Is the expression “ethical hacker” an oxymoron?

Instructions:  There are three (3) topic areas listed below that are designed to measure your knowledge level specific to learning outcome (LO 6) shown in your course syllabus.  You must respond to #1 and select any other one of these topic areas providing appropriate responses in essay form.  In most cases the topic area has several components. Each must be addressed to properly satisfy requirements.

State-wide and in most professional industries, there has been a mandate that college students be more proficient in their writing. While this is not a writing class, all writing assignments will be graded for grammar, syntax and typographical correctness to help address this mandate.

Pay attention to what you are being asked to do (see Grading Rubric below). For example, to describe does not mean to list, but to tell about or illustrate in more than two or three sentences, providing appropriate arguments for your responses using theories discussed in our text.  Be sure to address all parts of the topic question as most have multiple parts. A verifiable current event (less than 4 years old) relevant to at least one of the topics you respond to is a fundamental component of your quiz as well.  You cannot use information from the text book or any book/article by the author of the text book as a current event.  Make sure that your reference has a date of publication.  For each chapter quiz and final quiz you are required to find and include at least one reference and reference citation to a current event less than 4 years old (a reference with no date (n.d.) is not acceptable) in answer to at least one question.  This requires a reference citation in the text of your answer and a reference at the end of the question to which the reference applies.  You must include some information obtained from the reference in your answer.  The references must be found on the internet and you must include a URL in your reference so that the reference can be verified.

You should type your responses directly under the appropriate question. Be sure to include your name on your quiz. Only the first two (2) questions with answers will be graded.   Include your name in the document filename. Your completed quiz must be uploaded into the appropriate eCollege Dropbox, no later than 11:59pm on the due date.  Do well.

  1. Strong arguments can be given as to why encryption tools are needed to safeguard communications in cyberspace, yet these tools can be used by terrorists and criminals to protect their communications in cyberspace. (a) In the wake of September 11, can a case be made for not allowing ordinary users to employ strong encryption tools in Internet communications? (b) Can we still claim to live in a free society if plans for government interception of email communications, as provided for in the Homeland Security Act (http://fl1.findlaw.com/news.findlaw.com/hdocs/docs/terrorism/hsa2002.pdf), are be implemented?  Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)
  2. In the discussion of Internet anonymity, some forms of anonymous behavior in cyberspace can have profound ethical implications. Imagine that there is a very close political election involving two candidates who are running for a seat in a state legislature. The weekend before citizens will cast their votes, one candidate decides to defame his opponent by using an anonymous remailer service (which strips away the original address of the sender of the email) to send a message of questionable truth to an electronic distribution list of his opponent’s supporters. The information included in this email is so defamatory that it may threaten the outcome of the election by influencing many undecided voters, as well as the libeled candidate’s regular supports, to vote against her. (a) Does the “injured” candidate in this instance have the right to demand that the identity of the person using the anonymous remailer (who she suspects for good reasons to be her opponent in this election) be revealed? (b) Why or why not? Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)
  3. Is the expression “ethical hacker” an oxymoron?  (a) Do you agree that some individuals should be allowed to be “certified” as hackers to work on behalf of industry or for the interest of other organizations?  (b) Do the kinds of activities permitted by certified hackers in the CEH program raise any moral issues?  Explain. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses.

Grading Rubric for Quizzes

Grading criterion                                                                                          Unit Points           Total Points

Uploaded to correct Dropbox                                                                            2                            2

Submitted on time                                                                                            15                          15

Document Filename:

Your Last Name,first and middle initial with correct quiz number                   5                            5

(Example only: Creider_RD_q1)

Rationally expressed opinions, experiences (personal or observed),                  8

arguments and premises (where appropriate) to support responses

(did not simply restate/summarize author/textbook

Clearly presented classical ethics theories relative to topic                                8

Included ‘URL’ for appropriate verifiable current event                                 12                          28

(i.e., example of topic being discussed WITH EXPLANATION)

NOTE: Must be less than 4 years old

Grammatically correct and appropriate tone                                10

(professional, non offensive language)

Typographically correct                                                               10                     20

Included full citations as needed                                                    3

Used correct APA format                                                               7                     10

Addressed each item within selected topic area                           20                     20

Maximum grade                                                                         100                   100

NOTE: POINTS WILL BE DEDUCTED FROM TOTAL ASSIGNMENT GRADE IF EACH QUESTION YOU SELECTED IS NOT INCLUDED IMMEDIATELY BEFORE EACH ANSWER.

find the cost of your paper

Critics worry that databases of human traits used to maintain corporate security may actually pose a privacy threat to individuals, if such data were used in other ways. In your view, are such concerns justified? Why or why not?

Many people believe that the use of biometrics is an invasion of privacy. For example, an eye scanning device records the inner structure of a person’s eye and stores that….

Write an essay of at least 500 words discussing the Safe Harbor provisions under HIPAA.

Write an essay of at least 500 words discussing the Safe Harbor provisions under HIPAA. Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. Write in essay….

Cryptocurrency: Are we really ready to demonetize the world?

TOPIC: Your topic should address some current issue in your major and advance your knowledge. Science and technology change too quickly to rehash old “stuff.” Old “stuff,” other than as….