Identify specific vulnerabilities how they can be exploited

Assignment Help Management Information Sys
Reference no: EM131030459

I need response 3-4 page paper (no format required) with the exception of the following:

Double-Spaced, 12 point font, citation of references.

You can pick your topic based on your interests, but be sure to pick a subject that has a Technical Aspect that you can argue both the Pros and Cons. Put cognitive reasoning into the paper, just don't identify problems, come up with solutions, or at the very least, suggestions on what you think should be done be more secure. I have also provided two possibilities for you to potentially write on.

1) Based on the TED talks video on " How are devices are vulnerable to hacking", the presenter goes into an overview on how various technology like Pace Makers, vehicles, and radios are susceptible to attack. Watch the video again and elaborate on the susceptible technology (e.g. Wireless). Identify specific vulnerabilities, how they can be exploited. Describe other affected technology that you find, and present your findings. Lastly, propose how you as a Cyber Security professional would mitigate risks with the use of the technology.
Here is the link for (1) : https://www.youtube.com/watch?v=metkEeZvHTg

2) During the lecture, we covered Secure Delete, File Recovery, and Operating System cleaning devices. Write on how these functions can both Improve Security and efficiency, as well as contribute to less efficiency and degraded security. You can talk about the intent behind the use of Secure Delete (e.g. Malicious individuals versus legitimate use). Get creative, but be sure to identify specific topics and issues you are addressing in your introduction.

Reference no: EM131030459

Questions Cloud

What led portuguese nobility to organize expeditions : What led Portuguese nobility to organize expeditions in search of plunder? Which of these had strengthened the monarchies of Spain and Portugal?
Discusses about yick wo v. hopkins : Write a three page article that discusses about Yick Wo v. Hopkins
Ima reckless got into a car accident : Ima Reckless got into a car accident after she left the corner bar intoxicated.  Vicki Victim lost her life in the car accident.  At sentencing, the Judge gave Ima probation.  In celebration and relief for not having to go to jail, Ima got drunk and ..
Plaintiffs'' claim against goffstein and dismissed the suit : SAMPLE CASE BRIEF Kennedy v. Goffstein, 62 Mass.App.Ct. 230 (2004) Parties: Plaintiffs: A. William Kennedy and Helen P. Kennedy Defendant: Scott Goffstein Issue: Did the trial court err when it ruled that the statute of limitations had expired On pla..
Identify specific vulnerabilities how they can be exploited : During the lecture, we covered Secure Delete, File Recovery, and Operating System cleaning devices. Write on how these functions can both Improve Security and efficiency, as well as contribute to less efficiency and degraded security. You can talk..
What is the test called that you take to become a lawyer : What is the test called that you take to become a lawyer?
Identify a beam that supports a significant load : In a bound report you need to show all your calculations, including explanation of how you worked out external loads on the member. You should have headings and subheadings and include an introduction and discussion of the selected structures
Discuss and define the idea of romanization : In what ways were the teachings of Islam similar to Christianity? How were they different? Discuss and define the idea of Romanization and its role in creating unity in the development of the Roman Empire.
Discuss artistic elements that characterize book of kells p : Discuss Artistic elements that characterize the Book of Kells. P.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd