1st assignment Applied Ethics Deliverable Length: 2 pages
Throughout the course, you have researched ethics and identified determinants that influence the decision-making process. Choose a current event related to 1 of the following topics: media ethics, war, animal welfare, or capital punishment.
Describe how this event displayed ethical or unethical behavior. You are required to provide a thorough discussion for the current event using explanations provided by the ethical theories you have learned. Explain why the behavior was ethical or unethical. In the case of the unethical event, what could have been done differently to change the behavior from unethical to ethical? In the case of the ethical event, what ethical guidelines were displayed?
You are required to demonstrate your understanding of these principles by providing a thorough discussion using a minimum of 2 credible academic sources (APA format).
2nd assignment System Hacking Deliverable Length: 2â€“3 Pages
Identify and describe the phases that are involved in an ethical hacking exercise. Describe how an ethical hacker can also perform these steps, and whether a not a boundary exists in the steps that an ethical hacker should not cross. If is there is a line, why should it not be crossed?
A task that may be conducted during a vulnerability assessment or penetration test is to ascertain the strength or weaknesses of the passwords on a system. This may take the shape of simply running a test against known passwords or exploiting vulnerability and stealing the password hashes and trying to crack them. In either case, the concept is the same; the difference is how the password hashes are obtained. There are many tools available to perform this task. To help give an understanding of these tools, this activity will have you explore some of these tools and analyze them to find the right fit for you and your organization. Complete the following steps:
Research and find a method to extract or access password hashes for your server that meet your needs (this could be the attack or target platform from your lab environment that has been used in previous assignments).
Extract the password hashes from a machine.
With the extracted password hashes, try to crack them by using the program that you selected in Activity 2.
Submit an obfuscated list of users and cracked passwords, output generated from the program.
Please submit your assignment.