0% found this document useful (0 votes)
128 views

Ethical Hacking and Cybeer Security

This document appears to be a seminar paper submitted for a diploma in computer science that discusses ethical hacking and cyber security. The paper includes an introduction that defines ethical hacking and outlines its aims, advantages and limitations. It also contains chapters that provide a historical background on ethical hacking through a literature review and discussions. The paper concludes with a conclusion section and references.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
128 views

Ethical Hacking and Cybeer Security

This document appears to be a seminar paper submitted for a diploma in computer science that discusses ethical hacking and cyber security. The paper includes an introduction that defines ethical hacking and outlines its aims, advantages and limitations. It also contains chapters that provide a historical background on ethical hacking through a literature review and discussions. The paper concludes with a conclusion section and references.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

ETHICAL HACKING AND CYBEER SECURITY

BY

YOUR NAME HERE


(12/69/..)

A SEMINAR SUBMITTED TO THE


DEPARTMENT OF COMPUTER SCIENCE
MOSHOOD ABIOLA POLYTECHNIC, ABEOKUTA,
OGUN STATE

IN PARTIAL FULFILLMENT OF THE AWARD OF


HIGHER NATIONAL DIPLOMA IN COMPUTER
SCIENCE

MAY, 2017
1
TABLE OF CONTENT
Title Page
Title page i
Table of content ii

CHAPTER ONE:
INTRODUCTION
1.1 Background of Ethical Hacking and Cyber security 1
1.2 Aims and Objectives of Ethical Hacking 2
1.3 Advantages of the Ethical Hacking 2-3
1.4 Limitation of the Ethical Hacking 3-4
1.5 Definition of Terms 4

CHAPTER TWO:
LITERATURE REVIEW
2.1 Historical Background of Ethical Hacking and cyber security 5-7

CHAPTER THREE:
DISCUSSION
3.1 8-9

CHAPTER FOUR:
CONCLUSION
4.1 Conclusion 15

REFERENCES 16

You might also like