1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mnenie [13.5K]
3 years ago
15

You acquire a network vulnerability-scanning tool and try it out on a network address segment belonging to people at your univer

sity of business. The scanner identifies one computer named Prince Hal that has many serious vulnerabilities. You deduce to whom the machine belongs. Explain the ethical implication of:________.
a. telling the owner what you have found,
b. telling you local administrator or security officer what you have found
c. exploiting one of the relatively minor vulnerabilities to show the owner how serious the exposure is
d. exploiting a relatively minor vulnerability as a prank without telling the owner,
e. telling the owner what you have found and the demanding money for details on the vulnerabilities
f. using one of the vulnerabilities to acquire control of the machine, downloading and installing patches and changing settings to address all the vulnerabilities, and never telling anyone what you have done.
Computers and Technology
1 answer:
inna [77]3 years ago
8 0

Answer and Explanation:

  • The speculates on either the morality of transmitting vulnerabilities to an individual over all the internet. The node is a very possible target of a criminal charge, these are highly recommended in terms of the problem not just ethical.
  • The question argues the etiquette of telling a compromised network infrastructure to something like a domain admins or security guard. Throughout this case the primary admin issue is power. Informing individuals about both the potential problem is prudent or legal, which is also preferable to recommend the future course of action.
  • The speculates on either the moral values of leveraging the infrastructure for a mild vulnerability. This same proprietor including its node is truly likely to be victims of a prospective infringement, and therefore it is advantageous to notify him including its problem that the equitable access is considered to become an ethical manipulate susceptibility for possessor data as well as potential threats to understanding.
  • The theories a small flaw throughout the channel's ethics. The device's leader is the likely guilty party of even a future offense to notify him of both the actual problem. The law is ridiculous as well as comparable to trying to hack without permission vulnerability it's immoral vulnerability.
  • The content upon the ethical principles of manipulating the channel's small susceptibility. The device's owner seems to be the likely casualty of such a future offense to instruct him including its subject. As well as trying to sell him much farther documents socially responsible borders. It's the holder who has so far notified the weakness she perhaps she has just one option to obtain products and services. Having clear data on the sale still seems to be ethical.
  • The issue argues mostly on ethics with repairing security flaws without channel assent. Although the controlled variable of the modules has been the true likely target of such a future infringement, exploiting susceptibility without permission is appropriate as well as unethical, this same objective being honorable as well as noble.
You might be interested in
On many advanced routers and switches, you can implement QoS through bandwidth management, such as __________, where you control
Mila [183]

Answer:

c. traffic shaping

Explanation:

A traffic shaping system is one that allows to adapt the incoming data traffic that comes from some node of the network giving it a special treatment called conformation of accepted traffic and thus allowing the frames to be forwarded through the network of data under traffic rules without having gone through some traffic shaping method, this can be detected as non-conforming traffic at the edge of access to the discarded metropolitan network.

Traffic shaping is a mechanism that alters the traffic characteristics of the cell flow of a connection to achieve better network efficiency while maintaining QoS objectives or in order to ensure that the cell flow conforms to traffic parameters according to the leaky bucket algorithm configuration of the traffic contract. Traffic shaping can be used in ATM, for example, to reduce peak speed, limit the length of the burst by means of adequate spacing of cells over time. The use and location of this function is network specific.

5 0
3 years ago
An instance variable name of type String, initialized to the empty String. An instance variable score of type int, initialized t
timofeeve [1]

Answer:

public class Class {

   private String name ="";

   private int score = 0;

   //Method SetName

   public void setName(String newName){

       name = newName;

   }

//Method SetScore

   public void setScore(int newScore){

       score = newScore;

   }

//Method GetName

   public String getName() {

       return name;

   }

//Method GetScore

   public int getScore() {

       return score;

   }

}

Explanation:

  • The class called Class is implemented in Java programming language
  • It has two fields (instance variables name and score)
  • Methods for setting the values of variables (mutator methods) or setters
  • Methods for getting the values of the variables (accessor methods) getters
8 0
3 years ago
Language: JAVA Can someone please tell me what the problem to my "main" class is?
AleksandrR [38]

Answer:

please find the attachment of the correct code:

Output:

Bob : 1234

sue : 5678

pat : 2468

please enter a name to replace with pat:  

Chris

Bob : 1234

sue : 5678

Chris : 2468

Explanation:

In this code, when we create the class object, that is "stu1, stu2, and stu3" and call the parameterized constructor bypassing the "string and integer" value and print the object value you forget to call the "tostring" method because it is the only method which returns both "string and integer" value.  

6 0
3 years ago
What happens when your computer is in Hibernate mode?
marusya05 [52]
It keeps you logged in to everything but it turns the screen off to save power.
8 0
3 years ago
What is the name for the size and style of text?
Mashcka [7]

Answer:

Font

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • In GamePoints' constructor, assign teamWhales with 500 and teamLions with 500. #include using namespace std; class GamePoints {
    13·1 answer
  • When you move or size a control in the Form Designer, Visual Studio automatically adjusts the ________________ that specify the
    9·1 answer
  • An administrator has several cables plugged into a patch panel and needs to determine which one comes from a specific port. Whic
    15·1 answer
  • A _________________________ can use SOAP headers to carry meta information in its messages. A. Web service B. REST Service C. Co
    14·1 answer
  • Alcohol first impairs your ____?
    12·2 answers
  • How do i voice record on my (acual ipod itself) ipod nano 4th generation helppppppp
    9·1 answer
  • Why is E in DELL tilted?​
    5·2 answers
  • To meet the requirement for the number of vdss on board, what must be true about pyrotechnic vdss?
    15·1 answer
  • How do I text lauraasher811 on brainly?
    8·1 answer
  • Which of the following is the safest authentication method?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!