Please answer the following tasks separately and add references at the end of the document

Sub: Ethical Hacking

Task: Discussion

Write in 300 words, Given the rich and diverse skills and mindset of an ethical hacker (technical, administrative, and physical measures), which characteristics do you believe to be the most important in this role? Please explain your choice.

Task: Writing Assignment

Go online and search for information that relates to ethical hacking (white hat or gray hat hacking). Choose one of these areas explain why a company might benefit from hiring someone to hack into their systems.

Your assignment should be 3-4 paragraphs in length.


Sub: policy, legal and compliance

Task: Assignment

In a WORD document, answer each these questions in a paragraph with at least five sentences each. Include the question and number your responses accordingly. Provide a citation for each answer.

1. What kind of speech was the First Amendment written to protect?

2. Does the First Amendment apply only to spoken words?

3. What does it mean that laws regulating speech must be content neutral?

4. Why are common carriers prohibited from controlling the content of the material they carry?

5. How does the Supreme Court determine whether material is obscene?

6. Why have attempts to censor the Internet failed in the US?

7. Why not just ban spam?

8. Why did Facebook ban Alex Jones and Louis Farrakan?

9. Should websites that show how to 3d print guns be banned?

10. According to the Supreme Court ‘anonymity is a shield from the tyranny of the majority’. What does that mean?


Sub: Building web applications


Learning About OWASP

Visit the OWASP website.

Using WORD, write an ORIGINAL brief essay of 300 words or more describing the history and background of OWASP.

See the Vulnerabilities tab. Choose one of the vulnerabilities on the linked page and describe briefly.

Safe Assign is software that verifies the originality of your work against on-line sources and other students.