethical hacking means that the students are taught the carefulness of attacker
tools. There are concerns that some schools teach dangerous hacking skills that leave the
learners without discernment concerning the right tools of attack. Currently, Wulf (2003)
observes that universities are now offering hacking skills that were traditionally learned from
criminal hackers. This means that people with wrong intentions can easily access this knowledge
to pursue unlawful activities. This is leading society to turn the blame on institutions and forcing
them to take liability for their unethical hacking by their students. To curb this menace, schools
are finding it useful to reinforce a student code that creates a sense of caution in their hacking
activities.
Students signing to acknowledge their legal liability during their hacking endeavors help
them understand the gravity of the matter. Wulf (2003) claims that providing trainees of ethical
hacking with precautions helps them to understand the meaning of ethical hacking, thus helps
them draw a line between what is legal from what is unlawful. AS such, they carry their
activities with the full knowledge of what could happen if they go against the laid down policies.
Teaching ethical hacking to trainees is, in one way, handing them a loaded gun (Wulf,
2003). It means that they are skilled enough to carry out both ethical and unethical hacking
based on what motivates them. The case of Randal Schwartz is an excellent example of a lawsuit
regarding how an ethical hacker could turn into an unlawful hacker based on motivation. An
Intel employee, Schwartz, discovered his peers’ weak password and used it to create a password
cracking program, which his company found unethical because they had not appointed him for
this security role.
Understanding the intentions of the hacker
Commented [ER24]: Great use of spacing between
sentences!
Commented [ER25]: Typo?
ETHICAL HACKING ROUGH DRAFT 5
Most ethical hackers work to help a company reinforce its system’s security. However, a
criminal hacker is led by motivation, which is fueled by the ease of access to confidential and
crucial information. Fraud, for example, often happens when a hacker can easily access financial
information and passwords, which he can manipulate to interfere with payments or other
sensitive financial details, which he uses for his financial gain. Jamil & Khan (2011) note that
most of these hacks are carried out by a disgruntled employee who asks but never gets pay rises.
A KPMG report records that 42% of UK frauds are executed or aided by an insider (Jamil &
Khan, 2011).
Ethical hacking in risk management
To counter unauthorized hacking, there is a need for companies to reinforce firm security.
Basically, hiring an ethical hacker means being trustful that their intentions will remain true, and
as such, there is the general worry that goes along with hiring computer experts for this purpose
(Saleem, 2006). For companies to be coordinated with ethical hacking, there is need that they
include it in their organizational planning
.
Conclusion
Having examined the topic of ethical hacking as a profession, it is notable that ethical
principles are necessary in addressing trainee hacking activities. as such, schools should begin to
include them in their training of computer attack tools, evaluation of these tools as well as hacker
paths as they also probe the intents of ethical hackers. The fact is trust issues will never cease.
However, ethical hacking remains a truly relevant course in every company’s risk management
process.
Commented [ER26]: Great apostrohpe usage!
Commented [ER27]: If you abbreviate a term, use the
abbreviation at least three times in the paper (American
Psychological Association [APA], 2020, p. 170).
The abbreviated term should be written out completely, and
it should be followed immediately by the abbreviation in
parentheses. An example of this would be as follows: as soon
as possible (ASAP). Future uses of abbreviated term do not
need explanation; the abbreviation should just be used. For
further information about this, you can see the APA
Publication Manual page 173.
Apply throughout!
Commented [ER28]: All sentences should conclude with
the appropriate end of sentence punctuation.
Commented [ER29]: Great format of this level one
heading!
Commented [ER30]: Typically, the first word of all
sentences should be capitalized, unless the word is a proper
noun that is always presented with a lowercased letter
(example: iPod). For further information about this, you can
see the APA Publication Manual pages 165-166 or the
following link:
http://www.liberty.edu/media/1171/Capitalization.doc
http://www.liberty.edu/media/1171/Capitalization.doc
ETHICAL HACKING ROUGH DRAFT 6
References
Commented [ER31]: The heading, References, should be
capitalized, bold, and centered on the first line of your
references page (American Psychological Association
[APA], 2020, p. 40).
ETHICAL HACKING ROUGH DRAFT 7
Jamil, D. A. N. I. S. H., & Khan, M. N. A. (2011). Is ethical hacking ethical. International
journal of Engineering Science and Technology, 3(5), 3758-3763.
Palmer, C. C. (2001). Ethical hacking. IBM Systems Journal, 40(3), 769-780.
Pike, R. E. (2013). The “ethics” of teaching ethical hacking. Journal of International Technology
and Information Management, 22(4), 4.
Saleem, S. A. (2006, September). Ethical hacking as a risk management technique. In
Proceedings of the 3rd annual conference on Information security curriculum
development (pp. 201-203).
Wulf, T. (2003). Teaching ethics in undergraduate network security courses: the cautionary tale
of Randal Schwartz. Journal of Computing Sciences in Colleges, 19(1), 90-93.
Commented [ER32]: An APA journal article reference
should include the following information:
Author, F. M. (year). Article title. Journal Title, volume
number(issue number), page numbers. Doi: # or Retrieved
from URL.
For more information on this, you can see your APA
Publication Manual pages 316-321.
Examples:
Wu, H. (2012). Constructing a strategy map for banking
institutions with key performance indicators of the balanced
scorecard. Evaluation and Program Planning, 35, 303-320.
https://doi.org/10.1016/j.evalprogplan.2011.11.009
Martin, R. L. (2014). The big lie of strategic planning.
Harvard Business Review, 92(1-2), 78-84.
https://hbr.org/2014/01/the-big-lie-of-strategic-planning.
Commented [ER33]: The APA method of listing authors
on the references page is as follows: Last name, First initial.
Middle initial. Example: Mahler, E. A. Make sure that you
include a space after the period following the first initial.
The authors level of education is not included on the
references page. For more information on this, you can see
pages 286-287 of your APA Publication Manual.
Commented [ER34]: Make sure you capitalize all major
words within the journals title. Do not capitalize short
prepositions and articles, unless they begin the title. For
more information see
https://www.liberty.edu/casas/academic-success-
center/apa-guide/
Commented [ER35]: Capitalize the first word of the
articles title, subtitle, and any proper nouns within the
articles title. For more information on this, you can see your
APA Publication Manual page 291.
Commented [ER36]: I really enjoyed reading your paper.
Overall, your paper was organized and easy to follow. In
general, your content is clear. Thank you for using the OWC.
Some things to look for as you edit your paper include the
following: comma usage and verb tense choice. As a
reminder, any comment that contains the phrase apply
throughout means that there were other instances of that
issue in the paper.
If you feel that you need more help on this paper, do not
hesitate to request a live session. Please feel free to fill out a
survey to let us know about your experience. God bless!
https://www.liberty.edu/casas/academic-success-center/apa-guide/
https://www.liberty.edu/casas/academic-success-center/apa-guide/
https://hbr.org/2014/01/the-big-lie-of-strategic-planning