Chapter 11 lists five tools that can be used by security administrators, network administrators, and attackers alike. In a 3-4 page paper not including a title and reference page do the following;
● Search the Web for three to five other tools that fit this description.
● Using a Web browser and the names of the tools you found, find a site that claims to be dedicated to supporting hackers.
● Do you find any references to other hacker tools?
○ If you do, create a list of the tools along with a short description of what the tools do and how the tools work.
(Whitman, M. E., & Mattord, H. J. (2019). Management of information security (6th ed.) Cengage Learning
Print ISBN: 978-1337405713
eText ISBN: 978-1337671545
Supplemental text; for assignment research
Chopra, A. & Chaudhary, M. (2020). Implementing an information security management system: Security management based on ISO 27001 guidelines (1st ed.). Apress.
Print ISBN: 978-1484254127
eText ISBN: 978-1484254134)
clearly state what the article is about and its purpose
How the article and/or author(s) support your argument(s)
Most important aspects of the article
Any findings and conclusions
Approximately 350 to 450 words in length
Include the article “Abstract” and in your posting (your summary should be original)
Include the industry example demonstrating the application of your researched article
“IMPORTANT” – Include the reference for the article in correct APA format (5-6 REFENCES)