Course paper revision and report Course Paper Revision And Report Instructions Instructions: This step has two different parts: 1. Revise and improve

Course paper revision and report
Course Paper Revision And Report Instructions
Instructions: This step has two different parts:
1. Revise and improve your course paper according to your GRST instructors and the OWC tutors feedback. The goal is to significantly improve your drafts original score in all four areas of the GRST rubric, scoring a 3 or higher in each.
2. Next, answer the Revision Report questions. See the ten questions below and submit your answers to the assignment link on Blackboard.
Assignment Goal: Receive feedback from your GRST instructor and from an OWC tutor, think critically about the feedback, and apply that feedback to improve your paper and writing process. Significantly improve your original score in all four areas of the GRST Course Paper Grading Rubric.
Instructions: Revise and improve your paper. Next, in a separate document, respond to the feedback you received during the course by answering the following questions. Use at least 40 words per question.

Was the feedback helpful? Why or why not?
What surface level problems do you have?
What deep level problems do you have?
Based on the feedback, what are your major weaknesses as a writer?
Which step of the writing process will help you overcome this weakness?
Based on the feedback, what are your major strengths?
What part of your writing process relates to this strength?
What can you do in the future to improve your strength?
In which way was this course most helpful to you?
Will you use the Online Writing Centers tutoring service in the future? Why or why not?

Don't use plagiarized sources. Get Your Custom Assignment on
Course paper revision and report Course Paper Revision And Report Instructions Instructions: This step has two different parts: 1. Revise and improve
From as Little as $13/Page

Be sure to turn in both parts of this assignment via the provided assignment submission link on Blackboard. Upload your revised paper as one attachment and your answers to the questions as a second attachment.
Note: You must show your GRST instructor that you have received a full OWC review of your paper (due Module/Week 6). Then, to pass the class, you must submit a final, improved revision of your paper that earns at least a 3 or higher in each category of the rubric (due Module/Week 7).

Submit this two-part assignment 11:59 p.m. (ET) on Sunday of Module/Week 7.

Running head: ETHICAL HACKING ROUGH DRAFT 1

Ethical Hacking Rough Draft

Trevor Henry

Liberty University

August 9, 2020

Commented [ER2]: The running head is now uniform
across all pages of a submission. It should be formatted as
follows:
Flush left with all-capital lettering followed by a right

aligned page number. All information should fit on a single

line. The running head should be at maximum 50 characters

or spaces long. There is no different heading for the first

page, and the label running head is not utilized on any page.

An example of this can be in your APA Publication Manual

pages 50-60. The Online Writing Center has a sample paper

that you can refer to:

https://dcfwfuaf91uza.cloudfront.net/online/wp-

content/uploads/APA-7th-Sample-Paper-Graduate.pdf

Commented [ER3]: Unless your professor specified
otherwise, do not include a course name or number, date,
professors name, or student ID on your title page.
According to APA formatting, the title page contains the
following information in this given order:
Paper Title

Blank double-spaced line

Student Name

Affiliation of each author: Example: School of Business,

Liberty University

Center this information in the top half of the title page.

Liberty University has designated the Times New Roman

12-point font for academic submissions. For more

information on this and an example title page, you can see

your APA Publication Manual pages 30-32 or

https://www.liberty.edu/casas/academic-success-center/wp-

content/uploads/sites/28/2020/04/Sample-Paper-APA-7th-

professional-version-FINAL-03022020.pdf

Commented [ER4]: On the first line of the first page of
the text, write the title of the paper in title case, bold, and
centered. (American Psychological Association [APA], 2020,
p. 39). In title case, [the first word of the title or heading
and subtitle or subheading plus all] major words are
capitalized.Nouns, verbsadjectives, adverbs, pronouns,
and all words of four letters or more are considered major
words (APA, 2020, p. 167).

https://www.liberty.edu/casas/academic-success-center/wp-content/uploads/sites/28/2020/04/Sample-Paper-APA-7th-professional-version-FINAL-03022020.pdf

https://www.liberty.edu/casas/academic-success-center/wp-content/uploads/sites/28/2020/04/Sample-Paper-APA-7th-professional-version-FINAL-03022020.pdf

https://www.liberty.edu/casas/academic-success-center/wp-content/uploads/sites/28/2020/04/Sample-Paper-APA-7th-professional-version-FINAL-03022020.pdf

https://dcfwfuaf91uza.cloudfront.net/online/wp-content/uploads/APA-7th-Sample-Paper-Graduate.pdf

https://dcfwfuaf91uza.cloudfront.net/online/wp-content/uploads/APA-7th-Sample-Paper-Graduate.pdf

ETHICAL HACKING ROUGH DRAFT 2

Ethical Hacking Rough Draft

Introduction

‘Ethics’ is a term that involves several things that include, among other things, morals,

respect, and truth towards others. In ethical hacking, the principles involved comprise all of

these, including confidentiality, which is an additional factor of focus. Trainees studying ethical

hacking as well as trained professionals are, as such, expected to guarantee the observance of

these principles to ascertain that they do not engage in harm causing activities to others using

computer networks or the internet. There has been a rise in hacks to corporations such as JP

Morgan and Equifax in the past decade, and these have raised concerns concerning the moralities

of ethical hacking that involves trainees of ethical hacking and whether they could be the faces

behind these cyberattacks, which could also mean they are responsible for carrying out global

hacks. If trainees of ethical hacking are involved, then the ethical hacking principles should be

re-checked.

