How are devices are vulnerable to hacking

Assignment Help Computer Engineering
Reference no: EM131143510

QUESTION

Please write a 2-3 page paper (no format required) with the exception of the following:

Double-Spaced, 12 point font, citation of references.

You can pick your topic based on your interests, but be sure to pick a subject that has a Technical Aspect that you can argue both the Pros and Cons. Put cognitive reasoning into the paper, just don't identify problems, come up with solutions, or at the very least, suggestions on what you think should be done be more secure. I have also provided two possibilities for you to potentially write on.

1) Based on the TED talks video on "How are devices are vulnerable to hacking", the presenter goes into an overview on how various technology like Pace Makers, vehicles, and radios are susceptible to attack. Watch the video again and elaborate on the susceptible technology (e.g. Wireless). Identify specific vulnerabilities, how they can be exploited. Describe other affected technology that you find, and present your findings. Lastly, propose how you as a Cyber Security professional would mitigate risks with the use of the technology.

Here is the link for (1) : https://www.youtube.com/watch?v=metkEeZvHTg

2) During the lecture, we covered Secure Delete, File Recovery, and Operating System cleaning devices. Write on how these functions can both Improve Security and efficiency, as well as contribute to less efficiency and degraded security. You can talk about the intent behind the use of Secure Delete (e.g. Malicious individuals versus legitimate use). Get creative, but be sure to identify specific topics and issues you are addressing in your introduction.

Reference no: EM131143510

Questions Cloud

Arbitrage and financial decision making : Honda Motor Company is considering offering a $2000 rebate on its minivan, lowering the vehicle's price from $30,000 to $28,000. The marketing group estimates that this rebate will increase sales over the next year from 40,000 to 55,000 vehicles. Sup..
What is alpines free cash flow for year 1 : If the tax rate is 40%, what is Alpine's Free Cash Flow for year 1?
Organizations to manage conflicts with employees : Why is it important for organizations to manage conflicts with employees?
Describing using three different social media platforms : Write a 350- to 700-word summary describing using three different social media platforms with the objective of networking within your career field. Use your current social media accounts, or create new ones. Incorporate research regarding how to p..
How are devices are vulnerable to hacking : Based on the TED talks video on " How are devices are vulnerable to hacking", the presenter goes into an overview on how various technology like Pace Makers, vehicles, and radios are susceptible to attack.
Is there connection between ethical behavior : Is there a connection between ethical behavior within an organization and its chances of long-term survivability? Do you think that a company that behaves ethically is less or more likely to make more profit?
Determine the end area graphically by counting squares : From the following excerpt of field notes, plot the cross section on graph paper and superimpose on it a design template for a 30-ft-wide level roadbed with fill slopes of 2-1/2:1 and a subgrade elevation at centerline of 970.30 ft. Determine the ..
Calculate the return in percent for each value : Calculate the return (in Percent) for each value of b. (note: you may just calculate the total return and not worry about how this split between current yield and capital- gains yield). Calculate the expected return (in Percent)
Discuss his beliefs and their influence upon modern society : Nietzsche's ideas attacked Western society's beliefs about morality, religion, and the existence of absolute truth. Discuss his beliefs and their influence upon modern society. Prof Kim (ONLY)

Reviews

Write a Review

Computer Engineering Questions & Answers

  Data representation and logic

Representing Text and Numbers, Binary Arithmetic, Interpreting Logical Statements, Logic Puzzle, Binary and Algorithms.

  The differences among the various programming languages

What are the differences among the various programming languages. Discuss the basic computer memory concepts.

  How dedicated technician to maintain your wan interfaces

When there is a network outage, how do companies find out the network boundary.

  Define in detail minimum five practices

Your Web design firm has just hired a talented graphic artist with years of expertise in print media and no experience with producing image production. You have to train this person in the best practices for Web graphics. Explain in detail minimum..

  What elements did the new world view possess

What elements did the new world view possess that were to enable it to last until the "Idea of Progress" in the eighteenth century. Is it still part of who we still think we are today Does it still define our place in the cosmos

  how to make financial projections for alternative solutions

The executive committee decided that steps must be taken to increase the accuracy of the financial projections so they will more closely match the results that are achieved.

  Features of good program design

Provide one (1) example of a prompt that is unclear. Explain why the prompt is unclear, and suggest the changes you would make to the prompt to make it clearer. Provide a rationale for your response

  Explain the concept of an information system as if you

write an 800 word response to this questionexplain the concept of an information system as if you were teaching it to

  Design a program which computes and displays the number of

design a program that calculates and displays the number of miles per hour over the speed limit that a speeding driver

  How have the internet intranets and extranets affected the

how have the internet intranets and extranets affected the types and uses of data resources available to business

  Write program that inputs a word representing binary number

Write a program that inputs a word representing a binary number (0s and 1s). First your program should verify that it is indeed a binary number, that is the number contains only 0s and 1s.

  Find out and display the total owed for all taxpayers

A taxpayer's federal tax due is calculated as follow. First, the taxpayer gets a dependency exemption deduction of $2,000 for each child. So, if a taxpayer has two children, he or she would get a dependency exemption deduction of $4,000. A taxpaye..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd