Discussion week 1 (3 separate parts)

CIS 435

·         Consider the “What if” case in Chapter 1 from the Book: Web Applications and Data Servers and respond to one or more of the questions asked.

·         Research the web, and discuss any recent story concerning session hijacking. Provide summary and discussion on what might have been done to prevent such hijacking, or how such hijacking can be recognized.

·         Any current topic or article related to penetration techniques.

·         The instructor insight.

While the minimum requirement is an original and single response, one can get much more from the class by going beyond minimums and engaging in conversation with your professor or other students.  I encourage one to go beyond the minimum and those that can engage in four or more posts will truly learn much more than what is just in the physical classroom or text books.   I do give bonus points for extra work assuming quality, and good writing.  

I take the rubric seriously so I grade 20 percent of the post on style, format, and writing.   So please use good paragraphs, don”t write in mounds of text, and bury ideas.   Use salutations in both the subject line and the message.   Use proper citations for any sources one uses.  Never cut and paste from the web or other source and use it by itself as an original post, or response.   Use direct quotes properly tied to your words, or if you want to share an article or other material, do so as an additional post, with proper citation.  

 

CIS 420

 

“Ethical Hacking”  Please respond to one of the following:

·         Suppose a coworker approaches you and asks what an ethical hacker does. She does not understand the role that an ethical hacker plays in the security industry and assumes that such a hacker intentionally causes damage. Explain to your hypothetical coworker what an ethical hacker is and the fundamental manner in which such a hacker differs from a black hat hacker. Justify your response with an example of each type of hacker, and indicate the role each hacker plays in your given example.

·         Explain the main differences between white hat and grey hat hackers. Provide a brief example of a grey hat hacker. Describe the role that you believe grey hat hackers play in the security industry, and indicate whether or not you believe grey hat hacking is equivalent to ethical hacking. Provide a rationale for your response.

·         Comment on and share your views on the Instructor Insight article from the week 1 Unit homepage.

·         Comment on any hacking related current event.   

While the minimum requirement is an original and single response, one can get much more from the class by going beyond minimums and engaging in conversation with your professor or other students.  I encourage one to go beyond the minimum and those that can engage in four or more posts will truly learn much more than what is just in the physical classroom or text books.   I do give bonus points for extra work assuming quality, and good writing.  

I take the rubric seriously so I grade 20 percent of the post on style, format, and writing.   So please use good paragraphs, don”t write in mounds of text, and bury ideas.   Use salutations in both the subject line and the message.   Use proper citations for any sources one uses.  Never cut and paste from the web or other source and use it by itself as an original post, or response.   Use direct quotes properly tied to your words, or if you want to share an article or other material, do so as an additional post, with proper citation.    

 

CIS 498

Core Skills and Transformational Mind-Set”  Please respond to the following:

·         Examine the “Core Skills for Success” in Chapter 1 of Roberts’ text. Analyze the primary manner in which these skills aid IT professionals when an organization must implement information system changes. Support your response with at least two (2) examples of an IT professional’s application of the core skills for success.

·         Investigate the manner in which three (3) of the six (6) mind-set and behavioral changes impact IT leadership’s ability to promote change in an organization in relationship with integrative functions and processes. Provide one (1) example to support your response.