Tools of hacking

Ethical hacking intends to intrude on a computer system to find if there are any

vulnerable points, which in turn helps the target strengthen them to thwart future attempts. On

the other hand, a criminal hacker intrudes these systems intending to alter them for personal gain

or pleasure (Wulf, 2003). This often leaves the target in a vulnerable position of having their

information leaked or lost. A, for ethical hackers to be able to penetrate a computer system

successfully, they must utilize the tools and hacking paths that are used by criminal hackers.

Commented [ER5]: The heading Introduction is not
needed for APA formatted papers. The introduction is
assumed to follow the reiterated title. For more information
on this, you can see page 47 within your APA Publication
Manual.

Commented [ER6]: The standard quotation marking
should be utilized around direct quotations. The single
quotation markings are for quotations within direct
quotations. Example: In the beginning (New
International Version, 1978/2000, Genesis 1:1) or Genesis
1:3 shared, and God said, Let there be light, and there
was light (New International Version, 1978/2000).

Commented [ER7]: When a direct quote is used, be sure
to indicate either the page or paragraph number from
where the direct quote was taken. Examples: (Last name,
year of publication, p. #) or (Last name, year of publication,
para. #). For more information on this, you can see your APA
Publication Manual pages 271-272.

Commented [ER8]: This phrase is a bit repetitive as it
mentions things twice. Consider reworking it to improve the

flow of information. Apply throughout!

Commented [ER9]: A single space should be included
after most punctuation markings, such as periods, question
marks, colons, semicolons, and commas. Some stipulations
apply to this rule, including professors guidelines for …

Commented [ER10]: Great comma usage!

Commented [ER11]: The ordering of information here is
a bit hard to follow. Consider reworking it in a step-by-step
manner. First, find the subject and verb of your idea. Then, …

Commented [ER12]: Extra explanatory words and
phrases should be separated from the rest of the sentence
by commas. For example: When I walk outside, usually in …

Commented [ER13]: You have utilized two forms of the
same word, which is a form of repetitition that can detract

from the flow of information. Consider reworking this aspect

to avoid repetitive writing.

Commented [ER14]: Coordinating conjunctions (example:
and, but, or, nor, so, yet) require a comma to join two

independent clauses. Example: I want to go home, but John

wants to go out. For more information on this, you can see …

Commented [ER15]: There is no need to add extra blank
lines prior to or after headings. For more information on
this, you can see your APA Publication Manual page 45. …

Commented [ER16]: The first heading found in your
paper, placed after the reiterated title and introductory

section, should always be a level one heading.

Commented [ER17]: I am not sure what this is sharing.

ETHICAL HACKING ROUGH DRAFT 3

When ethical hackers penetrate past the security of a computer system, they are later able

to compare and adjust the privacy controls affected based on the successful outcome. This way,

they can minimize the risks involved, and assist the company managers with identifying the

weaknesses and strengths of their system as they help them understand the measures that should

be taken. As such, penetration tests are an essential way of finding out how vulnerable a

company is to attacks, and finding these helps the companies with minimizing the risks.

Penetration tests often take up to five days, where ethical hackers observe to see what occurs if

these are ignored and can advise their managers accordingly (Jamil & Khan, 2011).

The purpose of training and education on ethical hacking is to make competitive ethical

hackers in this volatile world of advancing technology (Pike, 2013). As such, the concern that

course leaders face is that of whether they are doing good of helping students improve on their

intrusion skills (Jamil & Khan, 2011). Another concern they face is whether the students they

teach have the right intentions, an element that is not easy to predict. However, they choose to

focus on teaching about the ethics of hacking, which involves helping their learners understand

the importance of penetrating a system and the value of discovering the knowledge used in

committing these crimes (Palmer, 2001). On the other hand, there is a need for the trainees to

acquire useful skills because the lack of this poses a high risk and threat to a company. Even so,

they are concerned that with such skills, the threat of having such people is high when they are

not offered competitive salaries. In such events, the chances of their intentions could change,

and they could turn into a protentional enemy. As such, Jamil & Khan (2011) argue the need for

them to be given good salaries based on their skills and capabilities.

Ethics of teaching attacker tools

Commented [ER18]: Is this comma joining two
independent clauses? For a clause to be independent it
should have a subject, a verb, and express a complete
thought. If these clauses are not both independent clauses,
then a comma should not be used to join them together.
Example of two independent clauses joined by a comma
and conjunction: Her name is Jessica, and she likes to eat
fish. For more information on this, you can see the APA
Publication Manual page 155 or the following link:
http://www.liberty.edu/media/1171/Comma_usage_compl
exity.doc
Apply throughout!

Commented [ER19]: Great format!

Commented [ER20]: I am not sure what this means.

Commented [ER21]: When listing authors within the
body of your sentence, the ampersand (&) should be spelled
out as the word and. Example: Mahler and Smith (2008)
found
Apply throughout!

Commented [ER22]: Use past tense verbs when referring
to research that has already been completed. Research that

has been published has already been completed. More

information on this can be found on pages 117-118 of your

APA Publication Manual. For example: Mahler (2008)

shared

Apply throughout!

Commented [ER23]: Is this the best level for this heading?
Headings should be used to help the reader follow the flow

of information within your paper. Main ideas are typically

set as level one headings, while subsets of these ideas are the

level two headings. You can think of the headings as

envelopes. Your submission, as a whole, is a large envelope.

The level one headings, your main points, are smaller

envelopes within the large envelope (your paper). Each

subsequent level of headings is placed inside the heading

above it.

Level one headings are centered, boldfaced, and includes

title case lettering. In title case, [the first word of the title or

heading and subtitle or subheading plus all] major words are

capitalized.Nouns, verbsadjectives, adverbs, pronouns,

and all words of four letters or more are considered major

words (APA, 2020, p. 167). The sections contents begin as

a new paragraph. For more information on this, you can look

inside the front cover and pages 47-49 of your APA

Publication Manual.

Level two headings: ensure that your level two heading is

flush left and boldfaced with title-case lettering. In title

case, [the first word of the title or heading and subtitle or

subheading plus all] major words are capitalized.Nouns,

verbsadjectives, adverbs, pronouns, and all words of four

letters or more are considered major words (APA, 2020, p.

167). The sections contents begin as a new paragraph. For

more information on this, you can look inside the front cover

and pages 47-49 of your APA Publication Manual.

Apply throughout!

http://www.liberty.edu/media/1171/Comma_usage_complexity.doc

http://www.liberty.edu/media/1171/Comma_usage_complexity.doc

ETHICAL HACKING ROUGH DRAFT 4

Ethics in ethical hacking means that the students are taught the carefulness of attacker

tools. There are concerns that some schools teach dangerous hacking skills that leave the

learners without discernment concerning the right tools of attack. Currently, Wulf (2003)

observes that universities are now offering hacking skills that were traditionally learned from

criminal hackers. This means that people with wrong intentions can easily access this knowledge

to pursue unlawful activities. This is leading society to turn the blame on institutions and forcing

them to take liability for their unethical hacking by their students. To curb this menace, schools

are finding it useful to reinforce a student code that creates a sense of caution in their hacking

activities.

Students signing to acknowledge their legal liability during their hacking endeavors help

them understand the gravity of the matter. Wulf (2003) claims that providing trainees of ethical

hacking with precautions helps them to understand the meaning of ethical hacking, thus helps

them draw a line between what is legal from what is unlawful. AS such, they carry their

activities with the full knowledge of what could happen if they go against the laid down policies.

Teaching ethical hacking to trainees is, in one way, handing them a loaded gun (Wulf,

2003). It means that they are skilled enough to carry out both ethical and unethical hacking

based on what motivates them. The case of Randal Schwartz is an excellent example of a lawsuit

regarding how an ethical hacker could turn into an unlawful hacker based on motivation. An

Intel employee, Schwartz, discovered his peers’ weak password and used it to create a password

cracking program, which his company found unethical because they had not appointed him for

this security role.

Understanding the intentions of the hacker

Commented [ER24]: Great use of spacing between
sentences!

Commented [ER25]: Typo?

ETHICAL HACKING ROUGH DRAFT 5

Most ethical hackers work to help a company reinforce its system’s security. However, a

criminal hacker is led by motivation, which is fueled by the ease of access to confidential and

crucial information. Fraud, for example, often happens when a hacker can easily access financial

information and passwords, which he can manipulate to interfere with payments or other

sensitive financial details, which he uses for his financial gain. Jamil & Khan (2011) note that

most of these hacks are carried out by a disgruntled employee who asks but never gets pay rises.

A KPMG report records that 42% of UK frauds are executed or aided by an insider (Jamil &

Khan, 2011).

Ethical hacking in risk management

To counter unauthorized hacking, there is a need for companies to reinforce firm security.

Basically, hiring an ethical hacker means being trustful that their intentions will remain true, and

as such, there is the general worry that goes along with hiring computer experts for this purpose

(Saleem, 2006). For companies to be coordinated with ethical hacking, there is need that they

include it in their organizational planning

.

Conclusion

Having examined the topic of ethical hacking as a profession, it is notable that ethical

principles are necessary in addressing trainee hacking activities. as such, schools should begin to

include them in their training of computer attack tools, evaluation of these tools as well as hacker

paths as they also probe the intents of ethical hackers. The fact is trust issues will never cease.

However, ethical hacking remains a truly relevant course in every company’s risk management

process.

Commented [ER26]: Great apostrohpe usage!

Commented [ER27]: If you abbreviate a term, use the
abbreviation at least three times in the paper (American
Psychological Association [APA], 2020, p. 170).

The abbreviated term should be written out completely, and

it should be followed immediately by the abbreviation in

parentheses. An example of this would be as follows: as soon

as possible (ASAP). Future uses of abbreviated term do not

need explanation; the abbreviation should just be used. For

further information about this, you can see the APA

Publication Manual page 173.

Apply throughout!

Commented [ER28]: All sentences should conclude with
the appropriate end of sentence punctuation.

Commented [ER29]: Great format of this level one
heading!

Commented [ER30]: Typically, the first word of all
sentences should be capitalized, unless the word is a proper

noun that is always presented with a lowercased letter

(example: iPod). For further information about this, you can

see the APA Publication Manual pages 165-166 or the

following link:

http://www.liberty.edu/media/1171/Capitalization.doc

http://www.liberty.edu/media/1171/Capitalization.doc

ETHICAL HACKING ROUGH DRAFT 6

References
Commented [ER31]: The heading, References, should be
capitalized, bold, and centered on the first line of your

references page (American Psychological Association

[APA], 2020, p. 40).

ETHICAL HACKING ROUGH DRAFT 7

Jamil, D. A. N. I. S. H., & Khan, M. N. A. (2011). Is ethical hacking ethical. International

journal of Engineering Science and Technology, 3(5), 3758-3763.

Palmer, C. C. (2001). Ethical hacking. IBM Systems Journal, 40(3), 769-780.

Pike, R. E. (2013). The “ethics” of teaching ethical hacking. Journal of International Technology

and Information Management, 22(4), 4.

Saleem, S. A. (2006, September). Ethical hacking as a risk management technique. In

Proceedings of the 3rd annual conference on Information security curriculum

development (pp. 201-203).

Wulf, T. (2003). Teaching ethics in undergraduate network security courses: the cautionary tale

of Randal Schwartz. Journal of Computing Sciences in Colleges, 19(1), 90-93.

Commented [ER32]: An APA journal article reference
should include the following information:

Author, F. M. (year). Article title. Journal Title, volume

number(issue number), page numbers. Doi: # or Retrieved

from URL.

For more information on this, you can see your APA

Publication Manual pages 316-321.

Examples:

Wu, H. (2012). Constructing a strategy map for banking

institutions with key performance indicators of the balanced

scorecard. Evaluation and Program Planning, 35, 303-320.

https://doi.org/10.1016/j.evalprogplan.2011.11.009

Martin, R. L. (2014). The big lie of strategic planning.

Harvard Business Review, 92(1-2), 78-84.

https://hbr.org/2014/01/the-big-lie-of-strategic-planning.

Commented [ER33]: The APA method of listing authors
on the references page is as follows: Last name, First initial.
Middle initial. Example: Mahler, E. A. Make sure that you
include a space after the period following the first initial.
The authors level of education is not included on the
references page. For more information on this, you can see
pages 286-287 of your APA Publication Manual.

Commented [ER34]: Make sure you capitalize all major
words within the journals title. Do not capitalize short
prepositions and articles, unless they begin the title. For
more information see
https://www.liberty.edu/casas/academic-success-
center/apa-guide/

Commented [ER35]: Capitalize the first word of the
articles title, subtitle, and any proper nouns within the

articles title. For more information on this, you can see your

APA Publication Manual page 291.

Commented [ER36]: I really enjoyed reading your paper.
Overall, your paper was organized and easy to follow. In

general, your content is clear. Thank you for using the OWC.

Some things to look for as you edit your paper include the

following: comma usage and verb tense choice. As a

reminder, any comment that contains the phrase apply

throughout means that there were other instances of that

issue in the paper.

If you feel that you need more help on this paper, do not

hesitate to request a live session. Please feel free to fill out a

survey to let us know about your experience. God bless!

https://www.liberty.edu/casas/academic-success-center/apa-guide/

https://www.liberty.edu/casas/academic-success-center/apa-guide/

https://hbr.org/2014/01/the-big-lie-of-strategic-planning