Tools that can be used by security administrators, network administrators, and attackers alike


Notice: Trying to access array offset on value of type bool in /home/onliiuxo/public_html/wp-content/themes/betheme/functions/theme-functions.php on line 1490

Notice: Trying to access array offset on value of type bool in /home/onliiuxo/public_html/wp-content/themes/betheme/functions/theme-functions.php on line 1495

Tools that can be used by security administrators, network administrators, and attackers alike


Notice: Trying to access array offset on value of type bool in /home/onliiuxo/public_html/wp-content/themes/betheme/functions/theme-functions.php on line 1490

Notice: Trying to access array offset on value of type bool in /home/onliiuxo/public_html/wp-content/themes/betheme/functions/theme-functions.php on line 1495

Chapter 11 lists five tools that can be used by security administrators, network administrators, and attackers alike. In a 3-4 page paper not including a title and reference page do the following;

●      Search the Web for three to five other tools that fit this description.

●      Using a Web browser and the names of the tools you found, find a site that claims to be dedicated to supporting hackers.

●      Do you find any references to other hacker tools?

○      If you do, create a list of the tools along with a short description of what the tools do and how the tools work.

(Whitman, M. E., & Mattord, H. J. (2019). Management of information security (6th ed.) Cengage Learning

Print ISBN: 978-1337405713

eText ISBN: 978-1337671545

Supplemental text; for assignment research

Chopra, A. & Chaudhary, M. (2020). Implementing an information security management system: Security management based on ISO 27001 guidelines (1st ed.). Apress.

Print ISBN: 978-1484254127

eText ISBN: 978-1484254134)

clearly state what the article is about and its purpose

How the article and/or author(s) support your argument(s)

Most important aspects of the article

Any findings and conclusions

Approximately 350 to 450 words in length

Include the article “Abstract” and in your posting (your summary should be original)

Include the industry example demonstrating the application of your researched article

“IMPORTANT” – Include the reference for the article in correct APA format (5-6 REFENCES)

and citations