PLEASE READ – GENERAL IMPORTANT NOTES FOR ALL ASSIGNMENTS:
1. It is very important that you use the network tools that you download only for collecting information about your own machine or a self-contained private network. Never use any of the tools for unethical
2. All references must be properly cited in your answers. Use IEEE or ACM reference styles
(https://www.cs.ucy.ac.cy/~chryssis/specs/ACM-refguide.pdf) . Points will be deducted for improper
citations and citations in incorrect formats.
3. Keep in mind that just because you cite references, you must not “cut-and-paste” from these or other
sources. The write-up must be properly paraphrased and referenced.
4. Late Penalty Policy: The assignment is due at 11.59 PM on the due date. It will not be marked late up to
5 hours past the deadline. Beyond the grace time, there will be a 10% per day on the mark earned on
the assignment. For instance, if your score on the assignment is 8/10 and there is a 10% late penalty,
the score will be reduced to 7.2/10. Assignments that are five days past due will not be accepted.
5. Submission: Submission will be on Brightspace. Convert your documents into pdf. Submit ONE pdf file
containing the answers to all questions.
This is a research assignment. The objectives of the assignment are to get you thinking about the principles of
ethical hacking, take a look at security tools, and also research on DDoS attacks.
Exercise 1: In the lectures, we discussed the importance of ethical hacking. The lecture notes also list a number of
resources on ethical hacking. Read online resources on this subject and in your own words, write one paragraph
(max. 300 words) on one principle that you consider as important in ethical hacking – that is, what would you do in
your career to be ethical? Be sure to cite your references at the end of the paragraph. Citations are not part of the
Exercise 2: www.sectools.org offers a rich catalog of network security tools, including their classification,
ratings, links to the tool’s website, and reviews. Visit the website and pick one network security tool. Ensure that
you select a tool that is used for ethical hacking and network administration. Conduct an exploration of the tool
and write a short summary report on the tool. In your report, describe the tool’s features, what it provides, and
how it works. Also, outline how it is useful to a network security specialist and how it may be used for harmful
purposes by a hacker.
Length of the report: Approximately 1.5 – 2 pages, single line spacing, 11-point font size. Place figures in an
appendix (that is, figures are not part of the 1.5-2 page report.
Citations: If you prefer to only www.sectools.org, no need to cite it. If you refer to other resources, cite them.
Exercise 3: Explore online resources and write a short summary report on one DDoS attack. In your report,
identify who was the target of the attack, possible motives, how the DDoS attack was launched, and what
possible measures could have been taken to mitigate the attack.
Length of the report: 750-1000 words. Place figures and citations at the end of the report. Citations are not part
of the word count.For more information on Network Security check this: https://en.wikipedia.org/wiki/Network_security
Try it now!
How it works?
Follow these simple steps to get your paper done
Place your order
Fill in the order form and provide all details of your assignment.
Proceed with the payment
Choose the payment system that suits you most.
Receive the final file
Once your paper is ready, we will email it to you.
Australia Assessments has gained an international reputation of being the leading website in custom assignment writing services. Once you give us the instructions of your paper through the order form, we will complete the rest.
As we work towards providing the best custom assignment services, our company provides assignment services for any type of academic essay. We will help you develop professionally written essays that are rich in content and free from plagiarism.
Admission and Business Papers
Our skilled team of professional writers will ensure that we help you craft a remarkable admission essay for your desired Master's program in your institution of choice. We won't stop there. Once you enter the job market, we will be available to secure you a position at your desired worksite by creating an outstanding portfolio or resume.
Editing and Proofreading
Our editorial team is always available for all editing and proofreading services. They check completed papers by our writers and also provide professional opinions to papers completed by our clients.
We harbor professional academic writers with different qualifications in diverse academic fields. As such, we are capable of handling both simple and technical papers. Ensure that you provide us with correct and complete instructions in the order form.