Articles

Evaluation post

Image
  I created a Gantt chart to visually lay out all the tasks and milestones required to complete my corporate social responsibility (CSR) presentation. The chart showed the start and end dates for each step, such as researching the topic (5/10 - 5/20), creating draft slides (4/20 - 5/25), rehearsing the presentation (5/25 - 5/ 30), and the final presentation date (5/31). I made this Gantt chart to help me plan out the work, set realistic timeframes, and ensure I was on track to meet the deadline. It proved invaluable for keeping me organized and focused throughout the multi-week project. By visualizing each component, I could clearly see my critical path to completion. I learned the immense value of upfront planning and scheduling for complex, multi-step projects to avoid last-minute scrambling . Reporting is a crucial aspect of ethical hacking engagements. The report should provide an accurate and honest assessment of the vulnerabilities discovered, respecting confidentiality and f...

Secondary research

Image
  Legally breaking into computer systems in an effort to find weaknesses that malevolent hackers could exploit is known as ethical hacking. The same methods used by malevolent hackers are employed by ethical hackers, sometimes known as "white hats," but with authorization and inside the law. Risk management, vulnerability assessment, regulatory compliance, and security awareness training all depend on ethical hacking. It assists companies in proactively detecting and reducing any dangers before they are taken advantage of. Source:  Ethical hacking The methodical process that ethical hackers adhere to includes reconnaissance, scanning, access acquisition, access maintenance, concealing tracks, reporting results, and making suggestions. Organizations can improve their entire security posture and better defend their systems, networks, and data from cyber attacks by hiring ethical hackers with experience and adhering to best practices. References:   [1] Grafiati, 'Ethic...

Primary research

Image
  I've created a Google Form with some simple questions about ethical hacking, designed specifically for university students in their foundation year. The questions aim to gauge their basic understanding and awareness of ethical hacking concepts without requiring any prior technical knowledge. Feel free to check out the form and provide your responses. The questions and some of the answers:

Welcome post

Image
 WELCOME TO MY BLOG! My name is Mohamed Imad MEZAACHE, and I'm from Algeria. I'm a student at DMUIC, and I'm writing this personal blog to share my thoughts and experiences. One topic that has captured my imagination is ethical   hacking.  This concept has always fascinated and intrigued me. I'm completely interested in this field. I want to talk about it because it combines problem-solving skills, critical thinking, and a deep understanding of computer systems and networks. Ethical hackers play a crucial role in identifying vulnerabilities and strengthening cybersecurity measures. Join me as I explore this exciting world.   Source: Ethical hacker   In this blog, I also want to share some hobbies that interest me. For instance, I love football. I always enjoy playing with my friends. I'm a massive fan of Real Madrid and the legendary Cristiano Ronaldo. There's nothing quite like the thrill of watching these incredible athletes showcase their skills on the...

Introduction post

Image
  My topic is ethical hacking, which involves using hacking techniques to identify and address security vulnerabilities in computer systems and networks with the permission of the system owners. I am researching ethical hacking because it plays a crucial role in enhancing cybersecurity and protecting organizations from malicious cyber attacks. As cyber threats continue to evolve and become more sophisticated, ethical hacking helps organizations stay ahead of potential attackers by proactively identifying and mitigating security weaknesses before they can be exploited.                                                           ## Advantages of Ethical Hacking      Proactive Security: Ethical hacking allows organizations to identify and address security vulnerabilities before they are exploited by malicious actors, providing a ...