Background Ethics, and not knowledge, separate thieves from detectives and hackers from security administrators. However, a detective must think like a thief to catch a thief; in other words, white hat hackers should be able to think as black hat hackers in order to thwart their future attacks. Research You may use the text-book, In-the-News, or the Internet to research any case pertaining to white hat and black hat hackers or a white hat and gray hat hackers.  The case should be no more than 24 months. Task From a white hat hacker standpoint address the following: #button { background-color: #F05A1A; border: 5px; border-radius: 5px; color: white; padding: 5px 5px; text-align: center; text-decoration: none; display: inline-block; font-size: 13px; margin: 4px 2px; cursor: pointer; } Save your time – order a paper! Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines Order Paper Now Briefly summarize the case Describe at least three emerging tools and technologies available to support your technical solutions List and describe  potential cyber threats associated with your technical solutions Delivery Method You may present this assignment in your preferred visual tool e.g., diagram, PowerPoint presentation, cartoon, graphic organizers, or infographics. If you are using: Video presentation – this can be done in 5 to 8 minutes PowerPoint presentation: Approximately 8 to 10 content slides One title slide (add only active participants name on this slide) One topic introduction slide One conclusion slide One current APA formatted references slide (no more than 24 months) slide