Ethical Hacking (CC6051) Coursework (50%)
1. Brief
You are to write a technical report investigating a specific topic area related to “computer hacking”. In doing this work, it is very important that you adhere to ethical norms and that you do not in any way use any software illegally or inappropriately.
Below is a list of broad topics to choose from, although you may choose your own topic (subject to approval by the tutor):
• Ethical, Professional and Legal Issues in Hacking
• Reconnaissance and Intelligence Gathering Methods
• Software/Hardware Tools used in Hacking
• Practical Hacking Methods and Techniques
• Phishing and Social Engineering Techniques in Hacking
• Hacking into the Cloud Systems
• Hacking into Mobile Devices
• Anti-Hacking Techniques and Tools
2. Deliverables
The length of the report will be about 1200 words, excluding references and any other materials in the appendices.
Your investigation should be based on some case study or incident, and involve the use or development of an appropriate software and/or hardware tool in the real/virtual computing environment.
The report should begin by providing a clear background into the investigation, followed by the aim(s) and objectives of the investigation.
It is important that you provide clear and detailed explanations of the subject matter, and gather, analyse, evaluate and present your findings.
General Data Protection Regulation (GDPR), will replace the UK Data Protection Act and affect businesses which process personal customer data. The report should also provide an account of the impact of GDPR on Ethical Hacking
At the end of the report you should summarise everything into a conclusion that makes recommendations about specific improvements and further work.
3. Report Structure
A typical report structure will have numbered sections and subjections, e.g.:
▪ Title
▪ Contents Page {shows structure of report - section numbers, heading and pages}
▪ Introduction {puts report within context /sets the scene for the reader (e.g. where does this topic fit within the field); what are the problems/issues of the investigation; establish aims (general) and objectives (what is done to achieve the aims}
▪ Body of report {core/main part of report; like a narrative; use sign posting to sustain a thread for the reader}
▪ Conclusions & Further Work {condensed version of body; gives key findings}
▪ References (Bibliography) {very important – See Referencing}
▪ Appendices {optional}
4. Referencing
Referencing is very important in that you are acknowledging and attributing the work of others. If you do not properly reference you work then you run the risk of plagiarism – i.e. taking credit for the work or ideas of others by presenting them as your own. It is easy to detect plagiarism! Therefore, you will need to attribute the work or ideas of others by citing the source in the body of your report. There are many referencing formats that you can use, such as for example, the Harvard APA.
As a simple example, using Harvard APA for a book reference, in the body of the report you cite as follows:
Symmetric encryption is also commonly known as conventional encryption or single-key encryption (Stallings, 2006).
And in your bibliography section you list your reference as follows:
Stallings, J. (2006). Cryptography and Network Security (4th ed.): Principles and Practice. USA: Prentice Hall.
6. Marking Scheme
Note: In addition to the report submission, your coursework may be randomly chosen for a presentation/interview.
Development of the Report
Marks possible
Comments
Marks obtained
Abstract & Introduction: Where does your topic fits in the field of Ethical Hacking, Problems & issues, Aims and Objectives of the report.
10
Logical and technical development, including insight and originality
10
Use of sources and evidence
10
Understanding of topic and critical analysis: Background study of the topic, evaluation of similar research, tools & techniques
15
Impact of GDPR on Ethical Hacking
10
Practical work: Practical design, implementation, testing and evaluation of results.
20
Conclusion
10
Report Presentation & Other Features
Quality of communication /expression in terms of legibility, style, spelling and grammar
5
Overall report structure
5
Presentation of references
5
100
Total marks obtained