Get Help With Your Essay

"Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you A results."

For This or a Similar Paper Click To Order Now

 

Ethical hacking is shrouded in a gray area in relations to the legal landscape. By its very nature, you are breaking into computers and showing that you can obtain data. The gray area comes because you should be expressly authorized by the organization you are testing. However, what are the boundaries in your test? How do you start? Where do you end? What if you find a vulnerability outside of your scope? Finally, did the people who give you authorization actually have the right to do so? In 2019, a Dallas courthouse hired Coalfire to physically test the vulnerabilities of the courthouse. The two employees were arrested for burglary and possession of burglary tools first, and then criminal trespassing after the initial charges were dropped (Links to an external site.).
In this paper, you will analyze the legal landscape that surrounds ethical hacking. You will analyze federal laws, state laws, and the agreement between the organization and the penetration tester. Furthermore, you will discuss when the activities of penetration testing are inconsistent with laws, ethics, and standards.
Discuss three separate federal laws that relate to penetration testing, and how they affect a penetration test.
Discuss three separate Delaware state laws that relate to penetration testing, and how they affect a penetration test.
Discuss what legal agreements are commonly used in the industry to protect the penetration tester and the client.
Discuss the ethics and standards that exist in Penetration Testing.
Discuss when activities of penetration testing are inconsistent with the existing laws, ethics, and standards that exist in the United States.
Paper Requirements:
Written Communication: Write in a professional manner using APA 7th Edition and formatting with correct grammar, usage, and mechanics.
Resources: Identify at least two scholarly resources (peer-reviewed. Scholarly journals, not news articles, Wikipedia, blog posts, etc…) and two industry resources (whitepapers, industry (e.g., Cisco, Palo Alto Networks, etc…) blog posts, Cybersecurity professionals (Troy Hunt, Bruce Schneier, etc…) blogs, etc…) in addition to your textbook. You should have a minimum of 5 resources (Textbook, two scholarly, two industry).
APA Formatting: Resources and citations are formatted according to APA 7th Edition.
Length: 3-5 Pages (not including Title Page, References, and any Abstract/Executive Summary)
Font and font-size: Any of the acceptable APA7 fonts.

Get Help With Your Essay

"Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you A results."

For This or a Similar Paper Click To Order Now