cis170 strayer week 6 assignment 2 hacking theory

compete discussion 2 and 3 for psych course
October 3, 2021
finance definitions and the differences between them
October 3, 2021

cis170 strayer week 6 assignment 2 hacking theory

Assignment 2: Hacking Theory

Due Week 6 and worth 75 points

Write a paper in which you:

  1. Explain the various forms of social engineering tactics that hackers employ and provide a recent example of each.
  2. Describe the five social norms of hacker subculture and provide an example of each.
  3. Search Internet news sources and find a recent article (less than 1 year old) on hacking. Describe the tone in regard to hacking and explain what the article conveys in regard to stigmas and labels surrounding the hacker.
  4. Go to https://research.strayer.edu to locate at least three (3) quality references for this assignment. One must have been published within the last year. Note: Wikipedia and similar websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • This course requires use of new Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Describe the technologies and processes involved in digital forensics.
  • Explain the ethical concerns that information technologies raise in society and the impact of information technologies on crime, terrorism, and war.
  • Use technology and information resources to research issues in information technology in criminal justice.
  • Write clearly and concisely about information technology in criminal justice topics using proper writing mechanics and technical style conventions.

RUBIC

Name: CIS 170 Assignment 2: Hacking Theory

Description: 1194 CIS 170 Assignment 2: Hacking Theory


Points Range:20.25 (27%) – 22.5 (30%)

Thoroughly explained the various forms of social engineering tactics that hackers employ and thoroughly provided an example of each.

Points Range:16.88 (22.5%) – 18.75 (25%)

Thoroughly described the five social norms of hacker subculture and thoroughly provided an example of each.

Points Range:20.25 (27%) – 22.5 (30%)

Thoroughly described the tone in regard to hacking and thoroughly explained what the article conveys in regard to stigmas and labels surrounding the hacker.

Points Range:3.38 (4.5%) – 3.75 (5%)

Exceeds required number of references; all references high-quality choices.

Points Range:6.75 (9%) – 7.5 (10%)

0-2 errors present.

The rubric total value of 0.00 has been overridden with a value of 0 out of 75.0.

Name:CIS 170 Assignment 2: Hacking Theory

Description:1194 CIS 170 Assignment 2: Hacking Theory

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.